Lab - WLAN
Lab - WLAN
Introduction
About This Lab
Wired LANs are expensive and lack mobility. The increasing demand for portability and
mobility requires WLAN technologies. WLAN is now the most cost-efficient and
convenient network access mode. WLAN allows users to move within the covered area.
In this lab activity, you will configure a WLAN using an AC and fit APs.
Objectives
Upon completion of this task, you will be able to:
Learn how to authenticate APs
Learn how to configure WLAN profiles
Understand the basic WLAN configuration process
Networking Topology
The S2 switch supports the WLAN-AC function. If the switch does not support the
WLAN-AC function, use a common AC to replace the switch. The AC in the
following content is an S2 switch.
The AC is deployed in an out-of-path mode and is on the same Layer 2 network as the
APs.
The AC functions as a DHCP server to assign IP addresses to APs, S1 functions as a
DHCP server to assign IP addresses to stations (STAs).
Service data is directly forwarded.
Lab topology for creating a WLAN
Data Planning
An enterprise needs to create a WLAN to provide mobility in workplace.
AC data planning
Item Configuration
AP management VLAN VLAN100
Service VLAN VLAN101
DHCP server The AC functions as a DHCP server to allocate IP addresses
to APs.
S1 functions as a DHCP server to allocate IP addresses to
STAs. The default gateway address of STAs is
192.168.101.254.
IP address pool for APs 192.168.100.1-192.168.100.253/24
IP address pool for STAs 192.168.101.1-192.168.101.253/24
IP address of the AC's VLANIF100: 192.168.100.254/24
source interface
AP group Name: ap-group1
Referenced profiles: VAP profile HCIA-wlan and regulatory
domain profile default
Regulatory domain profile Name: default
Item Configuration
Country code: CN
SSID profile Name: HCIA-WLAN
SSID name: HCIA-WLAN
Security profile Name: HCIA-WLAN
Security policy: WPA-WPA2+PSK+AES
Password: HCIA-Datacom
VAP profile Name: HCIA-WLAN
Forwarding mode: direct forwarding
Service VLAN: VLAN 101
Referenced profiles: SSID profile HCIA- WLAN and
security profile HCIA- WLAN
Lab Configuration
Configuration Roadmap
Configure the connectivity of the wired network.
Configure the APs and bring them online.
(1) Create AP groups and add APs of the same configuration to the same group for
unified configuration.
(2) Configure AC system parameters, including the country code and source
interface used by the AC to communicate with the APs.
(3) Configure the AP authentication mode and import the APs to bring them online.
Configure WLAN service parameters and deliver them to APs for STAs to access the
WLAN.
Configuration Procedure
Complete basic device configurations.
# Name the devices (name S2 in the topology AC)
The details are not provided here.
# Shut down unnecessary ports between S1 and the AC. This step applies only to the
environment described in HCIA-Datacom Lab Construction Guide V1.0.
[S1] interface GigabitEthernet 0/0/11
[S1-GigabitEthernet0/0/11]shutdown
[S1-GigabitEthernet0/0/11]quit
[S1] interface GigabitEthernet 0/0/12
[S1-GigabitEthernet0/0/12]shutdown
[S1-GigabitEthernet0/0/12]quit
The poe enable command enables the PoE function on a port. When a port detects a
powered device (PD) connected to it, the port supplies power to the PD. By default, the
PoE function is enabled. Therefore, this command is unnecessary and is provided for
demonstration purpose only.
[S4]interface GigabitEthernet 0/0/4
[S4-GigabitEthernet0/0/4]poe enable
# Configure DHCP.
[S1]dhcp enable
Info: The operation may take a few seconds. Please wait for a moment.done.
[S1]ip pool sta
Info:It's successful to create an IP address pool.
IP address pool for STAs
[S1-ip-pool-sta]network 192.168.101.0 mask 24
[S1-ip-pool-sta]gateway-list 192.168.101.254
[S1-ip-pool-sta]quit
[S1]interface Vlanif 101
[S1-Vlanif101]dhcp select global
[S1-Vlanif101]quit
[AC]dhcp enable
Info: The operation may take a few seconds. Please wait for a moment.done.
[AC]ip pool ap
Info: It is successful to create an IP address pool.
IP address pool for APs
[AC-ip-pool-ap]network 192.168.100.254 mask 24
[AC-ip-pool-ap]gateway-list 192.168.100.254
[AC-ip-pool-ap]quit
[AC]interface Vlanif 100
[AC-Vlanif100]dhcp select global
[AC-Vlanif100]quit
S1 is the DHCP server for STAs and the AC is the DHCP server for APs.
