03-WLAN Configuration Guides

HomeSupportConfigure & DeployConfiguration GuidesH3C Unified Wired and Wireless Access Controller User Manual (R5456Pxx)-6W10003-WLAN Configuration Guides
03-WLAN access configuration
Title Size Download
03-WLAN access configuration 577.06 KB

Contents

Configuring WLAN access· 1

About WLAN access· 1

WLAN access process· 1

Scanning· 1

Association· 3

Client access control 3

AP group-based access control 3

SSID-based access control 4

Whitelist- and blacklist-based access control 5

ACL-based access control 5

Restrictions and guidelines: WLAN access configuration· 6

WLAN access tasks at a glance· 6

Configuring wireless services· 7

Configuring a service template· 7

Configuring a description for a service template· 7

Setting an SSID·· 8

Setting the maximum number of associated clients on a radio for a service template· 8

Enabling a service template· 9

Binding a service template to a radio· 9

Configuring an AP to not inherit the specified service template from the AP group· 10

Configuring client data forwarding· 10

Enabling client traffic forwarding· 10

Specifying the method for APs to process traffic from unknown clients· 11

Configuring client management 11

Enabling quick association· 11

Specifying the Web server to which client information is reported· 11

Enabling generation of client logs in the specified format 12

Setting the VLAN allocation method for clients· 12

Configuring clients to prefer the authorization VLAN after roaming· 13

Enabling immediate client association upon successful local authentication· 13

Setting the idle period before client reauthentication· 14

Configuring differentiated accounting of client traffic· 14

Enabling roaming enhancement 15

Enabling smart client access· 16

Configuring client maintenance· 17

Setting the client idle timeout 17

Configuring client keepalive· 17

Performing a wireless link quality test 18

Configuring client statistics reporting· 18

Setting the NAS ID·· 18

Setting the NAS port type· 19

Configuring client association ratio optimization· 20

Enabling beacon frames and probe responses to carry BSS Load IEs· 20

Specifying an IMC server 21

Configuring client access control 21

Specifying a permitted AP group for client association· 21

Specifying a permitted SSID for client association· 21

Adding a client to the whitelist 22

Adding a client to the static blacklist 22

Configuring the dynamic blacklist 22

Configuring ACL-based access control 23

Configuring SSID hidden for the management Wi-Fi 23

Enabling an AP to respond to specific broadcast probe requests· 24

Enabling SNMP notifications for WLAN access· 24

Display and maintenance commands for WLAN access· 25

WLAN access configuration examples· 26

Example: Configuring WLAN access· 26

Example: Configuring whitelist-based access control 28

Example: Configuring static blacklist-based access control 29

Example: Configuring ACL-based access control 29

 


Configuring WLAN access

About WLAN access

Wireless access is provided by APs deployed at the edge of a wired network. The APs connect to the uplink through wired connections and provide wireless access services to downlink clients.

WLAN access process

A wireless client can access a WLAN only when it completes the scanning, link layer authentication, association, and WLAN authentication processes.

For more information about data link layer authentication and WLAN authentication, see WLAN security and WLAN authentication in the configuration guide, respectively.

Figure 1 WLAN access process

Scanning

Active scanning

A wireless client periodically scans surrounding wireless networks by sending probe requests. It obtains network information from received probe responses. Based on whether a probe request carries an SSID, active scanning can be divided into the following types:

·     Active scanning of all wireless networks.

As shown in Figure 2, the client periodically sends a probe request on each of its supported channels to scan wireless networks. APs that receive the probe request send a probe response that carries the available wireless network information. The client associates with the optimal AP.

Figure 2 Scanning all wireless networks

·     Active scanning of a specific wireless network.

As shown in Figure 3, the client periodically sends a probe request carrying the specified SSID or the SSID of the wireless network it has been associated with. When an AP that can provide wireless services with the specified SSID receives the probe request, it sends a probe response.

Figure 3 Scanning a specific wireless network

Passive scanning

As shown in Figure 4, the clients periodically listen for beacon frames sent by APs on their supported channels to get information about surrounding wireless networks. Then the clients select an AP for association. Passive scanning is used when clients want to save power.

Figure 4 Passive scanning

Association

A client sends an association request to the associated AP after passing date link layer authentication. Upon receiving the request, the AP determines the capability supported by the wireless client and sends an association response to the client. Then the client is associated with the AP.

Client access control

The following client access control methods are available:

·     AP group-based access control—Allows clients associated with APs in the specified AP group to access the WLAN.

·     SSID-based access control—Allows clients associated with the specified SSID to access the WLAN.

·     Whitelist- and blacklist-based access control—Uses the whitelist and blacklists to control client access.

·     ACL-based access control—Uses ACL rules bound to APs or service templates to control client access.

AP group-based access control

As shown in Figure 5, for AP group-based access control, configure AP group 1 as the permitted AP group for Client 1 and Client 2, and configure AP group 2 as the permitted AP group for Client 3.

When a client passes authentication, the server sends the related user profile to the AC. The AC examines whether the AP with which the client associates is in the permitted AP group. If it is, the client is allowed to access the WLAN. If it is not, the AC logs off the client.

Figure 5 AP group-based access control

SSID-based access control

As shown in Figure 6, for SSID-based access control, configure ssida as the permitted SSID for Client 1 and Client 2, and configure ssidb as the permitted SSID for Client 3.

When a client passes authentication, the server sends the related user profile to the AC. The AC examines whether the associated SSID of the client is the permitted SSID. If it is, the client is allowed to access the WLAN. If it is not, the AC logs off the client.

