H3C Access Controllers Web-Based Configuration Guide(R5447P04)-6W100

HomeSupportConfigure & DeployUser ManualsH3C Access Controllers Web-Based Configuration Guide(R5447P04)-6W100
06-Web configuration examples
Title Size Download
06-Web configuration examples 1.93 MB

Contents

System features configuration examples· 1

Network settings configuration examples· 1

Intra-AC roaming configuration example· 1

Inter-AC roaming configuration example· 2

Layer 2 static aggregation configuration example· 3

Layer 2 dynamic aggregation configuration example· 4

PPPoE client configuration example· 5

Outbound dynamic NAT configuration example· 7

Outbound static NAT configuration example· 9

IPv4 static route configuration example· 11

IPv6 static route configuration example· 12

Static IPv6 address configuration example· 13

DHCP server configuration example· 14

DHCP relay agent configuration example· 16

DHCP snooping configuration example· 16

IPv4 static DNS configuration example· 17

IPv4 dynamic DNS configuration example· 18

IPv4 DNS proxy configuration example· 19

IPv6 static DNS configuration example· 20

IPv6 dynamic DNS configuration example· 20

IPv6 DNS proxy configuration example· 21

IGMP snooping configuration example· 22

MLD snooping configuration example· 25

Proxy ARP configuration example· 28

ARP attack protection configuration example· 28

Using the AC as the Stelnet server for password authentication configuration example· 30

NTP configuration example· 31

Network security configuration examples· 32

ACL-based packet filter configuration example· 32

System configuration examples· 33

Administrators configuration example· 33

Network configuration examples· 35

Wireless configuration examples· 35

CAPWAP tunnel establishment through DHCP configuration example· 35

CAPWAP tunnel establishment through DNS configuration example· 36

Auto AP configuration example· 37

AP group configuration example· 38

Radio management configuration example· 39

Scheduled radio shutdown configuration example· 40

AP configuration file deployment configuration example· 41

AP group configuration file deployment configuration example· 41

WIPS device classification and countermeasures configuration example· 42

WIPS malformed packet and flood attack detection configuration example· 44

Signature-based attack detection configuration example· 45

Client rate limiting configuration example· 46

Bandwidth guaranteeing configuration example· 47

Shared key authentication configuration example· 49

PSK authentication and bypass authentication configuration example· 49

PSK authentication and MAC authentication configuration example· 50

802.1X RADIUS authentication configuration example· 51

802.1X local authentication configuration example· 53

802.1X AKM configuration example· 54

Direct IPv4 portal authentication configuration example· 55

WLAN RRM DFS configuration example· 57

WLAN RRM TPC configuration example· 57

WLAN RRM bandwidth adjustment configuration example· 58

Session-mode load balancing configuration example· 59

Traffic-mode load balancing configuration example· 60

Bandwidth-mode load balancing configuration example· 62

Session-mode load balancing configuration example for a load balancing group· 63

Traffic-mode load balancing configuration example for a load balancing group· 65

Bandwidth-mode load balancing configuration example for a load balancing group· 66

Band navigation configuration example· 68

Wireless locating configuration example· 69

WLAN mesh configuration example· 70

Multicast optimization configuration example· 72

Network security configuration examples· 73

BYOD configuration example· 73

Guest management configuration example· 74

Tools configuration examples· 76

Local packet capture configuration example· 76

Remote packet capture configuration example· 77

 


System features configuration examples

Network settings configuration examples

Intra-AC roaming configuration example

Network requirements

As shown in Figure 1, configure intra-AC roaming to enable the client to roam from AP 1 to AP 2. The two APs are managed by the same AC.

Figure 1 Network diagram

 

Configuration procedures

1.     Click the network view tab at the bottom of the page.

2.     Configure a wireless service:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Add a wireless service:

-     Create a wireless service named service.

-     Set the SSID to roaming.

-     Enable the wireless service.

3.     Configure the APs:

a.     From the navigation pane, select AP Management. You are placed on the AP tab.

b.     Configure AP 1:

-     Click the edit icon in the operation column for AP 1.

-     Click the wireless service setting tab, and bind the wireless service service to the radio of AP 1.

c.     Configure AP 2 in the same way AP 1 is configured.

Verifying the configuration

# On the System View> Network Configuration > Mobility Domain > Roaming page, verify that the client associates with AP 1 before roaming and associates with AP 2 after roaming.

Inter-AC roaming configuration example

Network requirements

As shown in Figure 2, configure inter-AC roaming to enable the client to roam from AP 2 to AP 3 that are managed by different ACs.

Figure 2 Network diagram

 

Configuring AC 1

1.     Click the network view tab at the bottom of the page.

2.     Configure a wireless service:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Add a wireless service:

-     Create a wireless service named service.

-     Set the SSID to roaming.

-     Enable the wireless service.

3.     Configure the APs:

a.     From the navigation pane, select AP Management. You are placed on the AP tab.

b.     Configure AP 1:

-     Click the edit icon in the operation column for AP 1.

-     Click the wireless service setting tab, and bind the wireless service service to the radio of AP 1.

c.     Configure AP 2 in the same way AP 1 is configured.

4.     Click the system view tab at the bottom of the page.

5.     Configure a mobility group:

a.     From the navigation pane, select Network Configuration > Mobility Domain.

b.     On the Roaming tab, perform the following tasks:

-     Create a mobility group named office.

-     Set the IP address type to IPv4 for IACTP tunnels.

-     Specify 10.0.0.1 as the source IP address for establishing IACTP tunnels.

-     Add the member device whose IP address is 10.0.0.2 to the mobility group.

-     Enable the mobility group.

Configuring AC 2

1.     Click the network view tab at the bottom of the page.

2.     Configure a wireless service:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Add a wireless service:

-     Create a wireless service named service.

-     Set the SSID to roaming.

-     Enable the wireless service.

3.     Configure the APs:

a.     From the navigation pane, select AP Management. You are placed on the AP tab.

b.     Configure AP 3:

-     Click the edit icon in the operation column for AP 3.

-     Click the wireless service setting tab, and bind the wireless service service to the radio of AP 3.

c.     Configure AP 4 in the same way AP 3 is configured.

4.     Click the system view tab at the bottom of the page.

5.     Configure a mobility group:

a.     From the navigation pane, select Network Configuration > Mobility Domain.

b.     On the Roaming tab, perform the following tasks:

-     Create a mobility group named office.

-     Set the IP address type to IPv4 for IACTP tunnels.

-     Specify 10.0.0.2 as the source IP address for establishing IACTP tunnels.

-     Add the member device whose IP address is 10.0.0.1 to the mobility group.

-     Enable the mobility group.

Verifying the configuration

# On the System View> Network Configuration > Mobility Domain > Roaming page, verify the following information:

·     The client associates with AP 2 managed by AC 1 before roaming.

·     The client associates with AP 3 managed by AC 2 after roaming.

Layer 2 static aggregation configuration example

Network requirements

As shown in Figure 3, configure a Layer 2 static aggregation group on both AC 1 and AC 2 to improve the link reliability.

Figure 3 Network diagram

 

Configuration procedure

1.     Configure Ethernet link aggregation on AC 1:

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > Network Interfaces.

c.     Click the Link Aggregation tab.

d.     Configure a Layer 2 aggregation group:

-     Add Layer 2 aggregation group 1.

-     Configure the aggregation mode as Static.

-     Assign ports GigabitEthernet 1/0/1 through GigabitEthernet 1/0/3 to the aggregation group.

2.     Configure a VLAN on AC 1:

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > VLAN. You are placed on the VLAN tab.

c.     Create VLAN 10.

d.     Access the details page for VLAN 10 to perform the following tasks:

-     Add the port GigabitEthernet 1/0/4 (that connects to Host A) to the untagged port list.

-     Add ports GigabitEthernet 1/0/1 through GigabitEthernet 1/0/3 and aggregate interface BAGG1 to the tagged port list.

3.     Configure AC 2 in the same way AC 1 is configured. (Details not shown.)

Verifying the configuration

1.     Access the link aggregation page, and verify that ports GigabitEthernet 1/0/1 through GigabitEthernet 1/0/3 have been assigned to link aggregation group 1.

2.     Verify that Host A can ping Host B.

3.     Verify that Host A can still ping Host B after a link between AC 1 and AC 2 fails.

Layer 2 dynamic aggregation configuration example

Network requirements

As shown in Figure 4, configure a dynamic Layer 2 aggregation group on both AC 1 and AC 2 to improve the link reliability.

Figure 4 Network diagram

 

Configuration procedure

1.     Configure Ethernet link aggregation on AC 1:

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > Network Interfaces.

c.     Click the Link Aggregation tab.

d.     Configure a Layer 2 aggregation group:

-     Add Layer 2 aggregation group 1.

-     Configure the aggregation mode as Dynamic.

-     Assign ports GigabitEthernet 1/0/1 through GigabitEthernet 1/0/3 to the aggregation group.

2.     Configure a VLAN on AC 1:

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > VLAN. You are placed on the VLAN tab.

c.     Create VLAN 10.

d.     Access the details page for VLAN 10 to perform the following tasks:

-     Add the port GigabitEthernet 1/0/4 (that connects to Host A) to the untagged port list.

-     Add ports GigabitEthernet 1/0/1 through GigabitEthernet 1/0/3 and aggregate interface BAGG1 to the tagged port list.

3.     Configure AC 2 in the same way AC 1 is configured. (Details not shown.)

Verifying the configuration

1.     Access the link aggregation page, and verify that ports GigabitEthernet 1/0/1 through GigabitEthernet 1/0/3 have been assigned to link aggregation group 1.

2.     Verify that Host A can ping Host B.

3.     Verify that Host A can still ping Host B after a link between AC 1 and AC 2 fails.

PPPoE client configuration example

The following compatibility matrixes show the support of hardware platforms for PPPoE client:

 

Hardware series

Model

Product code

Configuration example compatibility

WX1800H series

WX1804H-PWR

EWP-WX1804H-PWR-CN

Yes

WX2500H series

WX2508H-PWR-LTE

WX2510H-PWR

WX2510H-F-PWR

WX2540H

WX2540H-F

WX2560H

EWP-WX2508H-PWR-LTE

EWP-WX2510H-PWR

EWP-WX2510H-F-PWR

EWP-WX2540H

EWP-WX2540H-F

EWP-WX2560H

Yes

MAK series

MAK204

MAK206

EWP-MAK204

EWP-MAK206

Yes

WX3000H series

WX3010H

WX3010H-X-PWR

WX3010H-L-PWR

WX3024H

WX3024H-L-PWR

WX3024H-F

EWP-WX3010H

EWP-WX3010H-X-PWR

EWP-WX3010H-L-PWR

EWP-WX3024H

EWP-WX3024H-L-PWR

EWP-WX3024H-F

Yes:

·     WX3010H

·     WX3024H

No:

·     WX3010H-X-PWR

·     WX3010H-L-PWR

·     WX3024H-L-PWR

·     WX3024H-F

WX3500H series

WX3508H

WX3508H

WX3510H

WX3510H

WX3520H

WX3520H-F

WX3540H

WX3540H

EWP-WX3508H

EWP-WX3508H-F

EWP-WX3510H

EWP-WX3510H-F

EWP-WX3520H

EWP-WX3520H-F

EWP-WX3540H

EWP-WX3540H-F

No

WX5500E series

WX5510E

WX5540E

EWP-WX5510E

EWP-WX5540E

No

WX5500H series

WX5540H

WX5560H

WX5580H

EWP-WX5540H

EWP-WX5560H

EWP-WX5580H

No

Access controller modules

LSUM1WCME0

EWPXM1WCME0

LSQM1WCMX20

LSUM1WCMX20RT

LSQM1WCMX40

LSUM1WCMX40RT

EWPXM2WCMD0F

EWPXM1MAC0F

LSUM1WCME0

EWPXM1WCME0

LSQM1WCMX20

LSUM1WCMX20RT

LSQM1WCMX40

LSUM1WCMX40RT

EWPXM2WCMD0F

EWPXM1MAC0F

No

 

Hardware series

Model

Product code

Configuration example compatibility

WX1800H series

WX1804H-PWR

WX1810H-PWR

WX1820H

WX1840H

EWP-WX1804H-PWR

EWP-WX1810H-PWR

EWP-WX1820H

EWP-WX1840H-GL

Yes

WX3800H series

WX3820H

WX3840H

EWP-WX3820H-GL

EWP-WX3840H-GL

No

WX5800H series

WX5860H

EWP-WX5860H-GL

No

 

Network requirements

As shown in Figure 5, the AC connects to the Internet as a PPPoE client through Layer 3 physical interface GigabitEthernet 1/0/1. Configure the PPPoE client to meet the following requirements:

·     The PPPoE server and the AC can reach each other at Layer 3.

·     Host can access the Internet through Telnet to the IP address of GigabitEthernet 1/0/2 of the AC.

Figure 5 Network diagram

 

Configuration procedures

# Configure the PPPoE server to assign a username and password to the AC. (Details not shown.)

# Configure the PPPoE client.

1.     Click the system view tab at the bottom of the page.

2.     From the navigation pane, select Network Configuration > Network Interfaces.

3.     Click the PPPoE tab.

4.     Click the Add icon  and then configure PPPoE as follows:

¡     Select a Layer 3 physical interface to be configured (GigabitEthernet 1/0/1 in this example).

¡     Enter the username and password.

¡     Select an online mode. The timeout defines the maximum idle time for packet sending.

¡     Enable NAT and then click OK.

Verifying the configuration

Verify that GigabitEthernet 1/0/1 has obtained an IP address through PPPoE.