Configure the APs to bring them online.
# Create an AP group and name it ap-group1.
[AC]wlan
[AC-wlan-view]ap-group name ap-group1
Info: This operation may take a few seconds. Please wait for a moment.done.
[AC-wlan-ap-group-ap-group1]quit
# Create a regulatory domain profile, and set the AC country code in the profile.
[AC]wlan
[AC-wlan-view]regulatory-domain-profile name default
A country code identifies the country in which the APs are deployed. Different countries
require different AP radio attributes, including the transmit power and supported channels.
Correct country code configuration ensures that radio attributes of APs comply with local
laws and regulations. By default, the country code CN is configured.
[AC-wlan-regulate-domain-default]quit
The capwap source interface command configures the interface used by the AC to set up
CAPWAP tunnels with APs.
# Import APs to the AC and add the APs to AP group ap-group1.
APs can be added to an AC in the following ways:
Manual configuration: Specify the MAC addresses and serial numbers (SNs) of APs on the
AC in advance. When APs are connected the AC, the AC finds that their MAC
addresses and SNs match the preconfigured ones and establish connections with
them.
Automatic discovery: When the AP authentication mode is set to no authentication, or the
AP authentication mode is set to MAC or SN authentication and the MAC addresses
or SNs are whitelisted, the AC automatically discovers connected APs and establish
connections with them.
Manual confirmation: If the AP authentication mode is set to MAC or SN authentication
and MAC address or SN of a connected AP is not included in the whitelist on the AC,
the AC adds the AP to the list of unauthorized APs. You can manually confirm the
identify of such an AP to bring it online.
[AC]wlan
[AC-wlan-view]ap auth-mode mac-auth
The ap-name command configures the name of an AP. AP names must be unique. If the
AP name is not configured, the default name is the MAC address of the AP.
[AC-wlan-ap-0]ap-group ap-group1
The ap-group command configures the group for an AP. The AC delivers the
configuration to the APs. For example, if AP1 is added to ap-group1, the regulatory
domain profile, radio profile, and VAP profile associated with ap-group1 are delivered to
AP1. By default, an AP is not added to any group. When an AP is added to a group or the
group of an AP changes, the group configuration will be delivered automatically by the
AC, and the AP will automatically restart to join the group.
Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power and antenna gain
configurations of the radio, Whether to continue? [Y/N]:y //Enter y to confirm.
Info: This operation may take a few seconds. Please wait for a moment.. done.
[AC-wlan-ap-0]quit
[AC-wlan-view]ap-id 1 ap-mac B4FB-F9B7-DE40
[AC-wlan-ap-1]ap-name ap2
[AC-wlan-ap-1]ap-group ap-group1
Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power and antenna gain
configurations of the radio, Whether to continue? [Y/N]:y //Enter y to confirm.
Info: This operation may take a few seconds. Please wait for a moment.. done.
[AC-wlan-ap-1]quit
The security psk command configures WPA/WPA2 pre-shared key (PSK) authentication
and encryption.
Currently, both WPA and WPA2 are used. User terminals can be authenticated using
either WPA or WPA2. The PSK is set to HCIA-Datacom. User data is encrypted using
the AES encryption algorithm.
[AC-wlan-sec-prof-HCIA-WLAN]quit
# Create SSID profile HCIA-WLAN and set the SSID name to HCIA-WLAN.
[AC]wlan
[AC-wlan-view]ssid-profile name HCIA-WLAN
SSID profile HCIA-WLAN is created.
[AC-wlan-ssid-prof-HCIA-WLAN]ssid HCIA-WLAN
The SSID name is set to HCIA-WLAN.
Info: This operation may take a few seconds, please wait.done.
[AC-wlan-ssid-prof-HCIA-WLAN]quit
# Create VAP profile HCIA-WLAN, configure the data forwarding mode and service
VLAN, and apply the security profile and SSID profile to the VAP profile.
[AC]wlan
[AC-wlan-view]vap-profile name HCIA-WLAN
The forward-mode command configures the data forwarding mode in a VAP profile. By
default, the data forwarding mode is direct forwarding.
[AC-wlan-vap-prof-HCIA-WLAN]service-vlan vlan-id 101
The service-vlan command configures the service VLAN of a VAP. After a STA accesses
a WLAN, the user data forwarded by the AP carries the service-VLAN tag.
Info: This operation may take a few seconds, please wait.done.
[AC-wlan-vap-prof-HCIA-WLAN]security-profile HCIA-WLAN
Security profile HCIA-WLAN is bound.