Figure 6 SSID-based access control

Whitelist- and blacklist-based access control

You can configure the whitelist or blacklists to filter frames from clients for client access control.

Whitelist-based access control

The whitelist contains the MAC addresses of all clients allowed to access the WLAN. Frames from clients not in the whitelist are discarded. This list is manually configured.

Blacklist-based access control

The following blacklists are available for access control:

·     Static blacklist—Contains the MAC addresses of clients forbidden to access the WLAN. This list is manually configured.

·     Dynamic blacklist—Contains the MAC addresses of clients forbidden to access the WLAN. An AP adds the MAC address of a client forbidden to access the WLAN to the list when WIPS is configured or when URL redirection is enabled for WLAN MAC authentication clients. The entries in the list are removed when the aging time expires. The dynamic blacklist can take effect on the AC or on APs, depending on the configuration. For more information about WIPS, see WIPS configuration in the configuration guide.

Working mechanism

When an AP receives an association request and sends an Add Mobile message to the AC, the AC performs the following operations to determine whether to permit the client:

1.     Searches the whitelist:

¡     If the client MAC address does not match any entry in the whitelist, the client is rejected.

¡     If a match is found, the client is permitted.

2.     Searches the static and dynamic blacklists if no whitelist entries exist:

¡     If the client MAC address matches an entry in either blacklist, the client is rejected.

¡     If no match is found, or no blacklist entries exist, the client is permitted.

Figure 7 Whitelist- and blacklist-based access control

ACL-based access control

This feature controls client access by using ACL rules bound to an AP or a service template.

Upon receiving an association request from a client, the device performs the following actions:

·     Allows the client to access the WLAN if a match is found and the rule action is permit.

·     Denies the client's access to the WLAN if no match is found or the matched rule has a deny statement.

Restrictions and guidelines: WLAN access configuration

You can configure APs by using the following methods:

·     Configure APs one by one in AP view.

·     Assign APs to an AP group and configure the AP group in AP group view.

·     Configure all APs in global configuration view.

For an AP, the settings made in these views for the same parameter take effect in descending order of AP view, AP group view, and global configuration view.

WLAN access tasks at a glance

To configure WLAN access, perform the following tasks:

3.     Configuring wireless services

¡     Configuring a service template

¡     (Optional.) Configuring a description for a service template

¡     Setting an SSID

¡     (Optional.) Setting the maximum number of associated clients on a radio for a service template

¡     Enabling a service template

¡     Binding a service template to a radio

¡     (Optional.) Configuring an AP to not inherit the specified service template from the AP group

4.     (Optional.) Configuring client data forwarding

¡     Enabling client traffic forwarding

¡     Specifying the method for APs to process traffic from unknown clients

5.     (Optional.) Configuring client management

¡     Enabling quick association

¡     Specifying the Web server to which client information is reported

¡     Enabling generation of client logs in the specified format

¡     Setting the VLAN allocation method for clients

¡     Configuring clients to prefer the authorization VLAN after roaming

¡     Enabling immediate client association upon successful local authentication

¡     Setting the idle period before client reauthentication

¡     Configuring differentiated accounting of client traffic

¡     Enabling roaming enhancement

¡     Enabling smart client access

6.     (Optional.) Configuring client maintenance

¡     Setting the client idle timeout

¡     Configuring client keepalive

¡     Performing a wireless link quality test

¡     Configuring client statistics reporting

¡     Setting the NAS ID

¡     Setting the NAS port type

¡     Configuring client association ratio optimization

¡     Enabling beacon frames and probe responses to carry BSS Load IEs

¡     Specifying an IMC server

7.     (Optional.) Configuring client access control

¡     Specifying a permitted AP group for client association

¡     Specifying a permitted SSID for client association

¡     Adding a client to the whitelist

¡     Adding a client to the static blacklist

¡     Configuring the dynamic blacklist

¡     Configuring ACL-based access control

¡     Configuring SSID hidden for the management Wi-Fi

8.     (Optional.) Enabling an AP to respond to specific broadcast probe requests

9.     (Optional.) Enabling SNMP notifications for WLAN access

Configuring wireless services

Configuring a service template

About this task

A service template defines a set of wireless service attributes, such as SSID and authentication method.

Procedure

10.     Enter system view.

system-view

11.     Create a service template.

wlan service-template service-template-name

By default, no service template exists.

12.     (Optional.) Assign clients coming online through the service template to the specified VLAN.

vlan vlan-id2 [ customer-vlan vlan-id2 ]

By default, clients are assigned VLAN 1 after coming online through a service template.

Configuring a description for a service template

13.     Enter system view.

system-view

14.     Enter service template view.

wlan service-template service-template-name

15.     Configure a description for the service template.

description text

By default, no description is configured for a service template.

Setting an SSID

About this task

APs broadcast SSIDs in beacon frames for clients to discover them. When a BSS is unavailable or when you do not want clients to discover the BSS, you can enable SSID-hidden. With SSID-hidden enabled, the BSS hides its SSID in beacon frames and does not respond to broadcast probe requests. A client must send probe requests with the specified SSID to access the WLAN. This feature can protect the WLAN from being attacked.

When the number of clients associated with an AP reaches the upper limit, the AP automatically hides its SSIDs in beacon frames, and other clients cannot discover and associate with the AP. For these clients to discover the AP, you can configure the SSID broadcast feature. However, these clients still cannot associate with the AP. You can use the display wlan service-template command to display the configured SSID.

Procedure

16.     Enter system view.

system-view

17.     Enter service template view.

wlan service-template service-template-name

18.     Set an SSID for the service template.

ssid ssid-name

To specify an SSID starting with a space, enter the SSID in quotes. For example, you can enter " 12345" to specify the SSID as  12345 (starting with a space).

