- Table of Contents
- Related Documents
-
Title | Size | Download |
---|---|---|
02-WLAN IP snooping commands | 84.96 KB |
client ip-snooping http-learning enable
client ipv4-snooping arp-learning enable
client ipv4-snooping dhcp-learning enable
client ipv4-snooping dhcp-learning timeout
client ipv6-snooping dhcpv6-learning enable
client ipv6-snooping nd-learning enable
client ipv6-snooping snmp-nd-report enable
display wlan statistics client-ip-conflict
wlan client ip-conflict-detection enable
WLAN IP snooping commands
client ip-snooping acl
Use client ip-snooping acl to enable ACL-based learning of endpoint IP addresses.
Use undo client ip-snooping acl to restore the default.
Syntax
client ip-snooping acl acl-number
undo client ip-snooping acl
Default
ACL-based learning of endpoint IP addresses is disabled.
Views
Service template view
Predefined user roles
network-admin
Parameters
acl-number: Specifies a basic ACL by its number. The value range for this argument is 2000 to 2999.
Usage guidelines
CAUTION: After you configure a deny rule in the ACL to reject learning specific endpoint IP addresses, you must configure a permit rule following the deny rule. The permit rule must allow learning all endpoint IP addresses. Otherwise, the device cannot learn any endpoint IP addresses. |
After connecting to a wireless network, a wireless endpoint will carry vendor information and an IP address obtained from that wireless network. If the endpoint accesses another vendor's network or another network later, the device on the new network might learn an incorrect IP address from the endpoint. To resolve this issue, enable ACL-based learning of endpoint IP addresses. This feature enables the device to learn IP addresses of new endpoints based on rules of the specified ACL.
When a wireless endpoint connects to a wireless network, the device performs the following task:
1. Matches IP address of that wireless endpoint against the specified ACL.
2. Determines whether to learn the endpoint IP address based on the match result as follows:
¡ If the endpoint IP address matches a permit rule in the ACL, the device will learn the endpoint IP address.
¡ If the endpoint IP address matches a deny rule or cannot match any rule in the ACL, the device will not learn the endpoint IP address.
This feature takes effect only if snooping ARP or ND packets is enabled.
If you execute this command multiple times, only the most recent configuration takes effect.
Examples
# Enable ACL-based learning of endpoint IP addresses.
<Sysname> system-view
[Sysname] wlan service-template service1
[Sysname-wlan-st-service1] client ip-snooping acl 2000
Related commands
client ipv4-snooping arp-learning enable
client ipv6-snooping nd-learning enable
client ip-snooping http-learning enable
Use client ip-snooping http-learning enable to enable snooping HTTP and HTTPS requests redirected to the portal server.
Use undo client ip-snooping http-learning enable to disable snooping HTTP and HTTPS requests redirected to the portal server.
Syntax
client ip-snooping http-learning enable
undo client ip-snooping http-learning enable
Default
Snooping HTTP and HTTPS requests is disabled.
Service template view
Predefined user roles
network-admin
Usage guidelines
An AC can use this method to learn IP addresses of clients performing portal authentication. For more information about portal authentication, see User Access and Authentication Configuration Guide.
The priorities for learning IP addresses through snooping DHCP packets, ARP or ND packets, and HTTP/HTTPS requests are in descending order.
Make sure the service template is disabled when you execute this command.
Examples
# Enable snooping HTTP and HTTPS requests.
<Sysname> system-view
[Sysname] wlan service-template service1
[Sysname-wlan-st-service1] client ip-snooping http-learning enable
client ipv4-snooping arp-learning enable
Use client ipv4-snooping arp-learning enable to enable snooping ARP packets.
Use undo client ipv4-snooping arp-learning enable to disable snooping ARP packets.
Syntax
client ipv4-snooping arp-learning enable
undo client ipv4-snooping arp-learning enable
Default
Snooping ARP packets is enabled.
Views
Service template view
Predefined user roles
network-admin
Examples
# Disable snooping ARP packets.
<Sysname> system-view
[Sysname] wlan service-template service1
[Sysname-wlan-st-service1] undo client ipv4-snooping arp-learning enable
client ipv4-snooping dhcp-learning enable
Use client ipv4-snooping dhcp-learning enable to enable snooping DHCPv4 packets.
Use undo client ipv4-snooping dhcp-learning enable to disable snooping DHCPv4 packets.
Syntax
client ipv4-snooping dhcp-learning enable
undo client ipv4-snooping dhcp-learning enable
Default
Snooping DHCPv4 packets is enabled.
Views
Service template view
Predefined user roles
network-admin
Examples
# Disable snooping DHCPv4 packets.
<Sysname> system-view
[Sysname] wlan service-template service1
[Sysname-wlan-st-service1] undo client ipv4-snooping dhcp-learning enable
client ipv4-snooping dhcp-learning timeout
Use client ipv4-snooping dhcp-learning timeout to set the timeout for IPv4 address learning through DHCP.
Use undo client ipv4-snooping dhcp-learning timeout to restore the default.
Syntax
client ipv4-snooping dhcp-learning timeout time
undo client ipv4-snooping dhcp-learning timeout
Default
The timeout is 0 and the system does not log off clients that fail to obtain an IPv4 address through DHCP.
Views
Service template view
Predefined user roles
network-admin
Parameters
time: Specifies the timeout in the range of 1 to 600 seconds.