Info: This operation may take a few seconds, please wait.done.
[AC-wlan-vap-prof-HCIA-WLAN]ssid-profile HCIA-WLAN
SSID profile HCIA-WLAN is bound.
Info: This operation may take a few seconds, please wait.done.
[AC-wlan-vap-prof-HCIA-WLAN]quit
# Bind the VAP profile to the AP group and apply configurations in VAP profile HCIA-
WLAN to radio 0 and radio 1 of the APs in the AP group.
[AC]wlan
[AC-wlan-view]ap-group name ap-group1
[AC-wlan-ap-group-ap-group1]vap-profile HCIA-WLAN wlan 1 radio all
The vap-profile command binds a VAP profile to a radio. After this command is
executed, all configurations in the VAP, including the configurations in the profiles bound
to the VAP, are delivered to the radios of APs.
Info: This operation may take a few seconds, please wait...done.
[AC-wlan-ap-group-ap-group1]quit
----End
Verification
Use an STA to access the WLAN with the SSID of HCIA-WLAN. Check the IP address
obtained by the STA and ping the IP address (10.0.1.1) of LoopBack0 on S1.
When the STA is connected to the AC, run the display station all command on the AC to
check the STA information.
Configuration Reference
Configuration on S1
#
sysname S1
#
vlan batch 100 to 101
#
dhcp enable
#
ip pool sta
gateway-list 192.168.101.254
network 192.168.101.0 mask 255.255.255.0
#
interface Vlanif101
ip address 192.168.101.254 255.255.255.0
dhcp select global
#
interface GigabitEthernet0/0/10
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
interface GigabitEthernet0/0/12
#
interface GigabitEthernet0/0/13
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
interface GigabitEthernet0/0/14
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
interface LoopBack0
ip address 10.0.1.1 255.255.255.255
#
return
Configuration on the AC
#
sysname AC
#
vlan batch 100 to 101
#
dhcp enable
#
ip pool ap
gateway-list 192.168.100.254
network 192.168.100.0 mask 255.255.255.0
#
interface Vlanif100
ip address 192.168.100.254 255.255.255.0
dhcp select global
#
interface GigabitEthernet0/0/10
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
wlan
security-profile name HCIA-WLAN
security wpa-wpa2 psk pass-phrase %^%#V-rr;CTW$X%,nJ/0jcmO!tRQ(pt;^8IN,z1||UU)%^%# aes
ssid-profile name HCIA-WLAN
ssid HCIA-WLAN
vap-profile name HCIA-WLAN
service-vlan vlan-id 101
ssid-profile HCIA-WLAN
security-profile HCIA-WLAN
ap-group name ap-group1
radio 0
vap-profile HCIA-WLAN wlan 1
radio 1
vap-profile HCIA-WLAN wlan 1
radio 2
vap-profile HCIA-WLAN wlan 1
ap-id 0 type-id 75 ap-mac 60f1-8a9c-2b40 ap-sn 21500831023GJ9022622
ap-name ap1
ap-group ap-group1
ap-id 1 type-id 75 ap-mac b4fb-f9b7-de40 ap-sn 21500831023GJ2001889
ap-name ap2
ap-group ap-group1
provision-ap
#
return
Configuration on S3
#
sysname S3
#
vlan batch 100 to 101
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
interface GigabitEthernet0/0/4
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
return
Configuration on S4
#
sysname S4
#
vlan batch 100 to 101
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
interface GigabitEthernet0/0/4
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
return
Quiz
In the current networking, if GigabitEthernet0/0/10 of the AC does not allow packets from
VLAN 101 to pass through, what is the impact on the access of STAs to S1? Why?
What if tunnel forwarding is used?
If STAs connected to AP1 and AP2 need to be assigned to different VLANs, what
operations need to be performed on the AC?
Appendix
AP State Description
commit-failed WLAN service configurations fail to be delivered to the AP after the AP
goes online on an AC.
committing WLAN service configurations are being delivered to the AP after the AP
goes online on an AC.
config WLAN service configurations are being delivered to the AP when the AP
is going online on an AC.
config-failed WLAN service configurations fail to be delivered to the AP when the AP
is going online on an AC.
download The AP is in upgrade state.
fault The AP fails to go online.
idle It is the initialization state of the AP before it establishes a link with the
AC for the first time.
name- The name of the AP conflicts with that of an existing AP.
conflicted
normal The AP is working properly.
standby The AP is in normal state on the standby AC.
unauth The AP is not authenticated.