To specify an SSID starting with a quotation mark ("), attach a backslash (\) to the front of the string. For example, you can enter \"12345 to specify the SSID as "12345.

By default, no SSID is set for a service template.

19.     (Optional.) Enable SSID-hidden in beacon frames.

beacon ssid-hide

By default, beacon frames carry SSIDs.

20.     (Optional.) Enable SSID broadcast in beacon frames.

beacon ssid-advertise

By default, an AP hides SSIDs in beacon frames when the maximum number of associated clients is reached.

Setting the maximum number of associated clients on a radio for a service template

About this task

Perform this task to limit the associated client quantity on a radio to avoid overload. With this feature configured, new clients cannot access the WLAN and the SSID is hidden when the maximum number is reached on a radio.

Procedure

21.     Enter system view.

system-view

22.     Enter service template view.

wlan service-template service-template-name

23.     Set the maximum number of associated clients on a radio for the service template.

client max-count max-number

By default, the number of associated clients on a radio for a service template is not limited.

Enabling a service template

24.     Enter system view.

system-view

25.     Enter service template view.

wlan service-template service-template-name

26.     Enable the service template.

service-template enable

By default, a service template is disabled.

Binding a service template to a radio

About this task

If you bind a service template to a radio, the AP creates a BSS that can provide wireless services defined in the service template.

You can perform the following tasks when binding a service template to a radio:

·     Bind a VLAN group to the radio so that clients associated with the BSS will be assigned evenly to all VLANs in the VLAN group.

·     Bind the NAS port ID or the NAS ID to the radio to identify the network access server.

·     Enable the AP to hide SSIDs in beacon frames.

Restrictions and guidelines

You can bind a maximum of 16 service templates to a radio.

Procedure

27.     Enter system view.

system-view

1.     Enter AP view or an AP group's AP model view.

¡     Enter AP view.

wlan ap ap-name

¡     Execute the following commands in sequence to enter an AP group's AP model view:

wlan ap-group group-name

ap-model ap-model

2.     Enter radio view.

radio radio-id

3.     Bind a service template to the radio.

service-template service-template-name [ vlan vlan-id1 | vlan-group vlan-group-name ] [ ssid-hide ] [ nas-port-id nas-port-id ] [ nas-id nas-id ]

By default:

¡     In radio view, the configuration in an AP group's radio view is used.

¡     In an AP group's radio view, no service template is bound to a radio.

Configuring an AP to not inherit the specified service template from the AP group

About this task

By default, APs in an AP group inherit the service template bound to the AP group and create BSSs. You can perform this task to configure an AP to not inherit the specified service template from the AP group to which it belongs.

Procedure

4.     Enter system view.

system-view

5.     Enter AP view.

wlan ap ap-name

6.     Enter radio view.

radio radio-id

7.     Configure the AP to not inherit the specified service template from the AP group.

inherit exclude service-template service-template-name

By default, an AP inherits the service template bound to the AP group to which it belongs.

Configuring client data forwarding

Enabling client traffic forwarding

About this task

In an AC hierarchical network, disable this feature on the central AC and enable this feature on local ACs if the client traffic forwarder is AC. This guarantees central AC's management performance in case a local AC is down.

If you enable this feature on both the central AC and local ACs, the local ACs forward client traffic by default. If a local AC fails, APs associate with the central AC directly and the central AC forwards client traffic.

For more information about AC hierarchy, see AC hierarchy in the configuration guide.

Restrictions and guidelines

You must enable this feature if you configure the AC as the client traffic forwarder.

In an AC hierarchy network, if you enable this feature only on the central AC or local ACs, APs associated with such an AC cannot forward client traffic even if the associated AC fails. For APs to take over the traffic forwarding service, you must disable and then enable the service templates for the APs.

Procedure

8.     Enter system view.

system-view

9.     Enable client traffic forwarding.

wlan client forwarding enable

By default, client traffic forwarding is enabled.

Specifying the method for APs to process traffic from unknown clients

About this task

Perform this task to configure APs using the specified service template to drop data packets from unknown clients and deauthenticate these clients or to drop the packets only.

Procedure

10.     Enter system view.

system-view

11.     Enter service template view.

wlan service-template service-template-name

12.     Specify the method for APs to process traffic from unknown clients.

unknown-client { deauthenticate | drop }

By default, APs drop packets from unknown clients and deauthenticate these clients.

Configuring client management

Enabling quick association

About this task

Enabling load balancing or band navigation might affect client association efficiency. For delay-sensitive services or in an environment where load balancing and band navigation are not needed, you can enable quick association for a service template.

Quick association disables load balancing or band navigation on clients associated with the service template. The device will not balance traffic or perform band navigation even if these two features are enabled in the WLAN.

Procedure

13.     Enter system view.

system-view

14.     Enter service template view.

wlan service-template service-template-name

15.     Enable quick association.

quick-association enable

By default, quick association is disabled.

Specifying the Web server to which client information is reported

About this task

Perform this task to enable the device to report client information, such as client MAC address, associated AP, and association time, to the specified Web server through HTTP. The Web server accepts client information only when the server's host name, port number, and path are specified.

Procedure

16.     Enter system view.

system-view

17.     Specify the host name and port number of the Web server.

wlan web-server host host-name port port-number

By default, the host name and port number of the Web server are not specified.

18.     Specify the path of the Web server.

wlan web-server api-path path

By default, the path of the Web server is not specified.

