01-03 Configuration Examples
01-03 Configuration Examples
3 Configuration Examples
Service Requirements
Enterprise users can access the network through WLANs, which is the basic
requirement of mobile office. Furthermore, users' services are not affected during
roaming in the coverage area.
Networking Requirements
● AC networking mode: Layer 2 networking in inline mode
● DHCP deployment mode: The AC functions as a DHCP server to assign IP
addresses to APs and STAs.
● Service data forwarding mode: direct forwarding
Figure 3-1 Networking for configuring Layer 2 direct forwarding in inline mode
Data Planning
Item Data
Managem VLAN100
ent VLAN
for APs
Service VLAN101
VLAN for
STAs
IP address 10.23.100.2-10.23.100.254/24
pool for
APs
Item Data
IP address 10.23.101.3-10.23.101.254/24
pool for
STAs
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure network interworking of the AC, APs, and other network devices.
2. Select Config Wizard to configure system parameters for the AC.
3. Select Config Wizard to configure the APs to go online on the AC.
4. Select Config Wizard to configure WLAN services on the AC.
5. Deliver the WLAN services to the APs and verify the configuration.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on the access switch to VLAN 100 and VLAN 101. The
default VLAN of GE0/0/1 is VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname Switch
[Switch] vlan batch 100 101
[Switch] interface gigabitethernet 0/0/1
[Switch-GigabitEthernet0/0/1] port link-type trunk
[Switch-GigabitEthernet0/0/1] port trunk pvid vlan 100
[Switch-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[Switch-GigabitEthernet0/0/1] port-isolate enable
[Switch-GigabitEthernet0/0/1] quit
[Switch] interface gigabitethernet 0/0/2
[Switch-GigabitEthernet0/0/2] port link-type trunk
[Switch-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[Switch-GigabitEthernet0/0/2] quit
# Add GE1/0/0 on Router to VLAN 101. Create VLANIF 101 and set its IP address
to 10.23.101.2/24.
<Huawei> system-view
[Huawei] sysname Router
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List, select Interface address
pool and select VLANIF 100.
# Click OK.
NOTE
# Under Static Route Table, click Create. The Create Static Route Table
page is displayed.
# Click OK.
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Set Security settings to Key (applicable to personal networks), select the AES
mode, and set the key.
# Click Finish.
Automatic channel and power calibration functions are enabled by default. The manual
channel and power configurations take effect only when these two functions are disabled.
# Choose Configuration > AP Config > AP Config > AP Info. The AP List
page is displayed.
# Click the ID of the AP whose channel and power need to be configured. The
AP customized settings page is displayed.
4. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
----End
Networking Requirements
● AC networking mode: Layer 2 networking in inline mode
● DHCP deployment mode: The AC functions as a DHCP server to assign IP
addresses to APs and STAs.
● Service data forwarding mode: tunnel forwarding
Figure 3-2 Networking for configuring Layer 2 tunnel forwarding in inline mode
Data Planning
Item Data
Managem VLAN100
ent VLAN
for APs
Item Data
Service VLAN101
VLAN for
STAs
IP address 10.23.100.2-10.23.100.254/24
pool for
APs
IP address 10.23.101.3-10.23.101.254/24
pool for
STAs
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure network interworking of the AC, APs, and other network devices.
2. Select Config Wizard to configure system parameters for the AC.
3. Select Config Wizard to configure the APs to go online on the AC.
4. Select Config Wizard to configure WLAN services on the AC.
5. Deliver the WLAN services to the APs and verify the configuration.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on the access switch to VLAN 100. The default VLAN
of GE0/0/1 is VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname Switch
[Switch] vlan batch 100
[Switch] interface gigabitethernet 0/0/1
[Switch-GigabitEthernet0/0/1] port link-type trunk
# Add GE1/0/0 on Router to VLAN 101. Create VLANIF 101 and set its IP address
to 10.23.101.2/24.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 101
[Router] interface gigabitethernet 1/0/0
[Router-GigabitEthernet1/0/0] port link-type trunk
[Router-GigabitEthernet1/0/0] port trunk allow-pass vlan 101
[Router-GigabitEthernet1/0/0] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.23.101.2 24
[Router-Vlanif101] quit
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List, select Interface address
pool and select VLANIF 100.