Outbound dynamic NAT configuration example

The following compatibility matrixes show the support of hardware platforms for outbound dynamic NAT:

 

Hardware series

Model

Product code

Configuration example compatibility

WX1800H series

WX1804H-PWR

EWP-WX1804H-PWR-CN

Yes

WX2500H series

WX2508H-PWR-LTE

WX2510H-PWR

WX2510H-F-PWR

WX2540H

WX2540H-F

WX2560H

EWP-WX2508H-PWR-LTE

EWP-WX2510H-PWR

EWP-WX2510H-F-PWR

EWP-WX2540H

EWP-WX2540H-F

EWP-WX2560H

Yes

MAK series

MAK204

MAK206

EWP-MAK204

EWP-MAK206

Yes

WX3000H series

WX3010H

WX3010H-X

WX3010H-L

WX3024H

WX3024H-L

WX3024H-F

EWP-WX3010H

EWP-WX3010H-X-PWR

EWP-WX3010H-L-PWR

EWP-WX3024H

EWP-WX3024H-L-PWR

EWP-WX3024H-F

Yes:

·     WX3010H

·     WX3024H-F

·     WX3010H-X-PWR

·     WX3024H

No:

·     WX3010H-L-PWR

·     WX3024H-L-PWR

WX3500H series

WX3508H

WX3508H

WX3510H

WX3510H

WX3520H

WX3520H-F

WX3540H

WX3540H

EWP-WX3508H

EWP-WX3508H-F

EWP-WX3510H

EWP-WX3510H-F

EWP-WX3520H

EWP-WX3520H-F

EWP-WX3540H

EWP-WX3540H-F

Yes

WX5500E series

WX5510E

WX5540E

EWP-WX5510E

EWP-WX5540E

Yes

WX5500H series

WX5540H

WX5560H

WX5580H

EWP-WX5540H

EWP-WX5560H

EWP-WX5580H

Yes

Access controller modules

LSUM1WCME0

EWPXM1WCME0

LSQM1WCMX20

LSUM1WCMX20RT

LSQM1WCMX40

LSUM1WCMX40RT

EWPXM2WCMD0F

EWPXM1MAC0

LSUM1WCME0

EWPXM1WCME0

LSQM1WCMX20

LSUM1WCMX20RT

LSQM1WCMX40

LSUM1WCMX40RT

EWPXM2WCMD0F

EWPXM1MAC0F

Yes

 

Hardware series

Model

Product code

Configuration example compatibility

WX1800H series

WX1804H-PWR

WX1810H-PWR

WX1820H

WX1840H

EWP-WX1804H-PWR

EWP-WX1810H-PWR

EWP-WX1820H

EWP-WX1840H-GL

Yes

WX3800H series

WX3820H

WX3840H

EWP-WX3820H-GL

EWP-WX3840H-GL

Yes

WX5800H series

WX5860H

EWP-WX5860H-GL

Yes

 

Network requirements

As shown in Figure 6, a company has a private address 192.168.0.0/16 and two public IP addresses 202.38.1.2 and 202.38.1.3. Configure outbound dynamic NAT to allow only internal users on subnet 192.168.1.0/24 to access the Internet.

Figure 6 Network diagram

 

Configuration procedures

1.     Click the system view tab at the bottom of the page.

2.     From the navigation pane, select Network Configuration > Network Services >NAT.

3.     Click Dynamic NAT.

4.     Click the add icon.

5.     On the New Dynamic NAT Rule page, perform the following tasks:

a.     Add ACL 2000 to permit packets only from subnet 192.168.1.0/24 to pass through.

b.     Add address group 0, and add an address range from 202.38.1.2 to 202.38.1.3 to the group.

6.     Apply the dynamic NAT rule to VLAN-interface 20.

Verifying the configuration

# Verify that Client A can access the WWW server, but Client B cannot. (Details not shown.)

Outbound static NAT configuration example

The following compatibility matrixes show the support of hardware platforms for outbound static NAT:

 

Hardware series

Model

Product code

Configuration example compatibility

WX1800H series

WX1804H-PWR

EWP-WX1804H-PWR-CN

Yes

WX2500H series

WX2508H-PWR-LTE

WX2510H-PWR

WX2510H-F-PWR

WX2540H

WX2540H-F

WX2560H

EWP-WX2508H-PWR-LTE

EWP-WX2510H-PWR

EWP-WX2510H-F-PWR

EWP-WX2540H

EWP-WX2540H-F

EWP-WX2560H

Yes

MAK series

MAK204

MAK206

EWP-MAK204

EWP-MAK206

Yes

WX3000H series

WX3010H

WX3010H-X

WX3010H-L

WX3024H

WX3024H-L

WX3024H-F

EWP-WX3010H

EWP-WX3010H-X-PWR

EWP-WX3010H-L-PWR

EWP-WX3024H

EWP-WX3024H-L-PWR

EWP-WX3024H-F

Yes:

·     WX3010H

·     WX3010H-X-PWR

·     WX3024H-F

·     WX3024H

No:

·     WX3010H-L-PWR

·     WX3024H-L-PWR

WX3500H series

WX3508H

WX3508H

WX3510H

WX3510H

WX3520H

WX3520H-F

WX3540H

WX3540H

EWP-WX3508H

EWP-WX3508H-F

EWP-WX3510H

EWP-WX3510H-F

EWP-WX3520H

EWP-WX3520H-F

EWP-WX3540H

EWP-WX3540H-F

Yes

WX5500E series

WX5510E

WX5540E

EWP-WX5510E

EWP-WX5540E

Yes

WX5500H series

WX5540H

WX5560H

WX5580H

EWP-WX5540H

EWP-WX5560H

EWP-WX5580H

Yes

Access controller module

LSUM1WCME0

EWPXM1WCME0

LSQM1WCMX20

LSUM1WCMX20RT

LSQM1WCMX40

LSUM1WCMX40RT

EWPXM2WCMD0F

EWPXM1MAC0

LSUM1WCME0

EWPXM1WCME0

LSQM1WCMX20

LSUM1WCMX20RT

LSQM1WCMX40

LSUM1WCMX40RT

EWPXM2WCMD0F

EWPXM1MAC0F

Yes

 

Hardware series

Model

Product code

Configuration example compatibility

WX1800H series

WX1804H-PWR

WX1810H-PWR

WX1820H

WX1840H

EWP-WX1804H-PWR

EWP-WX1810H-PWR

EWP-WX1820H

EWP-WX1840H-GL

Yes

WX3800H series

WX3820H

WX3840H

EWP-WX3820H-GL

EWP-WX3840H-GL

Yes

WX5800H series

WX5860H

EWP-WX5860H-GL

Yes

 

Network requirements

Configure static NAT to enable the client to access the server on the external network.

Figure 7 Network diagram

 

Configuration procedures

1.     Click the system view tab at the bottom of the page.

2.     From the navigation pane, select Network Configuration > Network Services >NAT.

3.     Click Static NAT.

4.     Click the Rules tab.

5.     Click the  icon.

6.     Select the Host to host translation mode.

7.     Enter 10.110.10.8 in the private address field and 202.38.1.100 in the public address field.

8.     Click Apply.

9.     Click the Apply tab.

10.     Select interface VLAN-interface 20.

11.     Click Apply.

Verifying the configuration

# Verify that the client can access the server on the external network.

IPv4 static route configuration example

Network requirements

As shown in Figure 8, configure IPv4 static routes on the ACs for the clients to communicate with each other.

Figure 8 Network diagram

 

Configuration procedure

1.     On AC A, configure a default route:

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > Network Routing.

c.     Click the Static Routing tab.

d.     Click IPv4 static routing.

e.     Configure the default route:

-     Set the destination IP address to 0.0.0.0.

-     Set the mask length to 0.

-     Set the next hop address to 1.1.4.2.

2.     On AC B, configure static routes to reach Client A and Client C:

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > Network Routing.

c.     Click the Static Routing tab.

d.     Click IPv4 static routing.

e.     Configure a static route to the network that contains Client C:

-     Set the destination address to 1.1.3.0.

-     Set the mask length to 24.

-     Set the next hop address to 1.1.5.6.

f.     Configure a static route to the network that contains Client A:

-     Set the destination address to 1.1.2.0.

-     Set the mask length to 24.

-     Set the next hop address to 1.1.4.1.

3.     On AC C, configure a default route:

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > Network Routing.

c.     Click the Static Routing tab.

d.     Click IPv4 static routing.

e.     Configure the default route:

-     Set the destination address to 0.0.0.0.

-     Set the mask length to 0.

-     Set the next hop address to 1.1.5.5.

Verifying the configuration

# Verify that the clients can ping each other. (Details not shown.)

IPv6 static route configuration example

Network requirements

As shown in Figure 9, configure IPv6 static routes on the ACs for the clients to communicate with each other.

Figure 9 Network diagram

 

Configuration procedure

1.     On AC A, configure an IPv6 default route:

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > Network Routing.

c.     Click the Static Routing tab.

d.     Click IPv6 static routing.

e.     Configure the IPv6 default route:

-     Set the destination IP address to ::.

-     Set the mask length to 0.

-     Set the next hop address to 4::2.

2.     On AC B, configure IPv6 static routes to reach Client A and Client C:

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > Network Routing.

c.     Click the Static Routing tab.

d.     Click IPv6 static routing.

e.     Configure an IPv6 static route to the network that contains Client C:

-     Set the destination address to 3::2.

-     Set the mask length to 64.

-     Set the next hop address to 5::1.

f.     Configure an IPv6 static route to the network that contains Client A:

-     Set the destination address to 1::2.

-     Set the mask length to 64.

-     Set the next hop address to 4::1.

3.     On AC C, configure an IPv6 default route:

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > Network Routing.

c.     Click the Static Routing tab.

d.     Click IPv6 static routing.

e.     Configure the IPv6 default route:

-     Set the destination address to ::.

-     Set the mask length to 0.

-     Set the next hop address to 5::2.

Verifying the configuration

# Verify that the clients can ping each other successfully. (Details not shown.)

Static IPv6 address configuration example

Network requirements

As shown in Figure 10, the client generates an IPv6 address through stateless address autoconfiguration.

Assign a global unicast IPv6 address to VLAN-interface 1 of the AC.

Figure 10 Network diagram

 

Configuration procedure

1.     Configure wireless service and AP settings. (Details not shown.)

2.     Configure an IPv6 address for VLAN-interface 1:

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > Network Services > IP Services.

c.     Click the IPv6 tab.

d.     Access the details page for VLAN-interface 1 to perform the following tasks:

-     Configure the IPv6 address of the interface as 2001::1.

-     Set the prefix length to 64.

3.     Configure VLAN-interface 1 to advertise RA messages.

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > Network Services > ND. You are placed on the ND tab.

c.     Access the advanced settings page to configure the RA settings.

d.     Configure VLAN-interface 1 to advertise RA messages.

4.     Install IPv6 on the client. The client automatically generates an IPv6 address based on the address prefix information contained in the RA message.

Verifying the configuration

# Verify that the client and the AC can ping each other successfully.

DHCP server configuration example

Network requirements

As shown in Figure 11, the DHCP server (AC) assigns IP addresses to the AP and DHCP clients on subnet 10.1.1.0/24, which is subnetted into 10.1.1.0/25 and 10.1.1.128/25. The AC is connected to the clients and the AP through two VLAN interfaces: VLAN-interface 10 at 10.1.1.1/25 and VLAN-interface 20 at 10.1.1.129/25.

Configure DHCP server on the AC to assign an IP address on subnet 10.1.1.0/25 to the AP and IP addresses on subnet 10.1.1.128/25 to DHCP clients.

Figure 11 Network diagram

 

Configuration procedure

1.     Click the system view tab at the bottom of the page.

2.     Configure VLANs and VLAN interfaces:

a.     From the navigation pane, select Network Configuration > VLAN. You are placed on the VLAN tab.

b.     Create VLANs and assign IP addresses to VLAN interfaces:

-     Create VLAN 10 and assign IP address 10.1.1.1/25 to VLAN-interface 10.

-     Create VLAN 20 and assign IP address 10.1.1.129/25 to VLAN-interface 20.

3.     Configure the DHCP server:

a.     From the navigation pane, select Network Configuration > Network Services > DHCP/DNS. You are placed on the DHCP tab.

b.     Enable DHCP.

c.     Specify VLAN-interface 10 and VLAN-interface 20 as DHCP servers.

d.     Click the address pool link and perform the following tasks:

-     Create the address pool pool1, specify 10.1.1.0/25 as the subnet for dynamic assignment, and specify 10.1.1.1 as the gateway.

-     Create the address pool pool2, specify 10.1.1.128/25 as the subnet for dynamic assignment, and specify 10.1.1.129 as the gateway.

e.     Access the advanced settings page to perform the following tasks:

-     Set the maximum number of ping packets to 1.

-     Set the ping response timeout time to 500 milliseconds.

4.     Click the network view tab at the bottom of the page.

5.     Configure a wireless service:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Add a wireless service:

-     Create a wireless service named service.

-     Set the SSID to office.

-     Specify the default VLAN 20.

-     Enable the wireless service.

6.     Configure the AP:

a.     From the navigation pane, select Wireless Configuration > AP Management. You are placed on the AP tab.

b.     Add and configure the AP:

-     Set the AP name to AP1, and set the AP model and serial ID.

-     Click the edit icon in the operation column for AP 1.

-     Click the wireless service setting tab, and bind the wireless service service to the 5 GHz radio of AP 1.

7.     Configure the AP radio:

a.     From the navigation pane, select Wireless Configuration > AP Management. You are placed on the AP tab.

b.     Set the status of the 5 GHz radio of AP 1 to On.

Verifying the configuration

1.     Verify that the AP can obtain an IP address on subnet 10.1.1.0/25 and the gateway address from the DHCP server.

2.     Verify that the DHCP clients can obtain IP addresses on subnet 10.1.1.128/25 and the gateway address from the DHCP server.

DHCP relay agent configuration example

Network requirements

As shown in Figure 12, the DHCP clients and the DHCP server are in different subnets. The DHCP clients reside in subnet 10.10.1.0/24 and the DHCP server is at 10.1.1.1/24. An AC is deployed between the DHCP clients and the DHCP server. The AC is connected to the network in which the DHCP clients reside through VLAN-interface 10 at 10.10.1.1/24. The AC is connected to the DHCP server through VLAN-interface 20 at 10.1.1.2/24.

Configure the DHCP relay agent on the AC, so the DHCP clients can obtain IP addresses and other configuration parameters from the DHCP server.

Figure 12 Network diagram

 

Configuration procedure

1.     Assign IP addresses to interfaces. (Details not shown.)

2.     Configure the DHCP server. (Details not shown.)

3.     Configure basic settings on the AC. (Details not shown.)

4.     Configure the DHCP relay agent:

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > Network Services > DHCP/DNS. You are placed on the DHCP tab.

c.     Perform the following tasks:

-     Enable DHCP.

-     Specify VLAN-interface 10 as the DHCP relay agent.

