13-User Access and Authentication Command Reference

HomeSupportReference GuidesCommand ReferencesH3C WX2800X&WSG1800X Command References(R5605P11)-6W10013-User Access and Authentication Command Reference
02-WLAN IP snooping commands
Title Size Download
02-WLAN IP snooping commands 84.96 KB

WLAN IP snooping commands

client ip-snooping acl

Use client ip-snooping acl to enable ACL-based learning of endpoint IP addresses.

Use undo client ip-snooping acl to restore the default.

Syntax

client ip-snooping acl acl-number

undo client ip-snooping acl

Default

ACL-based learning of endpoint IP addresses is disabled.

Views

Service template view

Predefined user roles

network-admin

Parameters

acl-number: Specifies a basic ACL by its number. The value range for this argument is 2000 to 2999.

Usage guidelines

CAUTION

CAUTION:

After you configure a deny rule in the ACL to reject learning specific endpoint IP addresses, you must configure a permit rule following the deny rule. The permit rule must allow learning all endpoint IP addresses. Otherwise, the device cannot learn any endpoint IP addresses.

After connecting to a wireless network, a wireless endpoint will carry vendor information and an IP address obtained from that wireless network. If the endpoint accesses another vendor's network or another network later, the device on the new network might learn an incorrect IP address from the endpoint. To resolve this issue, enable ACL-based learning of endpoint IP addresses. This feature enables the device to learn IP addresses of new endpoints based on rules of the specified ACL.

When a wireless endpoint connects to a wireless network, the device performs the following task:

1.     Matches IP address of that wireless endpoint against the specified ACL.

2.     Determines whether to learn the endpoint IP address based on the match result as follows:

¡     If the endpoint IP address matches a permit rule in the ACL, the device will learn the endpoint IP address.

¡     If the endpoint IP address matches a deny rule or cannot match any rule in the ACL, the device will not learn the endpoint IP address.

This feature takes effect only if snooping ARP or ND packets is enabled.

If you execute this command multiple times, only the most recent configuration takes effect.

Examples

# Enable ACL-based learning of endpoint IP addresses.

<Sysname> system-view

[Sysname] wlan service-template service1

[Sysname-wlan-st-service1] client ip-snooping acl 2000

Related commands

client ipv4-snooping arp-learning enable

client ipv6-snooping nd-learning enable

client ip-snooping http-learning enable

Use client ip-snooping http-learning enable to enable snooping HTTP and HTTPS requests redirected to the portal server.

Use undo client ip-snooping http-learning enable to disable snooping HTTP and HTTPS requests redirected to the portal server.

Syntax

client ip-snooping http-learning enable

undo client ip-snooping http-learning enable

Default

Snooping HTTP and HTTPS requests is disabled.

Views

Service template view

Predefined user roles

network-admin

Usage guidelines

An AC can use this method to learn IP addresses of clients performing portal authentication. For more information about portal authentication, see User Access and Authentication Configuration Guide.

The priorities for learning IP addresses through snooping DHCP packets, ARP or ND packets, and HTTP/HTTPS requests are in descending order.

Make sure the service template is disabled when you execute this command.

Examples

# Enable snooping HTTP and HTTPS requests.

<Sysname> system-view

[Sysname] wlan service-template service1

[Sysname-wlan-st-service1] client ip-snooping http-learning enable

client ipv4-snooping arp-learning enable

Use client ipv4-snooping arp-learning enable to enable snooping ARP packets.

Use undo client ipv4-snooping arp-learning enable to disable snooping ARP packets.

Syntax

client ipv4-snooping arp-learning enable

undo client ipv4-snooping arp-learning enable

Default

Snooping ARP packets is enabled.

Views

Service template view

Predefined user roles

network-admin

Examples

# Disable snooping ARP packets.

<Sysname> system-view

[Sysname] wlan service-template service1

[Sysname-wlan-st-service1] undo client ipv4-snooping arp-learning enable

client ipv4-snooping dhcp-learning enable

Use client ipv4-snooping dhcp-learning enable to enable snooping DHCPv4 packets.

Use undo client ipv4-snooping dhcp-learning enable to disable snooping DHCPv4 packets.

Syntax

client ipv4-snooping dhcp-learning enable

undo client ipv4-snooping dhcp-learning enable

Default

Snooping DHCPv4 packets is enabled.

Views

Service template view

Predefined user roles

network-admin

Examples

# Disable snooping DHCPv4 packets.

<Sysname> system-view

[Sysname] wlan service-template service1

[Sysname-wlan-st-service1] undo client ipv4-snooping dhcp-learning enable

client ipv4-snooping dhcp-learning timeout

Use client ipv4-snooping dhcp-learning timeout to set the timeout for IPv4 address learning through DHCP.

Use undo client ipv4-snooping dhcp-learning timeout to restore the default.

Syntax

client ipv4-snooping dhcp-learning timeout time

undo client ipv4-snooping dhcp-learning timeout

Default

The timeout is 0 and the system does not log off clients that fail to obtain an IPv4 address through DHCP.

Views

Service template view

Predefined user roles

network-admin

Parameters

time: Specifies the timeout in the range of 1 to 600 seconds.

Usage guidelines

With the timeout set, the system logs off clients that fail to obtain an IPv4 address through DHCP within the specified period.