19.     (Optional.) Set the maximum number of client entries that can be reported at a time.

wlan web-server max-client-entry number

By default, a maximum of ten client entries can be reported at a time.

Enabling generation of client logs in the specified format

About this task

The device supports client logs in the following formats:

·     H3C—Logs AP name, radio ID, client MAC address, SSID, BSSID, and client online status. By default, the device generates client logs only in H3C format.

·     Normal—Logs AP MAC address, AP name, client IP address, client MAC address, SSID, and BSSID.

·     Sangfor—Logs AP MAC address, client IP address, and client MAC address.

This feature enables the device to generate client logs in normal or sangfor format and send the logs to the information center. Log destinations are determined by the information center settings. For more information about the information center, see Network Management and Monitoring Configuration Guide for the switch.

This feature does not affect generation of client logs in the H3C format.

Procedure

20.     Enter system view.

system-view

21.     Enable the device to generate client logs in the specified format.

customlog format wlan { normal | sangfor }

By default, the device generates client logs only in the H3C format.

Setting the VLAN allocation method for clients

About this task

When a client comes online for the first time, the associated AP assigns a random VLAN to it. When the client comes online again, the VLAN assigned to the client depends on the allocation method.

·     Static allocation—The client inherits the VLAN that has been assigned to it. If the IP address lease has not expired, the client will use the same IP address. This method helps save IP addresses.

·     Dynamic allocation—The AP re-assigns a VLAN to the client. This method balances clients in all VLANs.

·     Compatible static allocation—The client inherits the VLAN that has been assigned to it when roaming between Comware 5 and Comware 7 ACs.

Restrictions and guidelines

After a client goes offline and comes online again, its VLAN might change in the following situations:

·     In static or compatible static allocation mode, the AP will assign a new VLAN to the client if its original VLAN has been removed from the VLAN group.

·     If you change the VLAN allocation method from dynamic to static or compatible static, the AP might assign the clients a different VLAN after they come online again.

Procedure

22.     Enter system view.

system-view

23.     Enter service template view.

wlan service-template service-template-name

24.     Set the VLAN allocation method for clients.

client vlan-alloc { dynamic | static | static-compatible }

By default, the VLAN allocation method for clients is dynamic.

Configuring clients to prefer the authorization VLAN after roaming

About this task

Typically, the VLAN of a client remains unchanged after client roaming. However, if the client triggers a security alert configured on IMC after roams to another AP, the issued authorization VLAN for user isolation takes effect.

Restrictions and guidelines

This feature takes effect only on 802.1X and MAC authentication clients.

Procedure

25.     Enter system view.

system-view

26.     Enter service template view.

wlan service-template service-template-name

27.     Configure clients to prefer the authorization VLAN after roaming.

client preferred-vlan authorized

By default, clients prefer the authorization VLAN after roaming.

Enabling immediate client association upon successful local authentication

About this task

By default, an AP reports information about locally authenticated clients that pass authentication to the AC, and the AC creates client entries and informs the AP to get the clients online. If the CAPWAP tunnel between the AC and the AP operates incorrectly, clients might fail to come online and are reauthenticated repeatedly.

To avoid this problem, you can allow clients to come online immediately after successful local authentication so that the AP can forward client traffic when the AC cannot be reached. The AP synchronizes client information to the AC when the tunnel recovers.

Procedure

28.     Enter system view.

system-view

29.     Enter service template view.

wlan service-template service-template-name

30.     Enable clients to come online immediately upon successful local authentication.

undo client report-mandatory

By default, locally authenticated clients come online after successful client information reporting.

Setting the idle period before client reauthentication

About this task

When URL redirection for WLAN MAC authentication is enabled, an AP redirects clients whose information is not recorded on the RADIUS server to the specified URL for Web authentication. Clients passing Web authentication are logged off and must perform MAC reauthentication to come online. However, MAC reauthentication fails if the IP addresses assigned to the clients have not expired.

Perform this task to add these clients to the dynamic blacklist for the specified idle period after they pass Web authentication to reduce reauthentication failures.

Procedure

31.     Enter system view.

system-view

32.     Set the idle period before client reauthentication.

wlan client reauthentication-period [ period-value ]

By default, the idle period is 10 seconds.

Configuring differentiated accounting of client traffic

About this task

This feature enables APs to perform differentiated accounting of client traffic based on the accounting policy applied to each user profile.

Upon client association, the authentication server deploys the user profile bound to the client account to the client authenticator (AC or AP). If the AC is the authenticator, it deploys the user profile to the AP.

If no accounting policy is applied to a user profile, the system performs AAA accounting.

Restrictions and guidelines

Accounting policy changes, including deletion, for a user profile do not affect online clients.

Prerequisites

On the authentication server, bind user profiles to clients.

Procedure

33.     Enter system view.

system-view

34.     Create an accounting policy and enter its view or enter the view of an existing accounting policy.

wlan accounting-policy policy-name

35.     Specify a traffic level for ACL-based accounting.

accounting-level level acl { acl-number | ipv6 ipv6-acl-number }

By default, no traffic levels are specified for ACL-based accounting.

36.     Return to system view.

quit

37.     Enter user profile view.

user-profile profile-name

38.     Apply an accounting policy to the user profile.

wlan apply accounting-policy policy-name

By default, no accounting policy is applied.

Enabling roaming enhancement

About this task

As shown in Figure 8, in an Automated Guided Vehicle (AGV) system, client-mode fat APs deployed on the vehicles provide wireless access to onboard devices not equipped with a wireless NIC. In this networking mode, each fat AP must scan the network for better links and transmit data at the same time, which might cause packet loss.