-     Specify the DHCP server address 10.1.1.1.

Verifying the configuration

Verify that the DHCP clients can obtain IP addresses and other configuration parameters from the DHCP server through the DHCP relay agent.

DHCP snooping configuration example

Network requirements

As shown in Figure 13, the AC is connected to a DHCP server through GigabitEthernet 1/0/1 and to an AP through GigabitEthernet 1/0/2. Configure DHCP snooping on the AC to meet the following requirements:

·     Allow only the interface connected to the authorized DHCP server to forward packets from the DHCP server.

·     Record the clients' IP-to-MAC binding information in DHCP-REQUEST packets and in DHCP-ACK packets received by trusted ports.

Figure 13 Network diagram

 

Configuration procedure

1.     Configure the DHCP server. (Details not shown.)

2.     Configure basic settings on the AC. (Details not shown.)

3.     Configure the DHCP snooping device:

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > Network Services > DHCP/DNS.

c.     Click the DHCP Snooping tab.

d.     Perform the following tasks:

-     Enable DHCP snooping.

-     Configure GigabitEthernet 1/0/1, the interface connected to the authorized DHCP server, as the trusted port.

-     Configure GigabitEthernet 1/0/2, the interface connected to the DHCP clients, to record DHCP snooping entries.

Verifying the configuration

# Verify that the AC maintains DHCP snooping entries for clients that have obtained IP addresses through DHCP.

IPv4 static DNS configuration example

Network requirements

As shown in Figure 14, configure a static DNS entry on the AC, so the AC can use the domain name host.com to access the host at 10.1.1.2.

Figure 14 Network diagram

 

Configuration procedure

1.     Click the system view tab at the bottom of the page.

2.     From the navigation pane, select Network Configuration > Network Services > DHCP/DNS.

3.     Click the IPv4 DNS tab.

4.     Create a static DNS entry:

¡     Configure the host name as host.com.

¡     Configure the IPv4 address as 10.1.1.2.

Verifying the configuration

Use the ping host.com command on the AC to verify the following items:

·     The ping operation succeeds.

·     The AC can use static domain name resolution to resolve the domain name host.com into the IPv4 address 10.1.1.2.

IPv4 dynamic DNS configuration example

Network requirements

As shown in Figure 15, the DNS server at 2.1.1.2/16 has a com domain that stores the mapping between the domain name host and the IPv4 address 3.1.1.1/16.

Configure dynamic DNS and the DNS suffix com on the AC that acts as a DNS client. The AC can use the domain name host to access the host whose domain name is host.com and IPv4 address is 3.1.1.1/16.

Figure 15 Network diagram

 

Configuration procedure

1.     Map the domain name host.com to the IPv4 address 3.1.1.1 on the DNS server. (Details not shown.)

2.     Configure static routes or dynamic routing protocols on the devices to make sure the devices can reach each other. (Details not shown.)

3.     Configure DNS client on the AC:

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > Network Services > DHCP/DNS.

c.     Click the IPv4 DNS tab.

d.     Specify the DNS server address 2.1.1.2.

e.     Access the advanced settings page and add the domain name suffix com.

Verifying the configuration

Use the ping host command on the AC to verify the following items:

·     The ping operation succeeds.

·     The AC can resolve the domain name host.com into the IPv4 address 3.1.1.1 through the DNS server.

IPv4 DNS proxy configuration example

Network requirements

As shown in Figure 16, the LAN has a large number of devices deployed. The devices access the DNS server for domain name resolution. If the DNS server's IP address changes, the administrator must modify the DNS server address on each device, which takes a lot of time.

To simplify the configuration, configure the AC as the DNS proxy. Specify the real DNS server address on the AC. Specify the DNS proxy address as the DNS server address on the other devices. If the DNS server address changes, the administrator only needs to modify the DNS server address on the DNS proxy.

Figure 16 Network diagram

 

Configuration procedure

1.     Configure static routes or dynamic routing protocols on the devices to make sure the devices can reach each other. (Details not shown.)

2.     Configure the DNS server. (Details not shown.)

3.     Configure DNS proxy on the AC:

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > Network Services > DHCP/DNS.

c.     Click the IPv4 DNS tab.

d.     Specify the DNS server address 4.1.1.1.

e.     On the advanced settings page, enable DNS proxy.

4.     Configure DNS clients.

Specify the DNS proxy address 2.1.1.2 as the DNS server address on the other devices that act as DNS clients.

Verifying the configuration

Use the ping host.com command on a DNS client to verify the following items:

·     The ping operation succeeds.

·     The client can resolve the domain name host.com into the IPv4 address 3.1.1.1 through the DNS server.

IPv6 static DNS configuration example

Network requirements

As shown in Figure 17, configure a static DNS entry on the AC, so the AC can use the domain name host.com to access the host at 1::2.

Figure 17 Network diagram

 

Configuration procedure

1.     Click the system view tab at the bottom of the page.

2.     From the navigation pane, select Network Configuration > Network Services > DHCP/DNS.

3.     Click the IPv6 DNS tab.

4.     Create a static DNS entry:

¡     Configure the host name as host.com.

¡     Configure the IPv6 address as 1::2.

Verifying the configuration

Use the ping ipv6 host.com command on the AC to verify the following items:

·     The ping operation succeeds.

·     The AC can use static domain name resolution to resolve the domain name host.com into the IPv6 address 1::2.

IPv6 dynamic DNS configuration example

Network requirements

As shown in Figure 18, the DNS server at 2::2/64 has a com domain that stores the mapping between the domain name host and the IPv6 address 1::1/64.

Configure dynamic DNS and the DNS suffix com on the AC that acts as a DNS client. The AC can use the domain name host to access the host whose domain name is host.com and IPv6 address is 1::1/64.

Figure 18 Network diagram

 

Configuration procedure

1.     Map the domain name host.com to the IPv6 address 1::1 on the DNS server. (Details not shown.)

2.     Configure static routes or dynamic routing protocols on the devices to make sure the devices can reach each other. (Details not shown.)

3.     Configure DNS client on the AC:

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > Network Services > DHCP/DNS.

c.     Click the IPv6 DNS tab.

d.     Specify the DNS server address 2::2.

e.     Access the advanced settings page and add the domain name suffix com.

Verifying the configuration

Use the ping ipv6 host command on the AC to verify the following items:

·     The ping operation succeeds.

·     The AC can resolve the domain name host.com into the IPv6 address 1::1 through the DNS server.

IPv6 DNS proxy configuration example

Network requirements

As shown in Figure 19, the LAN has a large number of devices deployed. The devices access the DNS server for domain name resolution. If the DNS server's IPv6 address changes, the administrator must modify the DNS server address on each device, which takes a lot of time.

To simplify the configuration, configure the AC as the DNS proxy. Specify the real DNS server address on the AC. Specify the DNS proxy address as the DNS server address on the other devices. If the DNS server address changes, the administrator only needs to modify the DNS server address on the DNS proxy.

Figure 19 Network diagram

 

Configuration procedure

1.     Configure static routes or dynamic routing protocols on the devices to make sure the devices can reach each other. (Details not shown.)

2.     Configure the DNS server. (Details not shown.)

3.     Configure DNS proxy on the AC:

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > Network Services > DHCP/DNS.

c.     Click the IPv6 DNS tab.

d.     Specify the DNS server address 4000::1.

e.     On the advanced settings page, enable DNS proxy.

4.     Configure DNS clients.

Specify the DNS proxy address 2000::2 as the DNS server address on the other devices that act as DNS clients.

Verifying the configuration

Use the ping ipv6 host.com command on a DNS client to verify the following items:

·     The ping operation succeeds.

·     The client can resolve the domain name host.com into the IPv6 address 3000::1 through the DNS server.

IGMP snooping configuration example

The following compatibility matrixes show the support of hardware platforms for IGMP snooping:

 

Hardware series

Model

Product code

Configuration example compatibility

WX1800H series

WX1804H-PWR

EWP-WX1804H-PWR-CN

Yes

WX2500H series

WX2508H-PWR-LTE

WX2510H-PWR

WX2510H-F-PWR

WX2540H

WX2540H-F

WX2560H

EWP-WX2508H-PWR-LTE

EWP-WX2510H-PWR

EWP-WX2510H-F-PWR

EWP-WX2540H

EWP-WX2540H-F

EWP-WX2560H

Yes

MAK series

MAK204

MAK206

EWP-MAK204

EWP-MAK206

Yes

WX3000H series

WX3010H

WX3010H-X-PWR

WX3010H-L-PWR

WX3024H

WX3024H-L-PWR

WX3024H-F

EWP-WX3010H

EWP-WX3010H-X-PWR

EWP-WX3010H-L-PWR

EWP-WX3024H

EWP-WX3024H-L-PWR

EWP-WX3024H-F

Yes:

·     WX3010H

·     WX3010H-X-PWR

·     WX3024H

·     WX3024H-F

No:

·     WX3010H-L-PWR

·     WX3024H-L-PWR

WX3500H series

WX3508H

WX3508H

WX3510H

WX3510H

WX3520H

WX3520H-F

WX3540H

WX3540H

EWP-WX3508H

EWP-WX3508H-F

EWP-WX3510H

EWP-WX3510H-F

EWP-WX3520H

EWP-WX3520H-F

EWP-WX3540H

EWP-WX3540H-F

Yes

WX5500E series

WX5510E

WX5540E

EWP-WX5510E

EWP-WX5540E

Yes

WX5500H series

WX5540H

WX5560H

WX5580H

EWP-WX5540H

EWP-WX5560H

EWP-WX5580H

Yes

Access controller module

LSUM1WCME0

EWPXM1WCME0

LSQM1WCMX20

LSUM1WCMX20RT

LSQM1WCMX40

LSUM1WCMX40RT

EWPXM2WCMD0F

EWPXM1MAC0

LSUM1WCME0

EWPXM1WCME0

LSQM1WCMX20

LSUM1WCMX20RT

LSQM1WCMX40

LSUM1WCMX40RT

EWPXM2WCMD0F

EWPXM1MAC0F

Yes

 

Hardware series

Model

Product code

Configuration example compatibility

WX1800H series

WX1804H-PWR

WX1810H-PWR

WX1820H

WX1840H

EWP-WX1804H-PWR

EWP-WX1810H-PWR

EWP-WX1820H

EWP-WX1840H-GL

Yes

WX3800H series

WX3820H

WX3840H

EWP-WX3820H-GL

EWP-WX3840H-GL

Yes

WX5800H series

WX5860H

EWP-WX5860H-GL

Yes

 

Network requirements

As shown in Figure 20:

·     The network is a Layer 2-only network.

·     Source 1 sends multicast data to the multicast group 224.1.1.1, and Host A and Host B are receivers of the group.

·     Host A and Host B run IGMPv2. The AC, Switch A, and Switch B run IGMPv2 snooping, and the AC acts as the IGMP querier.

Configure the devices to meet the following requirements:

·     For IGMP snooping forwarding entries to be created, configure the source IP address of IGMP queries as a non-zero IP address on the AC.

·     To prevent unknown multicast data from being flooded in VLAN 10, enable the devices to drop unknown multicast data.

Figure 20 Network diagram

 

Configuration procedure

1.     Configure the AC:

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > Network Services > Multicast. You are placed on the IGMP Snooping tab.

c.     Enable IGMP snooping.

d.     Access the page for enabling IGMP snooping on a VLAN to perform the following tasks:

-     Set the VLAN ID to 10.

-     Set the IGMP snooping version to 2.

-     Enable dropping unknown multicast data.

-     Enable the AC to act as the IGMP querier.

-     Set the source IP address to 192.168.1.10 for IGMP general queries.

-     Set the source IP address to 192.168.1.10 for IGMP group-specific queries.

2.     Configure Switch A:

# Enable IGMP snooping for VLAN 10, set the IGMP snooping version to 2, and then enable dropping unknown multicast data. (Details not shown.)

3.     Configure Switch B in the same way Switch A is configured. (Details not shown.)

Verifying the configuration

1.     Send IGMP reports from Host A and Host B to join the multicast group 224.1.1.1. (Details not shown.)

2.     Send multicast data from the source to the multicast group. (Details not shown.)

3.     Access the Network Configuration> Network Services > Multicast > IGMP snooping > Entries page to verify that GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2 are host ports of VLAN 1.

MLD snooping configuration example

The following compatibility matrixes show the support of hardware platforms for MLD snooping:

 

Hardware series

Model

Product code

Configuration example compatibility

WX1800H series

WX1804H-PWR

EWP-WX1804H-PWR-CN

Yes

WX2500H series

WX2508H-PWR-LTE

WX2510H-PWR

WX2510H-F-PWR

WX2540H

WX2540H-F

WX2560H

EWP-WX2508H-PWR-LTE

EWP-WX2510H-PWR

EWP-WX2510H-F-PWR

EWP-WX2540H

EWP-WX2540H-F

EWP-WX2560H

Yes

MAK series

MAK204

MAK206

EWP-MAK204

EWP-MAK206

Yes

WX3000H series

WX3010H

WX3010H-X-PWR

WX3010H-L-PWR

WX3024H

WX3024H-L-PWR

WX3024H-F

EWP-WX3010H

EWP-WX3010H-X-PWR

EWP-WX3010H-L-PWR

EWP-WX3024H

EWP-WX3024H-L-PWR

EWP-WX3024H-F

Yes:

·     WX3010H

·     WX3010H-X-PWR

·     WX3024H

·     WX3024H-F

No:

·     WX3010H-L-PWR

·     WX3024H-L-PWR

WX3500H series

WX3508H

WX3508H

WX3510H

WX3510H

WX3520H

WX3520H-F

WX3540H

WX3540H

EWP-WX3508H

EWP-WX3508H-F

EWP-WX3510H

EWP-WX3510H-F

EWP-WX3520H

EWP-WX3520H-F

EWP-WX3540H

EWP-WX3540H-F

Yes

WX5500E series

WX5510E

WX5540E

EWP-WX5510E

EWP-WX5540E

Yes

WX5500H series

WX5540H

WX5560H

WX5580H

EWP-WX5540H

EWP-WX5560H

EWP-WX5580H

Yes

Access controller modules

LSUM1WCME0

EWPXM1WCME0

LSQM1WCMX20

LSUM1WCMX20RT

LSQM1WCMX40

LSUM1WCMX40RT

EWPXM2WCMD0F

EWPXM1MAC0

LSUM1WCME0

EWPXM1WCME0

LSQM1WCMX20

LSUM1WCMX20RT

LSQM1WCMX40

LSUM1WCMX40RT

EWPXM2WCMD0F

EWPXM1MAC0F

Yes

 

Hardware series

Model

Product code

Configuration example compatibility

WX1800H series

WX1804H-PWR

WX1810H-PWR

WX1820H

WX1840H

EWP-WX1804H-PWR

EWP-WX1810H-PWR

EWP-WX1820H

EWP-WX1840H-GL

Yes

WX3800H series

WX3820H

WX3840H

EWP-WX3820H-GL

EWP-WX3840H-GL

Yes

WX5800H series

WX5860H

EWP-WX5860H-GL

Yes

 

Network requirements

As shown in Figure 21:

·     The network is a Layer 2-only network.