Usage guidelines
With the timeout set, the system logs off clients that fail to obtain an IPv4 address through DHCP within the specified period.
Make sure the service template is enabled before you execute this command.
This configuration takes effect only on clients coming online afterwards from the AC.
Examples
# Set the timeout to 180 seconds for IPv4 address learning through DHCP.
<Sysname> system-view
[Sysname] wlan service-template 1
[Sysname-wlan-st-1] client ipv4-snooping dhcp-learning timeout 180
client ipv6-snooping dhcpv6-learning enable
Use client ipv6-snooping dhcpv6-learning enable to enable snooping DHCPv6 packets.
Use undo client ipv6-snooping dhcpv6-learning enable to disable snooping DHCPv6 packets.
Syntax
client ipv6-snooping dhcpv6-learning enable
undo client ipv6-snooping dhcpv6-learning enable
Default
Snooping DHCPv6 packets is enabled.
Views
Service template view
Predefined user roles
network-admin
Usage guidelines
With this feature enabled, an AP learns client IPv6 addresses by snooping DHCPv6 packets, and records the learnt IPv6 addresses and the corresponding MAC addresses as WLAN IP snooping binding entries.
The binding entries are mainly used for accounting of 802.1X authentication and MAC authentication users.
Examples
# Disable snooping DHCPv6 packets.
<Sysname> system-view
[Sysname] wlan service-template service1
[Sysname-wlan-st-service1] client ipv6-snooping dhcpv6-learning enable
client ipv6-snooping nd-learning enable
Use client ipv6-snooping nd-learning enable to enable snooping ND packets.
Use undo client ipv6-snooping nd-learning enable to disable snooping ND packets.
Syntax
client ipv6-snooping nd-learning enable
undo client ipv6-snooping nd-learning enable
Default
Snooping ND packets is enabled.
Views
Service template view
Predefined user roles
network-admin
Usage guidelines
With this feature enabled, an AP learns client IPv6 addresses by snooping ND packets, and records the learnt IPv6 addresses and the corresponding MAC addresses as WLAN IP snooping binding entries.
The binding entries are mainly used for accounting of 802.1X authentication and MAC authentication users.
Examples
# Disable snooping ND packets.
<Sysname> system-view
[Sysname] wlan service-template service1
[Sysname-wlan-st-service1] undo client ipv6-snooping nd-learning enable
client ipv6-snooping snmp-nd-report enable
Use client ipv6-snooping snmp-nd-report enable to enable SNMP to obtain client IPv6 addresses learned from ND packets.
Use undo client ipv6-snooping snmp-nd-report enable to disable SNMP from obtaining client IPv6 addresses learned from ND packets.
Syntax
client ipv6-snooping snmp-nd-report enable
undo client ipv6-snooping snmp-nd-report enable
Default
SNMP obtains client IPv6 addresses learned from both DHCPv6 and ND packets.
Views
Service template view
Predefined user roles
Usage guidelines
Make sure the service template is disabled when you execute this command.
Examples
# Disable SNMP from obtaining client IPv6 addresses learned from ND packets.
<Sysname> system-view
[Sysname] wlan service-template service1
[Sysname-wlan-st-service1] undo client ipv6-snooping snmp-nd-report enable
display wlan statistics client-ip-conflict
Use display wlan statistics client-ip-conflict to display statistics about clients with conflict IP addresses.
Syntax
display wlan statistics client-ip-conflict
Views
Any view
Predefined user roles
network-admin
network-operator
Examples
# Display statistics about clients with conflict IP addresses.
<Sysname> display wlan statistics client-ip-conflict
IP New-MAC/APID Old-MAC/APID Time
192.168.1.1 a4c1-5b79-fa5b/1 1111-e121-ff00/2 03-22 10:00:00
ff03::101 22d3-c5b7-a4b5/2 000d-88f8-0577/1 03-22 10:01:00
Table 1 Command output
Field |
Description |
IP |
Conflict IP obtained by the client. |
New-MAC/APID |
MAC address of the new client and the ID of the AP from which that client comes online. |
Old-MAC/APID |
MAC address of the old client and the ID of the AP to which the client is associated. |
Time |
Time when the client requested to add the IPCIM after it obtained a conflict IP address. |
wlan client ip-conflict-detection enable
Use wlan client ip-conflict-detection enable to enable IP address conflict detection.
Use undo wlan client ip-conflict-detection enable to disable IP address conflict detection.
Syntax
wlan client ip-conflict-detection enable
undo wlan client ip-conflict-detection enable
Default
IP address conflict detection is enabled.
Views
Service template view
Predefined user roles
network-admin
Usage guidelines
This feature enables the system to detect IP address conflicts between a client attempting to come online and online clients. The system logs off the online clients that use the same IP address as the new client and creates IP address conflict entries for the clients. The system deletes the IP address conflict entry for a client when the client cache expires or the client's IP address changes.
In an AC hierarchy network, you can disable IP address conflict detection on the central AC if portal authentication has been disabled or accounting has been disabled for 802.1X or MAC authentication clients. This allows clients from different local ACs to come online with the same IP address, simplifying DHCP configuration.
Examples
# Disable IP address conflict detection.
<Sysname> system
[Sysname] undo wlan client ip-conflict enable
Related commands
client cache aging-time (WLAN Access Command Reference)