To solve this issue, configure roaming enhancement for fit APs to add their channel, SSID, and BSSID information to beacon frames and probe responses, helping fat APs to roam fast.

Figure 8 AGV system network diagram

 

Restrictions and guidelines

For a fit AP, you can enable this feature only for the 2.4G radio. If you perform this task multiple times, the most recent configuration takes effect.

For this feature to take effect, you must also enable roaming enhancement on the fat APs deployed on the vehicles.

Configure the 5G radio of each fit AP as follows:

·     Bind the 5G radio to a minimum of one service template that uses the SSID specified for roaming enhancement for the 2.4G radio.

·     You can bind a maximum of five service templates that use the specified SSID to the 5G radio.

·     To avoid packet loss, do not configure the 5G radio as a scanning radio.

·     The 5G radio cannot operate in a radar channel. As a best practice, manually specify a non-radar channel, enable auto channel selection, or configure the channel scanning whitelist or blacklist for the 5G radio.

Procedure

39.     Enter system view.

system-view

40.     Enter AP view or an AP group's AP model view.

¡     Enter AP view.

wlan ap ap-name

¡     Execute the following commands in sequence to enter an AP group's AP model view:

wlan ap-group group-name

ap-model ap-model

41.     Enter radio view.

radio radio-id

42.     Enable roaming enhancement.

roam-enhance ssid ssid

By default:

¡     In radio view, the configuration in an AP group's radio view is used.

¡     In an AP group's radio view, roaming enhancement is disabled.

Enabling smart client access

About this task

This feature enables H3C wireless clients to access the WLAN automatically when the AKM mode is set to PSK or when the radio is bound to an empty service template.

Procedure

43.     Enter system view.

system-view

44.     Enter service template view.

wlan service-template service-template-name

45.     Enable smart client access.

client smart-access enable

By default, smart client access is disabled.

Configuring client maintenance

Setting the client idle timeout

About this task

If an online client does not send any frames to the associated AP before the client idle timeout timer expires, the AP logs off the client.

Procedure

46.     Enter system view.

system-view

47.     Enter AP view or AP group view.

¡     Enter AP view.

wlan ap ap-name

¡     Enter AP group view.

wlan ap-group group-name

48.     Set the client idle timeout.

client idle-timeout timeout

By default:

¡     In AP view, an AP uses the configuration in AP group view.

¡     In AP group view, the client idle timeout is 3600 seconds.

Configuring client keepalive

About this task

This feature enables an AP to send keepalive packets to clients at the specified interval to determine whether the clients are online. If the AP does not receive any replies from a client within three keepalive intervals, it logs off the client.

Procedure

49.     Enter system view.

system-view

50.     Enter AP view or AP group view.

¡     Enter AP view.

wlan ap ap-name

¡     Enter AP group view.

wlan ap-group group-name

51.     Enable client keepalive.

client keep-alive enable

By default:

¡     In AP view, an AP uses the configuration in AP group view.

¡     In AP group view, client keepalive is disabled.

52.     (Optional.) Set the client keepalive interval.

client keep-alive interval interval

By default:

¡     In AP view, an AP uses the configuration in AP group view.

¡     In AP group view, the client keepalive interval is 300 seconds.

Performing a wireless link quality test

About this task

This feature enables an AP to test the quality of the link to a wireless client. The AP sends empty data frames to the client at each supported rate. Then it calculates link quality information such as RSSI, packet retransmissions, and RTT based on the responses from the client.

The timeout for a wireless link quality test is 10 seconds. If the wireless link test is not completed before the timeout expires, test results cannot be obtained.

Procedure

To perform a wireless link quality test, execute the wlan link-test mac-address command in user view.

Configuring client statistics reporting

About this task

This feature enables an AP to report client statistics to the AC at the specified intervals for client entry update. The AC informs the AP to log off a client if the client's information does not exist in the saved entries.

To avoid frequent client re-association, disable this feature when the network is in a bad condition.

Procedure

53.     Enter system view.

system-view

54.     Enter AP view or AP group view.

¡     Enter AP view.

wlan ap ap-name

¡     Enter AP group view.

wlan ap-group group-name

55.     Configure client statistics reporting.

client-statistics-report { disable | enable [ interval interval ] }

By default:

¡     In AP view, an AP uses the configuration in AP group view.

¡     In AP group view, client statistics reporting is enabled.

Setting the NAS ID

About this task

A network access server identifier (NAS ID), network access server port identifier (NAS port ID), or network access server VLAN identifier (NAS VLAN ID) identifies the network access server of a client and differentiates the source of client traffic.

Restrictions and guidelines

If you specify a NAS ID or NAS port ID when binding a service template to a radio, the radio uses the NAS ID or NAS port ID specified for the service template.

If a NAS port ID has been specified by using the nas-port-id command, clients use the specified NAS port ID. If no NAS port ID is specified, clients generate NAS port IDs in the specified NAS port ID format.

Procedure

56.     Enter system view.

system-view

57.     Set the format of NAS port IDs for clients.

wlan nas-port-id format { 2 | 4 }

By default, clients use format 2 to generate NAS port IDs.

1.     Enter AP view, AP group view, or global configuration view.

¡     Enter AP view.

wlan ap ap-name

¡     Enter AP group view.

wlan ap-group group-name

¡     Enter global configuration view.

wlan global-configuration

2.     Set the NAS ID.

nas-id nas-id

By default:

¡     In AP view, an AP uses the configuration in AP group view. If no NAS ID is set in AP group view, the AP uses the configuration in global configuration view.

¡     In AP group view, an AP uses the configuration in global configuration view.

¡     In global configuration view, no NAS ID is set.