·     Source 1 sends IPv6 multicast data to the IPv6 multicast group FF1E::101. Host A and Host B are receivers of the group.

·     Host A and Host B run MLDv1. The AC, Switch A, and Switch B run MLDv1 snooping, and the AC acts as the MLD querier.

To prevent unknown IPv6 multicast data from being flooded in VLAN 10, enable all the devices to drop unknown IPv6 multicast data.

Figure 21 Network diagram

 

Configuration procedure

1.     Configure the AC:

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > Network Services > Multicast. You are placed on the IGMP Snooping tab.

c.     Click the MLD Snooping tab, and then enable MLD snooping.

d.     Access the page for enabling MLD snooping on a VLAN to perform the following tasks:

-     Set the VLAN ID to 10.

-     Set the MLD snooping version to 1.

-     Enable dropping unknown IPv6 multicast data.

-     Enable the AC to act as an MLD querier.

-     Apply the configuration.

2.     Configure Switch A:

# Enable MLD snooping for VLAN 10, set the MLD snooping version to 1, and then enable dropping unknown IPv6 multicast data. (Details not shown.)

3.     Configure Switch B in the same way Switch A is configured. (Details not shown.)

Verifying the configuration

1.     Send MLD reports from Host A and Host B to join the IPv6 multicast group FF1E::101. (Details not shown.)

2.     Send IPv6 multicast data from Source 1 to the IPv6 multicast group. (Details not shown.)

3.     Access the Network Configuration> Network Services > Multicast > MLD snooping > Entries page to verify that GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2 are host ports of VLAN 1.

Proxy ARP configuration example

Network requirements

As shown in Figure 22, Client 1 and Client 2 have the same IP prefix and mask, but they are located on different subnets separated by the AC. Client 1 belongs to VLAN 10, and Client 2 belongs to VLAN 20. No default gateway is configured on Client 1 and Client 2.

Configure proxy ARP on the AC to enable communication between the two clients.

Figure 22 Network diagram

 

Configuration procedure

1.     Configure VLAN 10 and VLAN 20, and assign IP addresses to VLAN-interface 10 and VLAN-interface 20:

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > VLAN. You are placed on the VLAN tab.

c.     Create VLAN 10, and assign IP address 192.168.10.99/24 to VLAN-interface 10.

d.     Create VLAN 20, and assign IP address 192.168.20.99/24 to VLAN-interface 20.

2.     Enable proxy ARP on VLAN-interface 10 and VLAN-interface 20.

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > Network Services > ARP. You are placed on the ARP tab.

c.     Access the advanced settings page to configure proxy ARP.

-     Enable proxy ARP on VLAN-interface 10.

-     Enable proxy ARP on VLAN-interface 20.

Verifying the configuration

# Verify that Client 1 and Client 2 can ping each other successfully.

ARP attack protection configuration example

Network requirements

As shown in Figure 23, Client 1 obtains an IP address from the switch (DHCP server). Client 2 is manually assigned IP address 10.1.1.6.

Configure the AC to perform ARP packet validity check and user validity check for connected clients.

Figure 23 Network diagram

 

Configuration procedure

1.     Assign all interfaces to VLAN 10, and specify the IP address of VLAN-interface 10 on the switch. (Details not shown.)

2.     Configure the DHCP server on the switch. (Details not shown.)

3.     Configure Client 1 (the DHCP client) and Client 2. (Details not shown.)

4.     Enable DHCP snooping on the AC:

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > Network Services > DHCP/DNS.

c.     Click the DHCP Snooping tab.

d.     Enable DHCP snooping.

e.     Configure GigabitEthernet 1/0/3 as a trusted port.

f.     Enable recording of client information in DHCP snooping entries on GigabitEthernet 1/0/1.

5.     Configure ARP detection on the AC:

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > Network Services > ARP. You are placed on the ARP tab.

c.     Access the advanced settings page to configure ARP detection under ARP attack protection.

d.     Enable ARP detection for VLAN 10.

e.     Access the advanced settings page for ARP detection to perform the following tasks:

-     Configure GigabitEthernet 1/0/3 as a trusted interface.

By default, an interface is an untrusted interface.

-     Enable ARP packet validity check by checking the sender MAC address, target MAC address, and IP addresses of ARP packets.

After the configurations are completed, the AC first checks the validity of ARP packets received on GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2. If the ARP packets are confirmed valid, the switch performs user validity check by using the DHCP snooping entries.

Verifying the configuration

# Access the ARP page to verify that ARP entry for Client 1 is created and no ARP entry is created for Client 2.

Using the AC as the Stelnet server for password authentication configuration example

Network requirements

As shown in Figure 24:

·     The AC acts as the Stelnet server and uses password authentication.

·     The username and password of the client are saved on the AC.

Establish an Stelnet connection between the host and the AC, so you can log in to the AC to configure and manage the AC.

Figure 24 Network diagram

 

Configuration procedure

1.     Configure the Stelnet server:

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > Management Protocols.

c.     Click the SSH tab.

d.     Enable the Stelnet service.

2.     Configure the VLAN interface:

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > VLAN.

c.     On the VLAN tab, create VLAN 2.

d.     Click the edit icon for VLAN 2.

The Edit VLAN page opens.

e.     Add GigabitEthernet 1/0/2 to the untagged port list.

f.     Select Configure VLAN interface.

g.     Set the IPv4 address/mask to 192.168.1.40/24.

3.     Configure the administrator account:

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select System > Administrators.

c.     Click the add icon.

d.     Set the username and password to client and aabbcc, respectively.

e.     Select network-admin from the user roles list.

f.     Select SSH for the permitted access types parameter.

Verifying the configuration

This example uses PuTTY0.58 to verify the configuration.

1.     Execute PuTTY on the host.

2.     Enter 192.168.1.40 in the Host Name (or IP address) field.

3.     Click Open.

4.     Verify that you can use username client and password aabbcc to log in to the configuration page of the AC.

NTP configuration example

Network requirements

As shown in Figure 25:

·     Configure the local clock of AC 1 as a reference source, with the stratum level 2.

·     Set AC 2 to client mode and use AC 1 as the NTP server for AC 2.

Figure 25 Network diagram

 

Configuration procedure

1.     Configure AC 1 (NTP server):

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select Network Configuration > Management Protocols.

c.     Click the NTP tab.

d.     Enable the NTP service.

e.     Specify the IP address of the local clock as 127.127.1.0.

f.     Configure the stratum level of the local clock as 2.

2.     Configure AC 2:

a.     Click the system view tab at the bottom of the page.

b.     From the navigation pane, select System > Management. You are placed on the Settings tab.

c.     Select automatic time synchronization with a trusted time source, and then select NTP as the time protocol.

d.     Specify the IP address of Device A as 1.0.1.11, and configure Device B to operate in server mode.

Verifying the configuration

# Verify that AC 2 has synchronized to AC 1, and the clock stratum level is 3 on AC 2 and 2 on AC 1.

Network security configuration examples

ACL-based packet filter configuration example

Network requirements

As shown in Figure 26, a company interconnects its departments through the AC. Configure the packet filter on the AC to meet the following requirements:

·     Permit access from the President's office at any time to the financial database server.

·     Permit access from the Financial Department to the financial database server only during working hours (from 8:00 to 18:00) on working days.

·     Deny access from any other department to the financial database server.

Figure 26 Network diagram

 

Configuration procedure

1.     Click the system view tab at the bottom of the page.

2.     From the navigation pane, select Network Security > Packet Filter.

3.     Create a packet filter policy:

a.     Select VLAN-interface 100.

b.     Select the outbound application direction.

c.     Select the IPv4 ACL type for packet filter.

4.     Create an advanced IPv4 ACL and configure the following rules in the order they are described:

 

Action

Protocol type

IP/wildcard mask

Time range

Permit

256

Source: 192.168.1.0/0.0.0.255

Destination: 192.168.0.100/0

N/A

Permit

256

Source: 192.168.2.0/0.0.0.255

Destination: 192.168.0.100/0

Create a time range named work:

·     Specify the start time as 08:00.

·     Specify the end time as 18:00.

·     Select Monday through Friday.

Deny

256

Destination: 192.168.0.100/0

N/A

 

5.     Enable rule match counting for the ACL.

Verifying the configuration

1.     Ping the database server from different departments to verify the following items:

¡     You can access the server from the President's office at any time.

¡     You can access the server from the Financial Department during the working hours on working days.

¡     You cannot access the server from the Marketing Department at any time.

2.     Access the ACL rule Web interface, verify that the ACL rules are active and the number of matching packets is displayed.

System configuration examples

Administrators configuration example

Network requirements

As shown in Figure 27, configure an administrator account with the username webuser and password 12345 on the AC to meet the following requirements:

·     Allow the user to use the account to log in to the AC through HTTP.

·     Perform local authentication for the user that uses the administrator account to log in to the AC.

·     Assign the network-admin user role to the authenticated user.

Figure 27 Network diagram

 

Configuration procedure

1.     Click the system view tab at the bottom of the page.

2.     Configure the VLAN and VLAN interface:

a.     From the navigation pane, select Network Configuration > VLAN. You are placed on the VLAN tab.

b.     Create VLAN 2.

c.     Access the edit page for VLAN 2 to perform the following tasks:

-     Add the interface that connects to the admin's PC to the tagged port list.

-     Create VLAN-interface 2.

-     Assign the IP address 192.168.1.20/24 to VLAN-interface 2.

3.     Configure an administrator account:

a.     From the navigation pane, select System > Administrators. You are placed on the Administrators tab.

b.     Create and configure an administrator account:

-     Set the username and the password to webuser and 12345, respectively.

-     Select the network-admin user role.

-     Specify HTTP and HTTPS as the permitted access types.

Verifying the configuration

1.     Access the System > Administrators page to verify that the administrator account is successfully added.

2.     Enter http://192.168.1.20 in the address bar to verify the following items:

¡     You can use the administrator account to log in to the Web interface.

¡     After login, you can configure the device.


Network configuration examples

Wireless configuration examples

CAPWAP tunnel establishment through DHCP configuration example

Network requirements

As shown in Figure 28, configure the AP to obtain its IP address and the AC's IP address from the DHCP server (the AC) through DHCP Option 43. The AP uses the IP address of the AC to establish a CAPWAP tunnel with the AC.

Figure 28 Network diagram

 

Configuration procedure

1.     Click the system view tab at the bottom of the page.

2.     Set the AC IP address:

a.     From the navigation pane, select Network Configuration > VLAN. You are placed on the VLAN tab.

b.     Click the edit icon in the operation column for VLAN-interface 1.

c.     Set the IP address to 1.1.1.1/24.

3.     Configure DHCP:

a.     From the navigation pane, select Network Configuration > Network Services > DHCP/DNS. You are placed on the DHCP tab.

b.     Enable the DHCP service.

c.     Access the DHCP configuration page to select DHCP server from the DHCP service list for VLAN-interface 1.

d.     Access the address pool configuration page. You are placed on the Assigned Address tab.

e.     Click Add Address Pool and then perform the following tasks:

-     Create an address pool named pool1.

-     Specify subnet 1.1.1.0/24 for dynamic IP address assignment.

f.     Click the DHCP Options tab.

g.     Perform the following tasks:

-     Set the gateway address to 1.1.1.1.

-     Configure DHCP Option 43 to specify the AC's IP address in the hexadecimal format. The option content is 800700000101010101 in this example.

4.     Click the network view tab at the bottom of the page.

5.     Configure the AP:

a.     From the navigation pane, select Wireless Configuration > AP Management. You are placed on the AP tab.

b.     Add and configure AP 1:

-     Set the AP name to AP1.

-     Set the AP model and serial ID.

Verifying the configuration

# Access the Wireless Configuration > AP Management > AP page to verify that AP 1 has come online.

# Access the AP details page to verify the following information:

·     The AP has obtained an IP address.

·     The AC IP address is 1.1.1.1/24.

·     The AC discovery type is DHCP.

CAPWAP tunnel establishment through DNS configuration example

Network requirements

As shown in Figure 29, configure the AP to obtain the IP address of the AC through DNS to establish a CAPWAP tunnel with the AC.

Figure 29 Network diagram

 

Configuration procedure

1.     On the DHCP server, specify subnet 1.1.1.0/24 for IP address assignment, set the domain name suffix of the AC to abc, and specify the DNS server address as 1.1.1.4/24. (Details not shown.)

2.     On the DNS server, configure a mapping between domain name host.abc and IP address 1.1.1.1/24. (Details not shown.)

3.     Click the system view tab at the bottom of the page.

4.     Set the AC's IP address:

a.     From the navigation pane, select Network Configuration > VLAN. You are placed on the VLAN tab.

b.     Click the edit icon in the operation column for VLAN-interface 1.

c.     Set the IP address to 2.1.1.1/24.

5.     Click the network view tab at the bottom of the page.

6.     Configure the AP:

a.     From the navigation pane, select Wireless Configuration > AP Management. You are placed on the AP tab.

b.     Add and configure AP 1:

-     Set the AP name to AP1.

-     Set the AP model and serial ID.

Verifying the configuration

# Access the Wireless Configuration > AP Management > AP page to verify that AP 1 has come online.

# Access the AP details page to verify the following information:

·     The AP has obtained an IP address.

·     The AC's IP address is 1.1.1.1/24.

·     The AC discovery type is DNS.

Auto AP configuration example

Network requirements

As shown in Figure 30, enable the auto AP feature on the AC. The AP obtains the AC's IP address through DHCP Option 43 and establishes a CAPWAP tunnel with the AC.