# Click OK.
NOTE
# Under Static Route Table, click Create. The Create Static Route Table
page is displayed.
# Click OK.
# Click Next.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 4 Configure WLAN services.
# Click Create. The Basic Information page is displayed.
# Set the SSID name, forwarding mode, and service VLAN.
# Click Finish.
Automatic channel and power calibration functions are enabled by default. The manual
channel and power configurations take effect only when these two functions are disabled.
# Choose Configuration > AP Config > AP Config > AP Info. The AP List
page is displayed.
# Click the ID of the AP whose channel and power need to be configured. The
AP customized settings page is displayed.
4. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
----End
Networking Requirements
● AC networking mode: Layer 2 networking in bypass mode
● DHCP deployment mode:
– The AC functions as a DHCP server to assign IP addresses to APs.
– The aggregation switch (SwitchB) functions as a DHCP server to assign IP
addresses to STAs.
● Service data forwarding mode: direct forwarding
Figure 3-3 Networking for configuring Layer 2 direct forwarding in bypass mode
Data Planning
Managem VLAN100
ent VLAN
for APs
Service VLAN101
VLAN for
STAs
IP address 10.23.100.2-10.23.100.254/24
pool for
APs
IP address 10.23.101.3-10.23.101.254/24
pool for
STAs
Item Data
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure network interworking of the AC, APs, and other network devices.
2. Select Config Wizard to configure system parameters for the AC.
3. Select Config Wizard to configure the APs to go online on the AC.
4. Select Config Wizard to configure WLAN services on the AC.
5. Deliver the WLAN services to the APs and verify the configuration.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on SwitchA to VLAN 100 and VLAN 101, and set the
PVID of GE0/0/1 to VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
[SwitchA] vlan batch 100 101
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk pvid vlan 100
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[SwitchA-GigabitEthernet0/0/1] port-isolate enable
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[SwitchA-GigabitEthernet0/0/2] quit
# Add GE0/0/1 on SwitchB (aggregation switch) to VLAN 100 and VLAN 101,
GE0/0/2 to VLAN100 and GE0/0/3 to VLAN 101.
<HUAWEI> system-view
[HUAWEI] sysname SwitchB
[SwitchB] vlan batch 100 101
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] port link-type trunk
[SwitchB-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[SwitchB-GigabitEthernet0/0/1] quit
# Add GE1/0/0 on Router to VLAN 101. Create VLANIF 101 and set its IP address
to 10.23.101.2/24.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 101
[Router] interface gigabitethernet 1/0/0
[Router-GigabitEthernet1/0/0] port link-type trunk
[Router-GigabitEthernet1/0/0] port trunk allow-pass vlan 101
[Router-GigabitEthernet1/0/0] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.23.101.2 24
[Router-Vlanif101] quit
Step 2 Configure a DHCP server to assign IP addresses to STAs and specify the gateway
for the STAs.
# On SwitchB, configure VLANIF 101 to assign IP addresses to STAs and set the
default gateway address of STAs to 10.23.101.2.
NOTE
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
[SwitchB] dhcp enable
[SwitchB] interface vlanif 101
[SwitchB-Vlanif101] ip address 10.23.101.1 24
[SwitchB-Vlanif101] dhcp select interface
[SwitchB-Vlanif101] dhcp server gateway-list 10.23.101.2
[SwitchB-Vlanif101] quit
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List. Select Interface address
pool and select VLANIF 100.
# Click OK.
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Set Security settings to Key (applicable to personal networks), select the AES
mode, and set the key.
# Click Finish.
Automatic channel and power calibration functions are enabled by default. The manual
channel and power configurations take effect only when these two functions are disabled.
# Choose Configuration > AP Config > AP Config > AP Info. The AP List
page is displayed.
# Click the ID of the AP whose channel and power need to be configured. The
AP customized settings page is displayed.
4. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
----End
Networking Requirements
● AC networking mode: Layer 2 networking in bypass mode
● DHCP deployment mode:
– The AC functions as a DHCP server to assign IP addresses to APs.
– The aggregation switch (SwitchB) functions as a DHCP server to assign IP
addresses to STAs.
● Service data forwarding mode: tunnel forwarding
Figure 3-4 Networking for configuring Layer 2 tunnel forwarding in bypass mode
Data Planning
IP address 10.23.100.2-10.23.100.254/24
pool for
APs
IP address 10.23.101.3-10.23.101.254/24
pool for
STAs
Item Data
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure network interworking of the AC, APs, and other network devices.