3.     Set the NAS port ID.

nas-port-id nas-port-id

By default:

¡     In AP view, an AP uses the configuration in AP group view. If no NAS port ID is set in AP group view, the AP uses the configuration in global configuration view.

¡     In AP group view, an AP uses the configuration in global configuration view.

¡     In global configuration view, no NAS port ID is set

4.     Set the NAS VLAN ID and enable the AC to encapsulate the VLAN ID in RADIUS requests.

nas-vlan vlan-id

By default, no NAS VLAN ID is set. Authentication requests sent to the RADIUS server do not contain the NAS VLAN ID field.

This feature is supported only in AP view.

Set the NAS VLAN ID when a third-party Security Accounting Management (SAM) server is used as the RADIUS server.

Setting the NAS port type

About this task

RADIUS requests carry the NAS port type attribute to indicate type of the access port for 802.1X and MAC authentication clients.

Restrictions and guidelines

Make sure the service template has been disabled before you perform this task.

Procedure

5.     Enter system view.

system-view

6.     Enter service template view.

wlan service-template service-template

7.     Set the NAS port type.

nas-port-type value

By default, the NAS port type is WLAN-IEEE 802.11 with a code value of 19.

Configuring client association ratio optimization

About this task

This feature enables the device to recalculate the client association success ratio, association congestion ratio, and abnormal disassociation ratio by using the specified index to get smaller ratio values.

The client association success ratio is the number of successful client associations divided by the total number of client association attempts. The client association congestion ratio is the number of failed client associations caused by AP overloading divided by the total number of client association attempts. The client abnormal disassociation ratio is the number of abnormal disassociations divided by the sum of successful associations and online clients.

Procedure

8.     Enter system view.

system-view

9.     Enter global configuration view.

wlan association optimization value

By default, the index is 0. The device does not optimize client association ratios.

Enabling beacon frames and probe responses to carry BSS Load IEs

About this task

This feature enables beacon frames and probe responses to carry BSS Load IEs. A BSS Load IE contains information such as associated client quantity, channel usage, and remaining available media time.

Restrictions and guidelines

As a best practice, enable this feature in networks where client roaming is required. This helps clients identify the optimal WLAN.

Procedure

10.     Enter system view.

system-view

11.     Enable beacon frames and probe responses to carry BSS Load IEs.

wlan client bss-load-ie enable [ update-interval interval ]

By default, beacon frames and probe responses do not carry BSS Load IEs.

Specifying an IMC server

About this task

This feature enables the system to report association and disassociation events of APs, clients, and portal users to an IMC server, allowing you to view the statistics from the IMC platform.

Procedure

12.     Enter system view.

system-view

13.     Specify an IMC server by its IP address and port number.

wlan imc ip ip-address port port-number

By default, no IMC server is specified.

Configuring client access control

Specifying a permitted AP group for client association

About this task

Perform this task to enable clients to associate with APs in the specified AP group.

Procedure

14.     Enter system view.

system-view

15.     Enter user profile view.

user-profile profile-name

16.     Specify a permitted AP group for client association.

wlan permit-ap-group ap-group-name

By default, no permitted AP group is specified for client association.

Specifying a permitted SSID for client association

About this task

Perform this task to allow clients to associate with a WLAN through the specified SSID.

Procedure

17.     Enter system view.

system-view

18.     Enter user profile view.

user-profile profile-name

19.     Specify a permitted SSID for client association.

wlan permit-ssid ssid-name

By default, no permitted SSID is specified for client association.

Adding a client to the whitelist

Restrictions and guidelines

When you add the first client to the whitelist, the system asks you whether to disconnect all online clients. Enter Y at the prompt to configure the whitelist.

Procedure

20.     Enter system view.

system-view

21.     Add a client to the whitelist.

wlan whitelist mac-address mac-address

Adding a client to the static blacklist

Restrictions and guidelines

You cannot add a client to both the whitelist and the static blacklist.

If the whitelist and blacklists are configured, only the whitelist takes effect.

Procedure

22.     Enter system view.

system-view

23.     Add a client to the static blacklist.

wlan static-blacklist mac-address mac-address

Configuring the dynamic blacklist

About this task

You can configure the dynamic blacklist to take effect on the AC or on APs.

If you configure the dynamic blacklist to take effect on the AC, all APs connected to the AC will reject the clients in the dynamic blacklist. If you configure the dynamic blacklist to take effect on APs, the AP associated with the clients in the dynamic blacklist will reject the clients, but the clients can still associate with other APs connected to the AC.

Entries in the dynamic blacklist are removed when the aging timer expires.

Restrictions and guidelines

As a best practice, configure the dynamic blacklist to take effect on the AC in high-density environments.

The configured aging timer takes effect only on entries newly added to the dynamic blacklist.

If the whitelist and blacklists are configured, only the whitelist takes effect.

Procedure

24.     Enter system view.

system-view

25.     Choose one option as needed:

¡     Configure the dynamic blacklist to take effect on APs.

wlan dynamic-blacklist active-on-ap

¡     Configure the dynamic blacklist to take effect on the AC.

undo wlan dynamic-blacklist active-on-ap

By default, the dynamic blacklist takes effect on APs.

26.     (Optional.) Set the aging timer for dynamic blacklist entries.

wlan dynamic-blacklist lifetime lifetime

By default, the aging timer is 300 seconds.

The aging timer for dynamic blacklist entries takes effect only on rogue client entries.

Configuring ACL-based access control

Restrictions and guidelines

The ACL-based access control configuration takes precedence over the whitelist and blacklist configuration. As a best practice, do not configure both ACL-based access control and whitelist- and blacklist-based access control on the same device.