Figure 30 Network diagram

 

Configuration procedure

1.     Click the system view tab at the bottom of the page.

2.     Set the AC IP address:

a.     From the navigation pane, select Network Configuration > VLAN. You are placed on the VLAN tab.

b.     Click the edit icon in the operation column for VLAN-interface 1.

c.     Set the IP address to 1.1.1.1/24.

3.     Configure DHCP:

a.     From the navigation pane, select Network Configuration > Network Services > DHCP/DNS. You are placed on the DHCP tab.

b.     Enable the DHCP service.

c.     Access the DHCP configuration page to select DHCP server from the DHCP service list for VLAN-interface 1.

d.     Access the address pool configuration page. You are placed on the Assigned Address tab.

e.     Click Add Address Pool and then perform the following tasks:

-     Create an address pool named pool1.

-     Specify subnet 1.1.1.0/24 for dynamic IP address assignment.

f.     Click the DHCP Options tab.

g.     Perform the following tasks:

-     Set the gateway address to 1.1.1.1.

-     Configure DHCP Option 43 to specify the AC's IP address in the hexadecimal format. The option content is 800700000101010101 in this example.

4.     Click the network view tab at the bottom of the page.

5.     Configure the AP:

a.     From the navigation pane, select Wireless Configuration > AP Management.

b.     Click the AP Global Settings tab.

c.     Enable the auto AP feature.

Verifying the configuration

# Access the Wireless Configuration > AP Management > AP page to verify that AP 1 has come online as an auto AP.

AP group configuration example

Network requirements

As shown in Figure 31, configure AP groups and add AP 1 to the AP group group1, and AP 2, AP 3, and AP 4 to the AP group group2.

Figure 31 Network diagram

 

Configuration procedure

1.     Configure APs to obtain their IP addresses and the AC's IP address from the DHCP server. (Details not shown.)

2.     Click the network view tab at the bottom of the page.

3.     Configure the AP groups:

a.     From the navigation pane, select Wireless Configuration > AP Management.

b.     Click the AP Groups tab.

c.     Add AP group group1, and create an AP name grouping rule to add AP ap1 to the AP group.

d.     Add AP group group2, and create an AP name grouping rule to add APs ap2, ap3, and ap4 to the AP group.

Verifying the configuration

# Access the AP groups page to verify the following information:

·     The AP ap1 is in the AP list of the AP group group1.

·     The APs ap 2, ap 3, and ap 4 are in the AP list of the AP group group2.

Radio management configuration example

Network requirements

As shown in Figure 32, perform the following tasks to configure the 5 GHz radio of the AP:

·     Set the radio type, working channel, and maximum transmit power to 802.11ac, 48, and 19 dBm, respectively.

·     Set the maximum mandatory NSS, maximum supported NSS, multicast NSS, and VHT-MCS index to 2, 3, 2, and 5, respectively.

·     Enable the A-MSDU and A-MPDU aggregation methods to improve network throughput.

Figure 32 Network diagram

 

Configuration procedure

1.     Click the network view tab at the bottom of the page.

2.     From the navigation pane, select Wireless Configuration > Radio Management. You are placed on the Radio Configuration tab.

3.     Access the details page for all AP radio configurations.

4.     Click the edit icon in the operation column for the 5 GHz radio of the AP. You are placed on the Basic tab.

5.     Perform the following tasks in the basic configuration area:

a.     Enable the radio.

b.     Set the radio type to 802.11ac (5GHz).

c.     Set the channel to 48.

d.     Set the maximum transmit power to 19 dBm.

6.     Perform the following tasks in the rates configuration area:

a.     Set the maximum mandatory NSS to 2.

b.     Set the maximum supported NSS to 3.

c.     Set the multicast NSS to 2.

d.     Set the VHT-MCS index to 5.

7.     Perform the following tasks in the 802.11n/802.11ac configuration area:

a.     Enable the A-MSDU aggregation method.

b.     Enable the A-MPDU aggregation method.

8.     Apply the configuration.

Verifying the configuration

# Access the Wireless Configuration > Radio Management > Radio Configuration page to verify that the configuration is correct.

Scheduled radio shutdown configuration example

Network requirements

As shown in Figure 34, the AP connects to the AC through the switch. Configure the system to shut down radio 1 on the AP during non-working hours (including weekends and 00:00-08:00 and 22:00-24:00 on working days).

Figure 33 Network diagram

 

Configuration procedure

1.     Configure a wireless service:

a.     Click the network view tab at the bottom of the page.

b.     From the navigation pane, select Wireless Configuration > Wireless Networks.

c.     Add a wireless service:

-     Create a wireless service named service.

-     Set the SSID to service.

-     Enable the wireless service.

2.     Configure the AP:

a.     From the navigation pane, select AP Management. You are placed on the AP tab.

b.     Add and configure the AP:

-     Set the AP name to AP, and configure the AP model and serial number,.

-     Click the wireless service setting tab, and bind the wireless service service to radio 1 of the AP.

3.     Configure scheduled radio shutdown:

a.     From the navigation pane, select Wireless Configuration > Radio Management.

b.     Click the more icon in the scheduled radio shutdown area.

c.     Select radio 1 of the AP.

d.     Add the following periodic time ranges:

-     00:00-08:00 from Monday to Friday.

-     22:00-24:00 from Monday to Friday.

-     00:00-24:00 for Saturday and Sunday.

Verifying the configuration

# Access the Wireless Configuration > Radio Management > Radio Configuration page, and verify that the scheduled shutdown task has been added successfully.

# Verify that the task is in effective during the radio-off time and clients cannot access the WLAN.

# Verify that the radio is in up state if the system time is not within the radio-off time and clients can access the WLAN.

AP configuration file deployment configuration example

Network requirements

As shown in Figure 34, the AP connects to the AC through the switch. Configure the AC to deploy a configuration file to the AP to isolate Client 1 and Client 2.

Figure 34 Network diagram

 

Configuration procedure

1.     Configure the AP to obtain its IP address and the AC's IP address through DHCP, and configure wireless services and radio settings. (Details not shown.)

2.     Edit the AP configuration file, add user isolation commands to the file, and name the file apcfg.txt.

3.     Click the network view tab at the bottom of the page.

4.     From the navigation pane, select Wireless Configuration > AP Management.

5.     On the AP tab, click Edit for the target AP, select map file apcfg.txt for the AP, and then click OK.

Verifying the configuration

Verify that Client 1 and Client 2 can access the Internet, but cannot reach each other.

AP group configuration file deployment configuration example

Network requirements

As shown in Figure 35, the APs connect to the AC through the switch. Add the APs to the same AP group and configure the AC to deploy a configuration file to the AP group to isolate clients associated with the same AP.

Figure 35 Network diagram

 

Configuration procedure

1.     Configure the APs to obtain their IP addresses and the AC's IP address through DHCP, add the APs to the same AP group, and configure wireless services and radio settings. (Details not shown.)

2.     Edit the AP group configuration file, add user isolation configuration commands to the file, and name the file apcfg.txt.

3.     Click the network view tab at the bottom of the page.

4.     From the navigation pane, select Wireless Configuration > AP Management.

5.     Click the AP Groups tab.

6.     Click Edit for the target AP group, select map file apcfg.txt for the AP group, and then click OK.

Verifying the configuration

Verify that Client 1 and Client 2 can access the Internet, but cannot reach each other.

WIPS device classification and countermeasures configuration example

Network requirements

As shown in Figure 36, the sensor connects to the AC through the switch. AP 1 and AP 2 provide wireless services to clients through the SSID abc. Perform the following tasks:

·     Enable WIPS for the sensor.

·     Configure wireless device classification to add the MAC address 000f-1c35-12a5 to the static prohibited device list and the SSID abc to the trusted SSID list.

·     Configure countermeasures to enable WIPS to take countermeasures against potential-external APs and unauthorized clients.

Figure 36 Network diagram

 

Configuration procedure

1.     Click the network view tab at the bottom of the page.

2.     Create a manual AP:

a.     From the navigation pane, select Wireless Configuration > AP Management. You are placed on the AP tab.

b.     Perform the following tasks:

-     Add APs ap1, ap2, and Sensor.

-     Specify the AP models and serial IDs.

-     Bind a wireless service with SSID abc to APs ap1 and ap2.

3.     Configure WIPS:

a.     From the navigation pane, select Wireless Configuration > Wireless Security > WIPS. You are placed on the WIPS tab.

b.     Access the details page for virtual security domain configuration to create the VSD VSD_1.

c.     Access the details page for enabling WIPS to enable WIPS for the AP Sensor and add the AP to the VSD VSD_1.

d.     Access the details page for classification policy configuration to perform the following tasks:

-     Create the classification policy class1.

-     Add the MAC address of Client 2 to the prohibited device list.

-     Add the SSID abc to the trusted SSID list.

e.     Access the details page for countermeasure policy configuration to perform the following tasks:

-     Create the countermeasure policy protect.

-     Configure WIPS to take countermeasures against unauthorized clients and potential-external APs.

f.     Access the modifying VSD page for the VSD VSD_1 to perform the following tasks:

-     Apply the classification policy class1 to the VSD VSD_1.

-     Apply the countermeasure policy protect to the VSD VSD_1.

Verifying the configuration

# Verify that the AP with the MAC address 000f-e223-1616 is classified as a potential-external AP and the client with the MAC address 000f-1c35-12a5 is classified as an unauthorized client.

# Verify that WIPS has taken countermeasures against the unauthorized client with the MAC address 000f-1c35-12a5 and the potential-external AP with the MAC address 000f-e223-1616.

WIPS malformed packet and flood attack detection configuration example

Network requirements

As shown in Figure 37, configure the two APs that connect to the AC through the switch as sensors. Add Sensor 1 and Sensor 2 to the VSD VSD_1. Configure malformed packet detection and flood attack detection to enable WIPS to trigger an alarm when it detects beacon flood attacks or malformed packets with duplicated IE.

Figure 37 Network diagram

 

Configuration procedure

1.     Click the network view tab at the bottom of the page.

2.     Create a manual AP:

a.     From the navigation pane, select Wireless Configuration > AP Management. You are placed on the AP tab.

b.     Create two APs named Sensor 1 and Sensor 2.

c.     Specify the AP models and serial IDs.

3.     Configure WIPS:

a.     From the navigation pane, select Wireless Configuration > Wireless Security > WIPS. You are placed on the WIPS tab.

b.     Access the details page for virtual security domain configuration to create the VSD VSD_1.

c.     Access the details page for enabling WIPS to enable WIPS for the APs Sensor 1 and Sensor 2 and add the APs to the VSD VSD_1.

d.     Access the page for adding an attack detection policy to perform the following tasks:

-     Create an attack detection policy.

-     Enable detection on malformed packets with duplicated IE, and set the quiet time to 50 seconds.

-     Enable beacon flood attack detection, and set the statistics interval, threshold, and quiet time to 100 seconds, 200, and 50 seconds, respectively.

e.     Access the modifying page for the VSD VSD_1 to apply the attack detection policy to the VSD VSD_1.

Verifying the configuration

# Verify that no malformed packets or flood attack messages exist when WIPS does not detect any attacks in the WLAN.

# Verify that the number of malformed packets or flood attack messages is not zero when WIPS detects beacon flood attacks and malformed packets with duplicated IE.

Signature-based attack detection configuration example

Network requirements

As shown in Figure 38, AP 1 and AP 2 provide wireless services for clients through the SSID abc. Enable WIPS for the sensor, and configure a signature to enable WIPS to trigger an alarm when it detects beacon frames whose SSIDs are not abc.

Figure 38 Network diagram

 

Configuration procedure

1.     Click the network view tab at the bottom of the page.

2.     Create a manual AP:

a.     From the navigation pane, select Wireless Configuration > AP Management. You are placed on the AP tab.

b.     Access the page for adding an AP to perform the following tasks:

-     Add APs AP1, AP2, and Sensor.

-     Specify the AP models and serial IDs.

-     Bind a wireless service with SSID abc to APs ap1 and ap2.

3.     Configure WIPS:

a.     From the navigation pane, select Wireless Configuration > Wireless Security > WIPS. You are placed on the WIPS tab.

b.     Access the details page for virtual security domain configuration to create the VSD VSD_1.

c.     Access the details page for enabling WIPS to enable WIPS for the AP Sensor and add the AP to the VSD VSD_1.

d.     Access the details page for signature rule configuration to perform the following tasks:

-     Create signature 1.

-     Configure a subsignature to match beacon frames.

-     Configure a subsignature to match frames whose SSIDs are not abc.

e.     Access the details page for signature policy configuration to perform the following tasks:

-     Create a signature policy named sig1.

-     Bind signature 1 to the signature policy sig1.

-     Set the detection interval, quiet time, and alarm threshold to 5 seconds, 60 seconds, and 60, respectively.

f.     Access the modifying page for the VSD VSD_1 to apply the signature policy sig1 to the VSD VSD_1.

Verifying the configuration

# Verify that the AC receives an alarm from the sensor when the sensor detects the wireless service with the SSID free_wlan.

# Verify that the number of detected messages for packets that match the signature is not zero.

Client rate limiting configuration example

Network requirements

As shown in Figure 39, the AC is in the same network as the AP. Perform the following tasks on the AC:

·     Configure static mode client rate limiting to limit the rate of incoming client traffic.

·     Configure dynamic mode client rate limiting to limit the rate of outgoing client traffic.

Figure 39 Network diagram

 

Configuration procedure

1.     Click the network view tab at the bottom of the page.

2.     Configure a wireless service:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Add a wireless service:

-     Create a wireless service named service.

-     Set the SSID to service.

-     Enable the wireless service.

3.     Configure the AP:

a.     From the navigation pane, select AP Management. You are placed on the AP tab.

b.     Add and configure AP 1:

-     Set the AP name to AP1, configure the AP model and serial number, and then apply the configuration.

-     Click the edit icon in the operation column for AP 1.

-     Click the wireless service setting tab, and bind the wireless service service to radio 1 of AP 1.

4.     Configure client rate limiting:

a.     From the navigation pane, select Wireless Configuration > Wireless QoS. You are placed on the Client Rate Limiting tab.

b.     Click the more icon in the service configuration area.

c.     Select the service name service, and click the edit icon for the wireless service service.

d.     On the edit page, perform the following tasks:

-     Set the limit mode to static mode for inbound traffic.