2. Select Config Wizard to configure system parameters for the AC.
3. Select Config Wizard to configure the APs to go online on the AC.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on SwitchA to VLAN 100. The default VLAN of
GE0/0/1 is VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
[SwitchA] vlan batch 100
# Add GE0/0/1 and GE0/0/2 on SwitchB (aggregation switch) to VLAN 100, and
GE0/0/2 and GE0/0/3 to VLAN 101.
<HUAWEI> system-view
[HUAWEI] sysname SwitchB
[SwitchB] vlan batch 100 101
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] port link-type trunk
[SwitchB-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[SwitchB-GigabitEthernet0/0/1] quit
[SwitchB] interface gigabitethernet 0/0/2
[SwitchB-GigabitEthernet0/0/2] port link-type trunk
[SwitchB-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[SwitchB-GigabitEthernet0/0/2] quit
[SwitchB] interface gigabitethernet 0/0/3
[SwitchB-GigabitEthernet0/0/3] port link-type trunk
[SwitchB-GigabitEthernet0/0/3] port trunk allow-pass vlan 101
[SwitchB-GigabitEthernet0/0/3] quit
# Add GE1/0/0 on Router to VLAN 101. Create VLANIF 101 and set its IP address
to 10.23.101.2/24.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 101
[Router] interface gigabitethernet 1/0/0
[Router-GigabitEthernet1/0/0] port link-type trunk
[Router-GigabitEthernet1/0/0] port trunk allow-pass vlan 101
[Router-GigabitEthernet1/0/0] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.23.101.2 24
[Router-Vlanif101] quit
Step 2 Configure a DHCP server to assign IP addresses to STAs and specify the gateway
for the STAs.
# On SwitchB, configure VLANIF 101 to assign IP addresses to STAs and set the
default gateway address of STAs to 10.23.101.2.
NOTE
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
[SwitchB] dhcp enable
[SwitchB] interface vlanif 101
[SwitchB-Vlanif101] ip address 10.23.101.1 24
[SwitchB-Vlanif101] dhcp select interface
[SwitchB-Vlanif101] dhcp server gateway-list 10.23.101.2
[SwitchB-Vlanif101] quit
# Choose Configuration > Config Wizard > AC. The Basic AC Configuration
page is displayed.
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List. Select Interface address
pool and select VLANIF 100.
# Click OK.
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 5 Configure WLAN services.
# Click Create. The Basic Information page is displayed.
# Set the SSID name, forwarding mode, and service VLAN.
# Click Finish.
Step 6 Enable radio calibration to allow APs to automatically select the optimal channels
and power.
1. Enable automatic channel and power calibration functions of radios.
NOTE
Radio 0 is used as an example. The configuration for other radios is similar and will not be
mentioned here.
# Click the AP group name ap-group1 in the AP group list. Choose Radio
Management > Radio 0. The Radio 0 Settings(2.4G) page is displayed.
NOTE
By default, the global automatic channel and power calibration functions are enabled.
Therefore, select Follow. If the global automatic channel and power calibration functions
are disabled, choose Configuration > AP Config > Radio Planning/Calibration > Radio
Calibration Configuration, and set Calibration to ON.
# Click next to 2G Radio Profile. Select Air Scan Profile. The Air Scan
Profile page is displayed. Click Create. On the Create Air Scan Profile page
that is displayed, enter the profile name wlan-airscan and click OK. The air
scan profile configuration page is displayed.
# Enable scanning, and configure the probe channel set, scan interval, and
scan duration.
# Radio calibration stops one hour after the radio calibration is manually
triggered.
# Choose Configuration > AP Config > Radio Planning/Calibration > Radio
Calibration Configuration. The Radio Calibration Configuration page is
displayed. The Radio Calibration Configuration page is displayed. On the
Radio Calibration Configuration page, set Triggering condition to
Scheduled and set the start time to 3:00 am.
4. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
----End
Networking Requirements
● AC networking mode: Layer 3 networking in inline mode
● DHCP deployment mode:
– The AC functions as a DHCP server to assign IP addresses to APs.
– The aggregation switch (SwitchB) functions as a DHCP server to assign IP
addresses to STAs.