If the specified ACL contains a deny statement, configure a permit statement for the ACL to permit all clients. If you do not do so, no clients can come online.

The configuration in AP view takes precedence over the configuration in service template view.

This feature supports only Layer 2 ACLs and can only use source MAC address as the match criterion. If you specify an ACL of another type, the configuration does not take effect.

Procedure

27.     Enter system view.

system-view

28.     Enter service template view or AP view.

¡     Enter service template view.

wlan service-template service-template-name

¡     Enter AP view.

wlan ap ap-name

29.     Specify an ACL.

access-control acl acl-number

By default, no ACL is specified.

Configuring SSID hidden for the management Wi-Fi

 

NOTE:

Support for this feature depends on the AP model.

 

About this task

Management Wi-Fi is for administrators and staff only. For security purposes, you can configure the system to hide management Wi-Fi SSIDs to prevent guests from discovering the networks. This also simplifies the discovered SSID list for guests.

With this feature configured, administrators and staff must manually specify the SSID and password at the first access.

Restrictions and guidelines

Before configuring this feature, first make cloud-managed APs come online from the AC.

Procedure

30.     Enter system view.

system-view

31.     Enter global configuration view.

wlan global-configuration

32.     Enable management Wi-Fi SSID hidden.

wlan management-wifi ssid-hide

By default, an AP does not hide the SSID of its management Wi-Fi.

Enabling an AP to respond to specific broadcast probe requests

About this task

Broadcast probe requests do not carry any SSIDs. Upon receiving a broadcast probe request, an AP responds with a probe response that carries service information for the AP.

By default, an AP responds to all broadcast probe requests, which might threat network security and decrease AP performance. However, disabling responding to broadcast probe requests might forbid clients from roaming to the optimal AP in time, affecting client access.

You can perform this task to enable an AP to respond to broadcast requests from a specific frequency band with strong signal strength.

Procedure

33.     Enter system view.

system-view

34.     Enter AP view or AP group view.

¡     Enter AP view.

wlan ap ap-name

¡     Enter AP group view.

wlan ap-group group-name

35.     Enable the AP to respond to specific broadcast probe requests.

broadcast-probe reply { disable | enable [ rssi-threshold rssi-value ] } [ frequency-band { 2.4 | 5 } ]

By default:

¡     In AP view, an AP uses the configuration in AP group view.

¡     In AP group view, an AP responds to all broadcast probe requests.

Enabling SNMP notifications for WLAN access

About this task

To report critical WLAN access events to an NMS, enable SNMP notifications for WLAN access. For WLAN access event notifications to be sent correctly, you must also configure SNMP as described in Network Management and Monitoring Configuration Guide for the switch.

Procedure

36.     Enter system view.

system-view

37.     Choose the options to configure as needed:

¡     Enable SNMP notifications for client access.

snmp-agent trap enable wlan client

¡     Enable SNMP notifications for client audit.

snmp-agent trap enable wlan client-audit

By default, SNMP notifications are disabled.

Display and maintenance commands for WLAN access

Execute display commands in any view and the reset command in user view.

 

Task

Command

Display the number of online clients at both 2.4 GHz and 5 GHz bands.

display wlan ap all client-number

Display the number of online clients and channel information for each radio.

display wlan ap all radio client-number

Display the number of online clients in each AP group.

display wlan ap-group all client-number

Display blacklist entries.

display wlan blacklist { dynamic | static }

Display basic service set (BSS) information.

display wlan bss { all | ap ap-name | bssid bssid } [ verbose ]

Display client information.

display wlan client [ ap ap-name [ radio radio-id ] | mac-address mac-address | service-template service-template-name | frequency-band { 2.4 | 5 } ] [ verbose ]

Display information about client IPv6 addresses.

display wlan client ipv6

Display client online duration.

display wlan client online-duration [ ap ap-name ] [ verbose ]

Display client status information.

display wlan client status [ mac-address mac-address ] [ verbose ]

Display service template information.

display wlan service-template [ service-template-name ] [ verbose ]

Display client statistics.

display wlan statistics client [ mac-address mac-address ]

Display client connection history.

display wlan statistics connect-history { ap { all | name ap-name } | service-template service-template-name }

Display service template statistics

display wlan statistics service-template service-template-name

Display whitelist entries.

display wlan whitelist

Log off the specified client or all clients.

reset wlan client { all | mac-address mac-address }

Remove the specified client or all clients from the dynamic blacklist.

reset wlan dynamic-blacklist [ mac-address mac-address ]

Clear client statistics.

reset wlan statistics client { all | mac-address mac-address }

Clear service template statistics.

reset wlan statistics service-template service-template-name

WLAN access configuration examples

Example: Configuring WLAN access

Network configuration

As shown in Figure 9, the switch acts as the DHCP server to assign IP addresses to the AP and the client. The AP provides wireless services with the SSID trade-off.

Figure 9 Network diagram

Procedure

38.     Create VLAN 100, and assign an IP address to VLAN-interface 100.

<AC> system-view

[AC] vlan 100

[AC-vlan100]quit

[AC] interface vlan-interface 100

[AC-Vlan-interface100] ip address 10.1.9.58 16

39.     Create the manual AP ap1, and specify the AP model and serial ID.

[AC] wlan ap ap1 model WA6320

[AC-wlan-ap-ap1] serial-id 219801A28N819CE0002T

40.     Configure a service template and bind it to the AP radio:

# Create the service template service1, set the SSID to trade-off, assign clients coming online through the service template to VLAN 100, and enable the service template.