-     Set the per-client limit rate to 8000 for inbound traffic.

-     Set the limit mode to dynamic mode for outbound traffic.

-     Set the total limit rate to 8000 for outbound traffic.

5.     Enable radio 1 for AP 1:

a.     From the navigation pane, select Wireless Configuration > Radio Management. You are placed on the Radio Configuration tab.

b.     Click the details icon in the all AP radio configuration area.

c.     Select the combination of AP 1 and radio 1, and click the corresponding edit icon.

d.     On the edit page, enable radio 1.

Verifying the configuration

Verify that the download rate and upload rate of each client do not exceed 8 Mbps and 4 Mbps, respectively.

Bandwidth guaranteeing configuration example

Network requirements

As shown in Figure 40, Clients 1, 2, and 3 access the network through the SSIDs research, office, and entertain, respectively.

For the network to operate correctly, guarantee 20% of the bandwidth for the SSID office, 80% for research, and none for entertain.

Figure 40 Network diagram

 

Configuration procedure

1.     Click the network view tab at the bottom of the page.

2.     Configure a wireless service:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Add wireless services:

-     Create wireless services named office, research, and entertain.

-     Set their SSID to office, research, and entertain, respectively.

-     Enable the wireless services.

3.     Configure the AP:

a.     From the navigation pane, select AP Management. You are placed on the AP tab.

b.     Add and configure AP 1:

-     Set the AP name to AP1, configure the AP model and serial number, and then apply the configuration.

-     Click the edit icon in the operation column for AP 1.

-     Click the wireless service setting tab, and bind the wireless services office, research, and entertain to radio 1 of AP 1.

4.     Configure bandwidth guaranteeing:

a.     From the navigation pane, select Wireless Configuration > Wireless QoS.

b.     Click the Bandwidth Guaranteeing tab.

c.     Click the more icon in the AP configuration area.

d.     Select the combination of AP 1 and radio 1, and click the edit icon.

e.     On the edit page, perform the following tasks:

-     Enable bandwidth guaranteeing.

-     Set the guaranteed bandwidth percentage to 20% for the wireless service office.

-     Set the guaranteed bandwidth percentage to 80% for the wireless service research.

5.     Enable radio 1 for AP 1:

a.     From the navigation pane, select Wireless Configuration > Radio Management. You are placed on the Radio Configuration tab.

b.     Click the details icon in the all AP radio configuration area.

c.     Select the combination of AP 1 and radio 1, and click the corresponding edit icon.

d.     On the edit page, enable radio 1.

Verifying the configuration

# View details about AP configuration. Verify that clients accessing WLAN office and WLAN research can obtain a minimum of 20% and 80% of the total bandwidth, respectively. The system does not guarantee bandwidth for clients accessing WLAN entertain.

Shared key authentication configuration example

Network requirements

As shown in Figure 41, the switch functions as a DHCP server to assign IP addresses to the AP and client. Configure shared key authentication to enable the client to access the network by using the WEP key 12345.

Figure 41 Network diagram

 

Configuration procedure

1.     Click the network view tab at the bottom of the page.

2.     Configure a wireless service:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Add a wireless service:

-     Create a wireless service named service1.

-     Set the SSID to service.

-     Enable the wireless service.

3.     Click Apply and Set Advanced, and then click the Authentication tab.

4.     Configure static WEP authentication:

¡     Set the security type to static WEP.

¡     Set the key type to Passphrase.

¡     Select the WEP 40 cipher suite.

¡     Set the key to 12345.

5.     Apply the wireless service.

6.     Bind the wireless service service1 to the AP:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Select service1 and click Bind to APs.

c.     Select the 5GHz radio of the AP and click Quick Bind.

Verifying the configuration

View details about the wireless service service1 to verify that the configuration is correct.

PSK authentication and bypass authentication configuration example

Network requirements

As shown in Figure 42, the switch functions as a DHCP server to assign IP addresses to the AP and client.

·     Configure open system authentication and bypass authentication.

·     Configure the client to use the preshared key 12345678 to access the network.

Figure 42 Network diagram

 

Configuration procedure

1.     Click the network view tab at the bottom of the page.

2.     Configure a wireless service:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Add a wireless service:

-     Create a wireless service named service1.

-     Set the SSID to service.

-     Enable the wireless service.

3.     Click Apply and Set Advanced, and then click the Authentication tab.

4.     Configure static PSK authentication:

¡     Set the security type to static PSK.

¡     Set the security mode to WPA.

¡     Select the CCMP cipher suite.

¡     Set the key type to Passphrase and the key to 12345678.

5.     Apply the wireless service.

6.     Bind the wireless service service1 to the AP:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Select service1 and click Bind to APs.

c.     Select the 5GHz radio of the AP and click Quick Bind.

Verifying the configuration

View details about the wireless service service1 to verify that the configuration is correct.

PSK authentication and MAC authentication configuration example

Network requirements

As shown in Figure 43, the switch functions as a DHCP server to assign IP addresses to the AP and client.

·     Configure open system authentication and MAC authentication for clients.

·     Configure the client to use the preshared key 12345678 to access the network.

Figure 43 Network diagram

 

Configuration procedure

1.     On the RADIUS server, configure the client's MAC address as the username and password used for authentication. The MAC address cannot contain hyphens and upper case letters.

2.     Configure the RADIUS server correctly to provide authentication, authorization, and accounting functions.

3.     Configure RADIUS and an authentication domain.

4.     Click the network view tab at the bottom of the page.

5.     Configure a wireless service:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Add a wireless service:

-     Create a wireless service named service1.

-     Set the SSID to service.

-     Enable the wireless service.

6.     Click Apply and Set Advanced, and then click the Authentication tab.

7.     Configure static PSK authentication and MAC authentication:

¡     Set the security type to static PSK and select MAC authentication.

¡     Set the security mode to WPA.

¡     Select the CCMP cipher suite.

¡     Set the key type to Passphrase and the key to 12345678.

¡     Set the domain name to dom1.

8.     Apply the wireless service.

9.     Bind the wireless service service1 to the AP:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Select service1 and click Bind to APs.

c.     Select the 5GHz radio of the AP and click Quick Bind.

Verifying the configuration

View details about the wireless service service1 to verify that the configuration is correct.

802.1X RADIUS authentication configuration example

Network requirements

As shown in Figure 44, configure the AC to meet the following requirements:

·     Use the RADIUS server to perform authentication, authorization, and accounting for 802.1X users.

·     Authenticate all 802.1X users who access the AC through GigabitEthernet 1/0/1 in the ISP domain dm1X.

·     Use MAC-based access control on GigabitEthernet 1/0/1 to authenticate all 802.1X users on the port separately.

·     Exclude domain names from the usernames sent to the RADIUS server.

·     Use name as the authentication and accounting shared keys for secure RADIUS communication between the AC and the RADIUS server.

·     Use ports 1812 and 1813 for authentication and accounting, respectively.

Figure 44 Network diagram

 

Configuration procedure

1.     Assign an IP address to each interface, as shown in Figure 44. (Details not shown.)

2.     On the AC, click the system view tab at the bottom of the page.

3.     Configure a RADIUS scheme on the AC:

a.     From the navigation pane, select Network Security > Authentication.

b.     Click the RADIUS tab.

c.     Add and configure a RADIUS scheme:

-     Set the name of the RADIUS scheme to 802.1X.

-     Configure the primary authentication server: set its IP address to 10.1.1.1, set the port number to 1812, set the shared key to name, and set the state to Active.

-     Configure the primary accounting server: set its IP address to 10.1.1.1, set the port number to 1813, set the shared key to name, and set the state to Active.

-     Set the format of usernames sent to the RADIUS server to Excludes the domain name.

4.     Configure an ISP domain on the AC:

a.     Click the ISP domains tab.

b.     Add and configure an ISP domain:

-     Set the domain name to dm1X.

-     Set the ISP domain state to Active.

-     Set the service type to LAN access.

-     Set the method and scheme for authentication, authorization, and accounting to RADIUS and 802.1X, respectively.

5.     Configure 802.1X on the AC:

a.     From the navigation pane, select Access Control. You are placed on the 802.1X tab.

b.     Enable 802.1X globally.

c.     Enable 802.1X on GigabitEthernet 1/0/1, and specify MAC-based access control.

d.     Access the advanced settings configuration page for GigabitEthernet 1/0/1 to perform the following tasks:

-     Set the authorization state to Auto.

-     Set the mandatory authentication domain to dm1X.

6.     Configure the RADIUS server:

¡     Add a user account on the server. (Details not shown.)

¡     Configure the authentication, authorization, and accounting settings. (Details not shown.)

Verifying the configuration

1.     Access the Network Security > Authentication > RADIUS page to verify brief information of the RADIUS scheme 802.1X.

2.     Access the Network Security > Authentication > ISP Domains page to verify brief information of the ISP domain dm1X.

3.     Verify that the use can come online:

a.     Use the configured username and password to log in.

b.     Access the Network Security > Access Control > 802.1X page to verify that the number of online users is 1 on GigabitEthernet 1/0/1.

802.1X local authentication configuration example

Network requirements

As shown in Figure 45, add a user account with the username dotuser and password 12345 on the AC. Configure the AC to meet the following requirements:

·     Perform local 802.1X authentication to control the network access of users on GigabitEthernet 1/0/1.

·     Authenticate the users in the ISP domain abc.

·     Specify port-based access control on GigabitEthernet 1/0/1. After a user passes authentication on the port, all subsequent users can access the network without authentication.

Figure 45 Network diagram

 

Configuration procedure

1.     Assign an IP address to each interface, as shown in Figure 45. (Details not shown.)

2.     Click the system view tab at the bottom of the page.

3.     Configure a local user:

a.     From the navigation pane, select Network Security > User Management. You are placed on the Local Users tab.

b.     Add and configure a local user:

-     Set the username to dotuser.

-     Set the password to 12345.

-     Set the service type to LAN access.

4.     Configure an ISP domain:

a.     From the navigation pane, select Authentication. You are placed on the ISP Domains tab.

b.     Add and configure an ISP domain:

-     Set the ISP domain name to abc.

-     Set the ISP domain state to Active.

-     Set the service type to LAN access.

-     Configure the ISP domain to use local method for authentication and authorization of LAN users, and not perform accounting for LAN users.

5.     Configure 802.1X:

a.     From the navigation pane, select Access Control. You are placed on the 802.1X tab.

b.     Enable 802.1X globally.

c.     Enable 802.1X on GigabitEthernet 1/0/1, and specify port-based access control.

d.     Access the advanced settings configuration page for GigabitEthernet 1/0/1 to perform the following tasks:

-     Set the authorization state to Auto.

-     Set the mandatory authentication domain to abc.

Verifying the configuration

1.     Access the Network Security > User Management > Local Users page to verify the configuration of the local user dotuser.

2.     Access the Network Security > Authentication > ISP Domains page to verify brief information of the ISP domain abc.

3.     Verify that the use can come online:

a.     Use the configured username and password to log in.

b.     Access the Network Security > Access Control > 802.1X page to verify that the number of online users is 1 on GigabitEthernet 1/0/1.

802.1X AKM configuration example

Network requirements

As shown in Figure 46, the switch functions as a DHCP server to assign IP addresses to the AP and client.

·     Configure open system authentication and 802.1X authentication so that the client can access the network by using the login username abcdef and password 123456.

·     Configure 802.1X as the AKM mode.

Figure 46 Network diagram

 

Configuration procedure

1.     Configure the username abcdef and the password 123456 on the RADIUS server and make sure the RADIUS server and AC can reach each other. (Details not shown.)

2.     Configure RADIUS and an authentication domain.

3.     Click the network view tab at the bottom of the page.

4.     Configure a wireless service:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Add a wireless service:

-     Create a wireless service named service1.

-     Set the SSID to service.

-     Enable the wireless service.

5.     Click Apply and Set Advanced, and then click the Authentication tab.

6.     Configure 802.1X authentication:

¡     Set the security type to 802.1X authentication.

¡     Set the security mode to WPA.

¡     Select the CCMP cipher suite.

¡     Set the domain name to dom1.

7.     Apply the wireless service.

8.     Bind the wireless service service1 to the AP:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Select service1 and click Bind to APs.

c.     Select the 5GHz radio of the AP and click Quick Bind.

Verifying the configuration

# View details about the wireless service service1 to verify that the configuration is correct.

Direct IPv4 portal authentication configuration example

Network requirements

As shown in Figure 47, the AP directly forwards user traffic from the client. The client is assigned with a public IP address either manually or through DHCP. A portal server acts as both a portal authentication server and a portal Web server. A RADIUS server acts as the authentication/accounting server.

Configure direct portal authentication, so the client can access only the portal Web server before passing the authentication and access Internet resources after passing the authentication.

Figure 47 Network diagram

 

Configuration procedures

1.     Configure IP addresses for the client, AC, and servers as shown in Figure 47 and make sure they can reach each other.

2.     Configure the RADIUS server correctly to provide authentication and accounting functions.

3.     Configure the AP to make sure the AP can communicate with the AC.

4.     Configure RADIUS and an authentication domain.

·     Configure a wireless service:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Add a wireless service:

-     Create a wireless service named service1.

-     Set the SSID to service.

-     Enable the wireless service.

5.     Configure the portal authentication mode:

a.     Click the edit icon for wireless service service1.

The advanced settings page opens.

b.     Click the Authentication tab.

c.     Select IPv4 Portal Authentication.

d.     Set the domain name to dm1.

e.     Set the server URL to newpt.

f.     Set the BAS-IP to 192.168.0.110.

g.     Click Apply.

6.     Bind the wireless service1 to the AP:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Select service1 and click Bind to APs.

c.     Select the 5GHz radio of the AP and click Bind.

The Bind to AP window opens.

d.     Enter 2 in the Bound VLAN field.

e.     Click Apply.

Verifying the configuration

# View details about the service service1 to verify that the configuration is correct.

WLAN RRM DFS configuration example

Network requirements

As shown in Figure 48, configure auto-DFS to adjust channels for the APs when a channel adjustment trigger condition is met.