● Service data forwarding mode: direct forwarding
Figure 3-5 Networking for configuring Layer 3 direct forwarding in inline mode
Data Planning
Item Data
Item Data
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure network interworking of the AC, APs, and other network devices.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure the switches and router.
# Add GE0/0/1 and GE0/0/2 on SwitchA to VLAN 10, VLAN 101, and VLAN 102.
The default VLAN of GE0/0/1 is VLAN 10.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
[SwitchA] vlan batch 10 101 102
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk pvid vlan 10
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 10 101 102
[SwitchA-GigabitEthernet0/0/1] port-isolate enable
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 10 101 102
[SwitchA-GigabitEthernet0/0/2] quit
# Add GE0/0/1 on SwitchB to VLAN 10, VLAN 101, and VLAN 102, and GE0/0/2 to
VLAN 100, VLAN 101, and VLAN 102. Create VLANIF 100 and set its IP address to
10.23.100.2/24.
<HUAWEI> system-view
[HUAWEI] sysname SwitchB
[SwitchB] vlan batch 10 100 101 102
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] port link-type trunk
[SwitchB-GigabitEthernet0/0/1] port trunk allow-pass vlan 10 101 102
[SwitchB-GigabitEthernet0/0/1] quit
[SwitchB] interface gigabitethernet 0/0/2
[SwitchB-GigabitEthernet0/0/2] port link-type trunk
[SwitchB-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101 102
[SwitchB-GigabitEthernet0/0/2] quit
[SwitchB] interface vlanif 100
[SwitchB-Vlanif100] ip address 10.23.100.2 24
[SwitchB-Vlanif100] quit
# On Router, add GE1/0/0 to VLAN 101 and VLAN 102. Create VLANIF 101 and
VLANIF 102, and set the IP address of VLANIF 101 to 10.23.101.2/24 and the IP
address of VLANIF 102 to 10.23.102.2/24.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 101 102
[Router] interface gigabitethernet 1/0/0
[Router-GigabitEthernet1/0/0] port link-type trunk
[Router-GigabitEthernet1/0/0] port trunk allow-pass vlan 101 102
[Router-GigabitEthernet1/0/0] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.23.101.2 24
[Router-Vlanif101] quit
[Router] interface vlanif 102
[Router-Vlanif102] ip address 10.23.102.2 24
[Router-Vlanif102] quit
Step 2 Configure the DHCP services to assign IP addresses to APs and STAs.
# On SwitchB, configure DHCP relay to assign IP addresses on behalf of the AC.
[SwitchB] dhcp enable
[SwitchB] interface vlanif 10
[SwitchB-Vlanif10] ip address 10.23.10.1 24
[SwitchB-Vlanif10] dhcp select relay
[SwitchB-Vlanif10] dhcp relay server-ip 10.23.100.1
[SwitchB-Vlanif10] quit
NOTE
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
[SwitchB] interface vlanif 101
[SwitchB-Vlanif101] ip address 10.23.101.1 24
[SwitchB-Vlanif101] dhcp select interface
[SwitchB-Vlanif101] dhcp server gateway-list 10.23.101.2
[SwitchB-Vlanif101] quit
[SwitchB] interface vlanif 102
[SwitchB-Vlanif102] ip address 10.23.102.1 24
[SwitchB-Vlanif102] dhcp select interface
[SwitchB-Vlanif102] dhcp server gateway-list 10.23.102.2
[SwitchB-Vlanif102] quit
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click OK.
# Click Create under DHCPv4 Address Pool List and configure a global
address pool named huawei.
– IP address pool subnet: 10.23.10.0
– Option 43: ASCII, IP address of 10.23.100.1
– Gateway IP address: 10.23.10.1
# Click OK.
# Under Static Route Table, click Create. The Create Static Route Table
page is displayed.
# Set Destination IP to 10.23.10.0, Subnet Mask to 24(255.255.255.0), and
Next hop address to 10.23.100.2.
# Click OK.
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 5 Configure WLAN services.
# Click Create. The Basic Information page is displayed.
# Set the SSID name, forwarding mode, and service VLAN. Set Service VLAN to
VLAN Pool. Click Create next to VLAN Pool. The Create VLAN Pool page is
displayed.
# Set VLAN pool name to sta-pool and VLAN assignment mode to Hash. Add
VLANs 101 and 102.