Make sure the service template is enabled before you execute this command.

This configuration takes effect only on clients coming online afterwards from the AC.

Examples

# Set the timeout to 180 seconds for IPv4 address learning through DHCP.

<Sysname> system-view

[Sysname] wlan service-template 1

[Sysname-wlan-st-1] client ipv4-snooping dhcp-learning timeout 180

client ipv6-snooping dhcpv6-learning enable

Use client ipv6-snooping dhcpv6-learning enable to enable snooping DHCPv6 packets.

Use undo client ipv6-snooping dhcpv6-learning enable to disable snooping DHCPv6 packets.

Syntax

client ipv6-snooping dhcpv6-learning enable

undo client ipv6-snooping dhcpv6-learning enable

Default

Snooping DHCPv6 packets is enabled.

Views

Service template view

Predefined user roles

network-admin

Usage guidelines

With this feature enabled, an AP learns client IPv6 addresses by snooping DHCPv6 packets, and records the learnt IPv6 addresses and the corresponding MAC addresses as WLAN IP snooping binding entries.

The binding entries are mainly used for accounting of 802.1X authentication and MAC authentication users.

Examples

# Disable snooping DHCPv6 packets.

<Sysname> system-view

[Sysname] wlan service-template service1

[Sysname-wlan-st-service1] client ipv6-snooping dhcpv6-learning enable

client ipv6-snooping nd-learning enable

Use client ipv6-snooping nd-learning enable to enable snooping ND packets.

Use undo client ipv6-snooping nd-learning enable to disable snooping ND packets.

Syntax

client ipv6-snooping nd-learning enable

undo client ipv6-snooping nd-learning enable

Default

Snooping ND packets is enabled.

Views

Service template view

Predefined user roles

network-admin

Usage guidelines

With this feature enabled, an AP learns client IPv6 addresses by snooping ND packets, and records the learnt IPv6 addresses and the corresponding MAC addresses as WLAN IP snooping binding entries.

The binding entries are mainly used for accounting of 802.1X authentication and MAC authentication users.

Examples

# Disable snooping ND packets.

<Sysname> system-view

[Sysname] wlan service-template service1

[Sysname-wlan-st-service1] undo client ipv6-snooping nd-learning enable

client ipv6-snooping snmp-nd-report enable

Use client ipv6-snooping snmp-nd-report enable to enable SNMP to obtain client IPv6 addresses learned from ND packets.

Use undo client ipv6-snooping snmp-nd-report enable to disable SNMP from obtaining client IPv6 addresses learned from ND packets.

Syntax

client ipv6-snooping snmp-nd-report enable

undo client ipv6-snooping snmp-nd-report enable

Default

SNMP obtains client IPv6 addresses learned from both DHCPv6 and ND packets.

Views

Service template view

Predefined user roles

network-admin

Usage guidelines

Make sure the service template is disabled when you execute this command.

Examples

# Disable SNMP from obtaining client IPv6 addresses learned from ND packets.

<Sysname> system-view

[Sysname] wlan service-template service1

[Sysname-wlan-st-service1] undo client ipv6-snooping snmp-nd-report enable

display wlan statistics client-ip-conflict

Use display wlan statistics client-ip-conflict to display statistics about clients with conflict IP addresses.

Syntax

display wlan statistics client-ip-conflict

Views

Any view

Predefined user roles

network-admin

network-operator

Examples

# Display statistics about clients with conflict IP addresses.

<Sysname> display wlan statistics client-ip-conflict

IP             New-MAC/APID             Old-MAC/APID     Time

192.168.1.1    a4c1-5b79-fa5b/1     1111-e121-ff00/2     03-22 10:00:00

ff03::101      22d3-c5b7-a4b5/2     000d-88f8-0577/1     03-22 10:01:00

Table 1 Command output

Field

Description

IP

Conflict IP obtained by the client.

New-MAC/APID

MAC address of the new client and the ID of the AP from which that client comes online.

Old-MAC/APID

MAC address of the old client and the ID of the AP to which the client is associated.

Time

Time when the client requested to add the IPCIM after it obtained a conflict IP address.

 

wlan client ip-conflict-detection enable

Use wlan client ip-conflict-detection enable to enable IP address conflict detection.

Use undo wlan client ip-conflict-detection enable to disable IP address conflict detection.

Syntax

wlan client ip-conflict-detection enable

undo wlan client ip-conflict-detection enable

Default

IP address conflict detection is enabled.

Views

Service template view

Predefined user roles

network-admin

Usage guidelines

This feature enables the system to detect IP address conflicts between a client attempting to come online and online clients. The system logs off the online clients that use the same IP address as the new client and creates IP address conflict entries for the clients. The system deletes the IP address conflict entry for a client when the client cache expires or the client's IP address changes.

In an AC hierarchy network, you can disable IP address conflict detection on the central AC if portal authentication has been disabled or accounting has been disabled for 802.1X or MAC authentication clients. This allows clients from different local ACs to come online with the same IP address, simplifying DHCP configuration.

Examples

# Disable IP address conflict detection.

<Sysname> system

[Sysname] undo wlan client ip-conflict enable

Related commands

client cache aging-time (WLAN Access Command Reference)

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网