Figure 48 Network diagram

 

Configuration procedure

1.     Click the network view tab at the bottom of the page.

2.     Specify a working channel for each AP:

a.     From the navigation pane, select Wireless Configuration > Radio Management. You are placed on the Radio Configuration tab.

b.     Access the details page for radio configuration and set the working channel to Auto unlock for AP 1, AP 2, and AP 3.

3.     Configure auto-DFS:

a.     From the navigation pane, select Wireless Configuration > Radio Management.

b.     Click the RRM tab.

c.     Access the details page for AP configuration, and enable auto-DFS for AP 1, AP 2, and AP 3.

Verifying the configuration

# Access the Monitoring > RF Monitoring > RRM page. Verify that the working channels for the APs change when a channel adjustment trigger condition is met and the calibration interval is reached.

WLAN RRM TPC configuration example

Network requirements

As shown in Figure 49, configure auto-TPC and set the neighbor number threshold as 3 to enable the AC to perform auto-TPC when AP 4 joins. Enable only radio 1 on each AP.

Figure 49 Network diagram

 

Configuration procedure

1.     Click the network view tab at the bottom of the page.

2.     Disable power lock for the APs:

a.     From the navigation pane, select Wireless Configuration > Radio Management. You are placed on the Radio Configuration tab.

b.     Access the details page for radio configuration to disable power lock for AP 1, AP 2, AP 3, and AP 4.

3.     Configure auto-TPC:

a.     From the navigation pane, select Wireless Configuration > Radio Management.

b.     Click the RRM tab.

c.     Access the details page for AP configuration, and enable auto-TPC for AP 1, AP 2, AP 3, and AP 4.

Verifying the configuration

# On the Monitoring > RF Monitoring > RRM page, verify that the power values for the APs change when the power adjustment threshold and the calibration interval are reached.

WLAN RRM bandwidth adjustment configuration example

Network requirements

As shown in Figure 50, to ensure service quality for clients, configure the AC to adjust radio bandwidth automatically when the number of adjacent radios reaches the limit.

Figure 50 Network diagram

 

Configuration procedure

1.     Click the network view tab at the bottom of the page.

2.     From the navigation pane, select Wireless Configuration > Radio Management. You are placed on the Radio Configuration tab.

3.     Click the RRM tab.

4.     Enable global bandwidth adjustment.

5.     Click the more icon for fast adjustment, and set the adjustment interval to 10 minutes.

Verifying the configuration

# On the Wireless Configuration > Radio Management > RRM page, click the more icon for AP RRM configuration.

# Verify that radio bandwidth is adjusted when the number of adjacent radios reaches the threshold.

Session-mode load balancing configuration example

Network requirements

As shown in Figure 51, AP 1 and AP 2 are managed by the AC and the clients can discover the APs.

Configure the AC to perform session-mode load balancing on AP 1 and AP 2 when the following conditions are met:

·     The number of sessions on one AP reaches 3.

·     The session gap between the APs reaches 2.

Figure 51 Network diagram

 

Configuration procedure

1.     Click the network view tab at the bottom of the page.

2.     Configure a wireless service:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Add a wireless service:

-     Create a wireless service named service.

-     Set the SSID to session-balance.

-     Enable the wireless service.

3.     Configure the APs:

a.     From the navigation pane, select AP Management. You are placed on the AP tab.

b.     Add and configure AP 1:

-     Set the AP name to AP1, configure the AP model and serial number, and then apply the configuration.

-     Click the edit icon in the operation column for AP 1.

-     Click the wireless service setting tab, and bind the wireless service service to radio 2 of AP 1.

c.     Add and configure AP 2 in the same way AP 1 is added and configured.

4.     Configure load balancing:

a.     From the navigation pane, select Wireless Configuration > Radio Management.

b.     Click the Load Balancing tab.

c.     Access the details page for global configuration to perform the following tasks:

-     Enable load balancing.

-     Select Session Mode.

-     Set the session threshold to 3 and the session gap to 2.

Verifying the configuration

# Connect clients 2, 3, and 4 to radio 2 of AP 2, connect client 1 to radio 2 of AP 1, and then try to connect client 5 to AP 2.

# Verify that AP 2 rejects client 5 and client 5 can access the WLAN only from AP 1.

# On the Monitoring > Clients page, verify that AP 1 and AP 2 are load balanced.

Traffic-mode load balancing configuration example

Network requirements

As shown in Figure 52, AP 1 and AP 2 are managed by the AC and the clients can discover the APs. The maximum bandwidth for each AP is 250 Mbps. Configure 2.4 GHz radios on the APs to operate in 802.11gn mode.

Configure the AC to perform traffic-mode load balancing on AP 1 and AP 2 when the following conditions are met:

·     The traffic on one AP reaches 50 Mbps (20% of the maximum bandwidth).

·     The traffic gap between the APs reaches 25 Mbps (10% of the maximum bandwidth).

Figure 52 Network diagram

 

Configuration procedure

1.     Click the network view tab at the bottom of the page.

2.     Configure a wireless service:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Add a wireless service:

-     Create a wireless service named service.

-     Set the SSID to traffic-balance.

-     Enable the wireless service.

3.     Configure the APs:

a.     From the navigation pane, select AP Management. You are placed on the AP tab.

b.     Add and configure AP 1:

-     Set the AP name to AP1, configure the AP model and serial number, and then apply the configuration.

-     Click the edit icon in the operation column for AP 1.

-     Click the wireless service setting tab, and bind the wireless service service to radio 2 of AP 1.

c.     Add and configure AP 2 in the same way AP 1 is added and configured.

4.     Configure load balancing:

a.     From the navigation pane, select Wireless Configuration > Radio Management.

b.     Click the Load Balancing tab.

c.     Access the details page for global configuration to perform the following tasks:

-     Enable load balancing.

-     Select Traffic Mode.

-     Set the traffic threshold to 20 and the traffic gap to 10.

Verifying the configuration

# Verify that the AC performs session-mode load balancing for AP 1 and AP 2 when the following conditions are met:

·     The traffic of radio 2 on AP 1 reaches 50 Mbps.

·     The traffic gap between the APs reaches 25 Mbps.

# On the Monitoring > Clients page, verify that AP 1 and AP 2 are load balanced.

Bandwidth-mode load balancing configuration example

Network requirements

As shown in Figure 53, AP 1 and AP 2 are managed by the AC and the clients can discover the APs.

Configure the AC to perform bandwidth-mode load balancing on AP 1 and AP 2 when the following conditions are met:

·     The bandwidth of one AP reaches 12 Mbps.

·     The bandwidth gap between the APs reaches 3 Mbps.

Figure 53 Network diagram

 

Configuration procedure

1.     Click the network view tab at the bottom of the page.

2.     Configure a wireless service:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Add a wireless service:

-     Create a wireless service named service.

-     Set the SSID to bandwidth-balance.

-     Enable the wireless service.

3.     Configure the APs:

a.     From the navigation pane, select AP Management. You are placed on the AP tab.

b.     Add and configure AP 1:

-     Set the AP name to AP1, configure the AP model and serial number, and then apply the configuration.

-     Click the edit icon in the operation column for AP 1.

-     Click the SSID setting tab, and bind the wireless service service to radio 2 of AP 1.

c.     Add and configure AP 2 in the same way AP 1 is added and configured.

4.     Configure load balancing:

a.     From the navigation pane, select Wireless Configuration > Radio Management.

b.     Click the Load Balancing tab.

c.     Access the details page for global configuration to perform the following tasks:

-     Enable load balancing.

-     Select Bandwidth Mode.

-     Set the bandwidth threshold to 12 and the bandwidth gap to 3.

Verifying the configuration

# Verify that the AC performs bandwidth-mode load balancing for AP 1 and AP 2 when the following conditions are met:

·     The bandwidth of radio 2 on AP 1 reaches 12 Mbps.

·     The bandwidth gap between the APs reaches 3 Mbps.

# On the Monitoring > Clients page, verify that AP 1 and AP 2 are load balanced.

Session-mode load balancing configuration example for a load balancing group

Network requirements

As shown in Figure 54, AP 1, AP 2, and AP 3 are managed by the AC and the clients can discover the APs.

Configure the AC to perform session-mode load balancing on radio 2 of AP 1 and radio 2 of AP 2 when the following conditions are met:

·     The number of sessions on one radio reaches 3.

·     The session gap between the radios reaches 2.

Figure 54 Network diagram

 

Configuration procedure

1.     Click the network view tab at the bottom of the page.

2.     Configure a wireless service:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Add a wireless service:

-     Create a wireless service named service.

-     Set the SSID to session-balance.

-     Enable the wireless service.

3.     Configure the APs:

a.     From the navigation pane, select AP Management. You are placed on the AP tab.

b.     Add and configure AP 1:

-     Set the AP name to AP1, configure the AP model and serial number, and then apply the configuration.

-     Click the edit icon in the operation column for AP 1.

-     Click the wireless service setting tab, and bind the wireless service service to radio 2 of AP 1.

c.     Add and configure AP 2 and AP 3 in the same way AP 1 is added and configured.

4.     Configure load balancing:

a.     From the navigation pane, select Wireless Configuration > Radio Management.

b.     Click the Load Balancing tab.

c.     Access the details page for global configuration to perform the following tasks:

-     Enable load balancing.

-     Select Session Mode.

-     Set the session threshold to 3 and the session gap to 2.

d.     Access the details page for load balancing group configuration to perform the following tasks:

-     Create a load balancing group.

-     Bind radio 2 of AP 1 and AP 2 to the load balancing group.

Verifying the configuration

# Connect clients 3, 4, and 5 to radio 2 of AP 2, connect client 1 to radio 2 of AP 1, and then try to connect client 6 to AP 2.

# Verify that AP 2 rejects client 6 and client 6 can access the WLAN only from AP 1.

# On the Monitoring > Clients page, verify that AP 1 and AP 2 are load balanced.

Traffic-mode load balancing configuration example for a load balancing group

Network requirements

As shown in Figure 55, AP 1, AP 2, and AP 3 are managed by the AC and the clients can discover the APs. The maximum bandwidth for each AP is 250 Mbps. Configure 2.4 GHz radios on the APs to operate in 802.11gn mode.

Configure the AC to perform traffic-mode load balancing on radio 2 of AP 1 and radio 2 of AP 2 when the following conditions are met:

·     The traffic of one radio reaches 50 Mbps (20% of the maximum bandwidth).

·     The traffic gap between the radios reaches 25 Mbps (10% of the maximum bandwidth).

Figure 55 Network diagram

 

Configuration procedure

1.     Click the network view tab at the bottom of the page.

2.     Configure a wireless service:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Add a wireless service:

-     Create a wireless service named service.

-     Set the SSID to traffic-balance.

-     Enable the wireless service.

3.     Configure the APs:

a.     From the navigation pane, select AP Management. You are placed on the AP tab.

b.     Add and configure AP 1:

-     Set the AP name to AP1, configure the AP model and serial number, and then apply the configuration.

-     Click the edit icon in the operation column for AP 1.

-     Click the wireless service setting tab, and bind the wireless service service to radio 2 of AP 1.

c.     Add and configure AP 2 and AP 3 in the same way AP 1 is added and configured.

4.     Configure load balancing:

a.     From the navigation pane, select Wireless Configuration > Radio Management.

b.     Click the Load Balancing tab.

c.     Access the details page for global configuration to perform the following tasks:

-     Enable load balancing.

-     Select Traffic Mode.

-     Set the traffic threshold to 20 and the traffic gap to 10.

d.     Access the details page for load balancing group configuration to perform the following tasks:

-     Create a load balancing group.

-     Bind radio 2 of AP 1 and AP 2 to the load balancing group.

Verifying the configuration

# Verify that the AC performs traffic-mode load balancing for radio 2 of AP 1 and radio 2 of AP 2 when the following conditions are met:

·     The traffic of radio 2 on AP 1 reaches 50 Mbps.

·     The traffic gap between the radios reaches 25 Mbps.

# On the Monitoring > Clients page, verify that AP 1 and AP 2 are load balanced.

Bandwidth-mode load balancing configuration example for a load balancing group

Network requirements

As shown in Figure 56, AP 1, AP 2, and AP 3 are managed by the AC and the clients can discover the APs.

Configure the AC to perform bandwidth-mode load balancing on radio 2 of AP 1 and radio 2 of AP 2 when the following conditions are met:

·     The bandwidth of one radio reaches 12 Mbps.

·     The bandwidth gap between the radios reaches 3 Mbps.

Figure 56 Network diagram

 

Configuration procedure

1.     Click the network view tab at the bottom of the page.

2.     Configure a wireless service:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Add a wireless service:

-     Create a wireless service named service.

-     Set the SSID to bandwidth-balance.

-     Enable the wireless service.

3.     Configure the APs:

a.     From the navigation pane, select AP Management. You are placed on the AP tab.

b.     Add and configure AP 1:

-     Set the AP name to AP1, configure the AP model and serial number, and then apply the configuration.

-     Click the edit icon in the operation column for AP 1.

-     Click the wireless service setting tab, and bind the wireless service service to radio 2 of AP 1.

c.     Add and configure AP 2 and AP 3 in the same way AP 1 is added and configured.

4.     Configure load balancing:

a.     From the navigation pane, select Wireless Configuration > Radio Management.

b.     Click the Load Balancing tab.

c.     Access the details page for global configuration to perform the following tasks:

-     Enable load balancing.

-     Select Bandwidth Mode.

-     Set the bandwidth threshold to 12 and the bandwidth gap to 3.

d.     Access the details page for load balancing group configuration to perform the following tasks:

-     Create a load balancing group.

-     Bind radio 2 of AP 1 and AP 2 to the load balancing group.

Verifying the configuration

# Verify that the AC performs bandwidth-mode load balancing for radio 2 of AP 1 and radio 2 of AP 2 when the following conditions are met:

·     The bandwidth of radio 2 of AP 1 reaches 12 Mbps.

·     The bandwidth gap between the radios reaches 3 Mbps. (Details not shown.)

# On the Monitoring > Clients page, verify that AP 1 and AP 2 are load balanced.

Band navigation configuration example

Network requirements

As shown in Figure 57, both the 5 GHz radio and the 2.4 GHz radio are enabled on the AP. Configure band navigation for band navigation to load balance the radios.

Figure 57 Network diagram

 

Configuration procedure

1.     Click the network view tab at the bottom of the page.

2.     Configure a wireless service:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Access the page for adding a wireless network to perform the following tasks:

-     Set the name of the wireless service to service.