<AC> system-view

[AC] wlan service-template service1

[AC-wlan-st-service1] ssid trade-off

[AC-wlan-st-service1] vlan 100

[AC-wlan-st-service1] service-template enable

[AC-wlan-st-service1] quit

# Set the working channel to channel 157 for radio 1 of the AP.

[AC] wlan ap ap1

[AC-wlan-ap-ap1] radio 1

[AC-wlan-ap-ap1-radio-1] channel 157

# Bind the service template service1 to radio 1.

[AC-wlan-ap-ap1-radio-1] radio enable

[AC-wlan-ap-ap1-radio-1] service-template service1

Verifying the configuration

# Verify that the SSID is trade-off, and the service template is enabled.

[AC] display wlan service-template verbose

Service template name                            : service1

Description                                      : Not configured

SSID                                             : trade-off

SSID-hide                                        : Disabled

User-isolation                                   : Disabled

Service template status                          : Enabled

Maximum clients per BSS                          : 64

Frame format                                     : Dot3

Seamless roam status                             : Disabled

Seamless roam RSSI threshold                     : 50

Seamless roam RSSI gap                           : 20

VLAN ID                                          : 100

Service VLAN ID                                  : N/A

Service VLAN TPID                                : dot1q

Customer Vlan                                    : 4294967295

AKM mode                                         : Not configured

Security IE                                      : Not configured

Cipher suite                                     : Not configured

TKIP countermeasure time                         : 0 sec

PTK life time                                    : 43200 sec

PTK rekey                                        : Enabled

GTK rekey                                        : Enabled

GTK rekey method                                 : Time-based

GTK rekey time                                   : 86400 sec

GTK rekey client-offline                         : Disabled

WPA3 status                                      : Disabled

PPSK                                             : Disabled

PPSK Fail Permit                                 : Disabled

Enhance-open status                              : Enabled

Enhanced-open transition-mode service-template   : N/A

User authentication mode                         : Bypass

Intrusion protection                             : Disabled

Intrusion protection mode                        : Temporary-block

Temporary block time                             : 180 sec

Temporary service stop time                      : 20 sec

Fail VLAN ID                                     : 1

Critical VLAN ID                                 : Not configured

802.1X handshake                                 : Enabled

802.1X handshake secure                          : Disabled

802.1X domain                                    : my-domain

MAC-auth domain                                  : Not configured

Max 802.1X users per BSS                         : 4096

Max MAC-auth users per BSS                       : 4096

802.1X re-authenticate                           : Enabled

Authorization fail mode                          : Online

Accounting fail mode                             : Online

Authorization                                    : Permitted

Key derivation                                   : N/A

PMF status                                       : Disabled

Hotspot policy number                            : Not configured

Forwarding policy status                         : Disabled

Forwarding policy name                           : Not configured

Forwarder                                        : AC

FT status                                        : Disabled

QoS trust                                        : Port

QoS priority                                     : 0

BTM status                                       : Disabled

# Associate the client with the AP. (Details not shown.)

# Verify that the client can access the WLAN.

[AC] display wlan client service-template service1

Total number of clients: 1

 

MAC address       Username   AP name    RID   IP address      VLAN

0023-8933-223b    N/A        ap1        1     3.0.0.3         100

Example: Configuring whitelist-based access control

Network configuration

As shown in Figure 10, configure the whitelist to permit only the client whose MAC address is 0000-000f-1211 to access the WLAN.

Figure 10 Network diagram

Procedure

# Add the MAC address 0000-000f-1211 to the whitelist.

<AC> system-view

[AC] wlan whitelist mac-address 0000-000f-1211

Verifying the configuration

# Verify that the MAC address 0000-000f-1211 is in the whitelist.

[AC] display wlan whitelist

Total number of clients: 1

 MAC addresses:

  0000-000f-1211

Example: Configuring static blacklist-based access control

Network configuration

As shown in Figure 11, configure the static blacklist to forbid the client whose MAC address is 0000-000f-1211 to access the WLAN.

Figure 11 Network diagram

Procedure

# Add the MAC address 0000-000f-1211 to the static blacklist.

<AC> system-view

[AC] wlan static-blacklist mac-address 0000-000f-1211

Verifying the configuration

# Verify that the MAC address 0000-000f-1211 is in the static blacklist.

[AC] display wlan blacklist static

Total number of clients: 1

 MAC addresses:

  0000-000f-1211

Example: Configuring ACL-based access control

Network configuration

As shown in Figure 12, configure ACL-based access control to allow Client 1 and clients with the same OUI as Client 2 to access the WLAN.

Figure 12 Network diagram

Procedure

# Create Layer 2 ACL 4000, and create ACL rules to permit Client 1 and clients with the same OUI as Client 2.

<Sysname> system-view

[Sysname] acl mac 4000

[Sysname-acl-mac-4000] rule 0 permit source-mac 0000-000f-1121 ffff-ffff-ffff

[Sysname-acl-mac-4000] rule 1 permit source-mac 000e-35b2-000e ffff-ff00-0000

[Sysname-acl-mac-4000] quit

# Bind ACL 4000 to service template service1.

[Sysname] wlan service service1

[Sysname-wlan-st-service1] access-control acl 4000

Verifying the configuration

# Execute the display wlan client command to verify that only Client 1 and clients with the same OUI as Client 2 (including Client 2) can access the WLAN.

[AC] display wlan client

Total number of clients: 2

 

MAC address    Username         AP name       RID   IPv4 address        VLAN

0000-000f-1121 N/A              ap           1      192.168.100.12      1

000e-35b2-000e N/A              ap           1      192.168.100.13      1

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网