-     Set its SSID to band-navigation.

-     Disable fast association.

-     Enable the wireless service.

3.     Configure AP 1:

a.     From the navigation pane, select Wireless Configuration > AP Management.

b.     Click the AP tab.

c.     Access the configuration page for AP 1 and click the wireless service setting tab.

d.     Bind the wireless service service to both the 5 GHz and 2.4 GHz radios of AP 1.

4.     Configure band navigation:

a.     From the navigation pane, select Wireless Configuration > Radio Management.

b.     Click the Band Navigation tab.

c.     Access the details page for global configuration to perform the following tasks:

-     Enable band navigation globally.

-     Set the session threshold to 5.

-     Set the session gap threshold to 2.

d.     Access the band navigation configuration page for AP 1 to enable band navigation for AP 1.

Verifying the configuration

# Verify that clients supporting both 2.4 GHz and 5 GHz prefer to access the 5 GHz radio. (Details not shown.)

# Verify that the system rejects client access requests to the 5 GHz radio when the following conditions are met:

·     The number of online clients on the 5 GHz radio reaches 5.

·     The client quantity gap between the 5 GHz and 2.4 GHz radios reach 2. (Details not shown.)

# On the Monitoring > Clients page, verify that the 5 GHz radio and the 2.4 GHz radio of AP 1 are load balanced.

Wireless locating configuration example

Network requirements

As shown in Figure 58, configure wireless locating on AP 1, AP 2, and AP 3 to locate the MU and the Tag.

Figure 58 Network diagram

 

Configuration procedure

1.     Configure the locating server:

¡     Set the IP addresses of the three APs on the locating server, or configure the locating server to discover APs through broadcast. (Details not shown.)

¡     Configure wireless locating on the locating server. (Details not shown.)

2.     Click the network view tab at the bottom of the page.

3.     Configure a wireless service:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Access the page for adding a wireless service to perform the following tasks:

-     Set the wireless service name to market.

-     Enable the wireless service.

4.     Configure AP 1:

a.     From the navigation pane, select Wireless Configuration > AP Management. You are placed on the AP tab.

b.     Access the page for adding an AP to perform the following tasks:

-     Set the AP name to AP1.

-     Select the AP model WA4320i-ACN.

-     Set the serial ID.

c.     Click the edit icon in the operation column for AP 1 to perform the following tasks:

-     Click the wireless service setting tab.

-     Bind the wireless service market to radio 1 of the AP AP1.

d.     From the navigation pane, select Wireless Configuration > Applications.

e.     Click the Location Aware tab.

f.     Access the details page for global configuration.

g.     Click the Aeroscout configuration tab.

h.     Enable Aeroscout locating.

i.     Access the details page for AP configuration to perform the following tasks:

-     Access the edit page for the AP AP1. You are placed on the Common tab.

-     Enable ignoring beacon frames.

-     Click the Aeroscout tab.

-     Enable AeroScout locating.

-     Enable radio 1.

-     Select both the MU and Tag.

5.     Configure AP 2 and AP 3 in the same way AP 1 is configured.

Verifying the configuration

# Verify that you can view the locating information about the MU and the Tag by using maps, forms, or reports provided by the graphics software. (Details not shown.)

WLAN mesh configuration example

Network requirements

As shown in Figure 59, the MPP connects to the AC through a switch. Configure the MPP, MAP 1, and MAP 2 to use channel 149 and 5 GHz radios in 802.11n mode to establish mesh links for the client to access network resources.

Figure 59 Network diagram

 

Configuration procedure

1.     Click the network view tab at the bottom of the page.

2.     Configure a wireless service:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Create a wireless service named service.

c.     Set the SSID to mesh-network.

d.     Enable the wireless service.

3.     Configure APs:

a.     From the navigation pane, select Wireless Configuration > AP Management.

b.     Create APs named MPP, MAP1, and MAP2.

c.     Specify the AP models and serial IDs.

d.     Bind wireless service service to radio 1 of each AP.

4.     Configure a mesh profile:

a.     From the navigation pane, select Wireless Configuration > Applications.

b.     On the Mesh Services tab, click the Add icon + in the Mesh Profile area.

c.     Set the profile number to 1.

d.     Enable the mesh profile.

e.     Set the mesh ID to 1.

f.     Set the authentication and key management mode to SAE and specify the key to 12345678.

g.     Retain the default settings for the other fields.

5.     Bind the mesh profile to radios:

a.     From the navigation pane, select Wireless Configuration > Applications.

b.     On the Mesh Services tab, click the More icon in the Binding Info area.

c.     Bind mesh profile 1 to MPP, MAP 1, and MAP 2.

6.     Enable probe request suppression for the MPP:

a.     From the navigation pane, select Wireless Configuration > Applications.

b.     On the Mesh Services tab, click the More icon in the Probe Request Suppression area.

c.     Disable probe request suppression for the MPP.

7.     Configure the peer whitelist:

a.     From the navigation pane, select Wireless Configuration > Applications.

b.     On the Mesh Services tab, click the More icon in the Mesh Peer Whitelist area.

c.     Add MPP to the whitelist of MAP 1 and MAP 2 for the MAPs to establish mesh links only with the MPP to avoid loops.

8.     Configure the radio mode and channel:

a.     From the navigation pane, select Wireless Configuration > Radio Management.

b.     Configure the 5 GHz radio on each AP as follows in the Radios for all APs area:

-     Set the radio mode to 802.11n (5 GHz).

-     Set the channel to 149.

-     Enable the radio.

Verifying the configuration

Verify that the client can access the network and you can view mesh link packet statistics from the Web interface.

Multicast optimization configuration example

Network requirements

As shown in Figure 60, the source connected to the AC provides the IPv4 multicast service, and the AP provides wireless services to the clients through SSID service. Configure IPv4 multicast optimization to manage multicast packet forwarding.

Figure 60 Network diagram

 

Configuration procedure

1.     Configure a wireless service:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Create a wireless service named service.

c.     Set the SSID to service.

d.     Enable the wireless service.

2.     Configure the AP:

a.     From the navigation pane, select Wireless Configuration > AP Management.

b.     Create APs named AP1.

c.     Specify the AP model and serial ID.

d.     Bind wireless service service to radio 1 of the AP.

3.     Configure multicast optimization:

a.     From the navigation pane, select Wireless Configuration > Applications.

b.     Click the More icon for IPv4 multicast optimization.

c.     Enable multicast optimization for wireless service service.

d.     Click the Advanced Configuration tab and then perform the following tasks:

-     Set the entry aging time to 300 seconds.

-     Set the entry limit to 1024 and set the entry limit per client to 256.

-     Set the client limit per group to 2 and set the action to drop multicast packets.

-     Configure the device to learn a maximum of 100 IGMP packets every 60 seconds.

Verifying the configuration

# Connect Client 1, Client 2, and Client 3 to the WLAN service with SSID service.

# Send IGMP reports from Client 1 and Client 2 to join the IPv4 multicast group that the source uses to forward IPv4 multicast data. Both Client 1 and Client 2 can receive the IPv4 multicast data.

# Send an IGMP report from Client 3 to join the IPv4 multicast group. None of the clients can receive the IPv4 multicast data.

Network security configuration examples

BYOD configuration example

Network requirements

As shown in Figure 61, perform the following tasks for the AC to perform 802.1X authentication on the client:

·     Set the username and password for 802.1X authentication to dotuser and 12345, respectively.

·     Set the authentication method to open system for the AC to perform local authentication and authorization for the client, and set the authentication domain name to abc.

·     Allow the client that runs Microsoft Windows 8 to access VLAN 3 after passing the authentication.

Figure 61 Network diagram

 

Configuration procedure

1.     Assign an IP address to each interface. (Details not shown.)

2.     Click the network view tab at the bottom of the page.

3.     Configure a wireless service:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Access the page for adding a wireless service to perform the following tasks:

-     Set the wireless service name to service1.

-     Set the SSID to service.

-     Enable the wireless service.

4.     Configure 802.1X:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Access the advanced settings configuration page for the wireless service service1 to perform the following tasks:

-     Set the security type to 802.1X authentication.

-     Set the security mode to WPA.

-     Select the CCMP cipher suite.

-     Set the domain name.

5.     Bind the wireless service to the AP:

a.     From the navigation pane, select Wireless Configuration > Wireless Networks.

b.     Select the wireless service service1, and click the bind to APs button.

c.     Select the 5 GHz radio of the AP, and then click the quick bind button.

6.     Configure an ISP domain:

a.     From the navigation pane, select Network Security > Authentication. You are placed on the ISP Domains tab.

b.     Add an ISP domain, and then set its state to active.

c.     Set the service type to LAN Access.

d.     Set the authentication, authorization, and accounting methods to Local, Local, and None, respectively.

7.     Configure a local user:

a.     From the navigation pane, select Network Security > User Management. You are placed on the Local Users tab.

b.     Click User groups.

c.     Click the add icon.

d.     Add a user group named windows8.

e.     Click Apply.

f.     On the Local Users tab, click Users.

g.     Click the add icon.

h.     Add a user named dotuser, and then set the password to 12345.

i.     Set the service type to LAN Access.

j.     Specify the user group windows8.

k.     Click Apply.

8.     Configure BYOD authorization:

a.     From the navigation pane, select Network Security > BYOD.

b.     Click the BYOD Authorization tab.

c.     Set the terminal type to Microsoft Windows 8.

d.     Set the ACL number to 2000.

e.     Set the authorization VLAN to VLAN 3.

f.     Click Apply.

9.     Configure BYOD rules:

a.     From the navigation pane, select Network Security > BYOD. You are placed on the BYOD Rules tab.

b.     Add a DHCP rule:

-     Set the DHCP Option 55 value to 1,15,3,6,44,46,47,31,33,121,249,252,43.33.

-     Set the terminal type to Microsoft Windows 8.

Verifying the configuration

# Verify that the client can access the resources in VLAN 3 after passing 802.1X authentication.

Guest management configuration example

Network requirements

Configure guest management on the AC as follows:

·     Create a guest account user1 for Jack, and set the password, user group, personal profiles, validity period, and receptionist information.

·     Configure the SMTP server address, sender address, and guest administrator's email address that are used to send emails.

·     Configure the subject and contents of the Emails to be sent to the guest, receptionist, and guest administrator.

·     Configure the system to automatically delete expired guest accounts.

Figure 62 Network diagram

 

Configuration procedures

1.     Configure IP addresses for interfaces. (Details not shown.)

2.     Configure wireless services. (Details not shown.)

3.     Add a guest account:

a.     Click the network view tab at the bottom of the page.

b.     From the navigation pane, select Network Security > Guest Management.

c.     On the Guest List tab, click the add icon.

d.     On the Add Guest page, perform the following tasks:

-     Set the account and password to user1 and 123456, respectively.

-     Select a group for the guest.

-     Enter the full name, company, Email address, phone number, and description of the guest.

-     Enter the sponsor's full name, department, and Email address.

-     Set the validity period.

4.     Configure the guest service parameters:

a.     Click the network view tab at the bottom of the page.

b.     From the navigation pane, select Network Security > Guest Management.

c.     Click the Guest Configuration tab.

d.     Select Auto delete.

e.     Set the SMTP server address to smtp://192.168.0.112/smtp.

f.     Set the email sender address to mailto:bbb@ccc.com.

g.     Set the guest manager email address to mailto:guest-manager@ccc.com.

h.     Set the subject of notifications to guests to Guest account information, and set the body to A guest account has been created for your use. The username, password, and valid dates for the account are given below..

i.     Set the subject of notifications to guest managers to Guest register information, and set the body to A guest account has been registered. The username for the account is given below. Please approve the register information..

j.     Set the subject of notifications to guest sponsors to Guest account information, and set the body to A guest account has been created. The username, password, and valid dates for the account are given below..

Verifying the configuration

# Verify that guest Jack can access the network after passing local authentication by using username user1 and password 123456.

# Verify that guests, guest managers, and guest sponsors can receive notifications with the specified subject and body upon guest creations.

# Verify that the system can delete expired guest accounts automatically.

Tools configuration examples

Local packet capture configuration example

Network requirements

As shown in Figure 63, enable local packet capture on radio 1 of the AP to capture 1 KB of TCP packets sourced from 192.168.20.173. The switch acts as the FTP server for storing the captured packets sent by the AP.

Figure 63 Network diagram

 

Restrictions and guidelines

Make sure the PC installed with the packet capture software and the AP can reach each other.

Configuration procedure

1.     Configure the switch:

a.     Create a device management user named abc.

b.     Set the password for the user to 123456.

c.     Specify the user role for the user as network-admin.

d.     Specify the working directory flash:/ for the user.

e.     Specify the service type for the user as ftp.

f.     Enable the FTP server on the switch.

2.     Configure local packet capture:

a.     Click the network view tab at the bottom of the page.

b.     From the navigation pane, select Tools > Wireless Capture.

c.     Select radio 1 of the AP.

d.     Configure wireless capture:

-     Select the local packet capture mode.

-     Specify the capture filter as src 192.168.20.173 and tcp.

-     Set the maximum frame size to 8000 bytes.

-     Set the file size to 1 KB.

-     Set the FTP URL to ftp://10.1.1.1.

-     Set the FTP username to abc.

-     Set the FTP password to 123456.

Verifying the configuration

# Verify that the captured packets can be displayed on the PC after the packet capture software is connected to the FTP server.

Remote packet capture configuration example

Network requirements

As shown in Figure 64, enable remote packet capture on radio 1 of the AP and use packet capture software to display the captured packets.

Figure 64 Network diagram

 

Configuration procedure

IMPORTANT

IMPORTANT:

Make sure the packet capture software and the AP can reach each other.

 

1.     Configure remote packet capture:

a.     Click the network view tab at the bottom of the page.

b.     From the navigation pane, select Tools > Wireless Capture.

c.     Select radio 1 of the AP.

d.     Select the remote packet capture mode.

e.     Set the RPCAP port to 2014.

2.     Display captured packets on the PC:

a.     Start packet capture software and select Capture > Options.

b.     Select Remote from the Interface list.

c.     Enter the IP address 10.1.1.1 and the port number 2014, and click OK.

d.     Click Start.

The captured packets are displayed on the page that appears.

Figure 65 Displaying the captured packets on the packet capture software

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网