# Click OK. In the dialog box that is displayed, click OK.
# Click Finish.
Step 6 Enable radio calibration to allow APs to automatically select the optimal channels
and power.
1. Enable automatic channel and power calibration functions of radios.
NOTE
Radio 0 is used as an example. The configuration for other radios is similar and will not be
mentioned here.
# Click the AP group name ap-group1 in the AP group list. Choose Radio
Management > Radio 0. The Radio 0 Settings(2.4G) page is displayed.
NOTE
By default, the global automatic channel and power calibration functions are enabled.
Therefore, select Follow. If the global automatic channel and power calibration functions
are disabled, choose Configuration > AP Config > Radio Planning/Calibration > Radio
Calibration Configuration, and set Calibration to ON.
# Click next to 2G Radio Profile. Select Air Scan Profile. The Air Scan
Profile page is displayed. Click Create. On the Create Air Scan Profile page
that is displayed, enter the profile name wlan-airscan and click OK. The air
scan profile configuration page is displayed.
# Enable scanning, and configure the probe channel set, scan interval, and
scan duration.
# Click Immediate Calibration. In the dialog box that is displayed, click OK.
# Choose Monitoring > Radio. In Radio List, check the channel and power of
the radio. In this example, three APs have gone online on the AC, and the list
shows that AP channels have been automatically assigned through the radio
calibration function.
# Radio calibration stops one hour after the radio calibration is manually
triggered.
3. The STA can associate with the WLAN and obtain an IP address
10.23.101.x/24, and its gateway address is 10.23.101.2.
4. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
----End
Networking Requirements
● AC networking mode: Layer 3 networking in inline mode
● DHCP deployment mode: The AC functions as a DHCP server to assign IP
addresses to APs and STAs.
● Service data forwarding mode: tunnel forwarding
Figure 3-6 Networking for configuring Layer 3 tunnel forwarding in inline mode
Data Planning
Item Data
Item Data
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure network interworking of the AC, APs, and other network devices.
2. Configure a VLAN pool for service VLANs.
3. Select Config Wizard to configure system parameters for the AC.
4. Select Config Wizard to configure the APs to go online on the AC.
5. Select Config Wizard to configure WLAN services on the AC.
6. Deliver the WLAN services to the APs and verify the configuration.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on SwitchA (access switch) to VLAN 10. The default
VLAN of GE0/0/1 is VLAN 10.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
[SwitchA] vlan batch 10
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk pvid vlan 10
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 10
[SwitchA-GigabitEthernet0/0/1] port-isolate enable
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 10
[SwitchA-GigabitEthernet0/0/2] quit
# On Router, add GE1/0/0 to VLAN 101 and VLAN 102. Create VLANIF 101 and
VLANIF 102, and set the IP address of VLANIF 101 to 10.23.101.2/24 and the IP
address of VLANIF 102 to 10.23.102.2/24.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 101 102
[Router] interface gigabitethernet 1/0/0
[Router-GigabitEthernet1/0/0] port link-type trunk
[Router-GigabitEthernet1/0/0] port trunk allow-pass vlan 101 102
[Router-GigabitEthernet1/0/0] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.23.101.2 24
[Router-Vlanif101] quit
[Router] interface vlanif 102
[Router-Vlanif102] ip address 10.23.102.2 24
[Router-Vlanif102] quit
# Choose Configuration > Config Wizard > AC. The Basic AC Configuration
page is displayed.
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Set the IP address of VLANIF 101 to 10.23.101.1/24 and that of VLANIF 102
to 10.23.102.1/24 in the same way.
# Click Create under DHCPv4 Address Pool List, select Interface address
pool and select VLANIF 101.
# Create an interface address pool in the same way and select VLANIF 102.
# Click Create under DHCPv4 Address Pool List and configure a global
address pool named huawei.
– IP address pool subnet: 10.23.10.0
– Option 43: ASCII, IP address of 10.23.100.1
– Gateway IP address: 10.23.10.1
NOTE
# Click OK.
# Under Static Route Table, click Create. The Create Static Route Table
page is displayed.
# Set Destination IP to 10.23.10.0, Subnet Mask to 24(255.255.255.0), and
Next hop address to 10.23.100.2.
# Click OK.
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 5 Configure WLAN services.
# Click Create. The Basic Information page is displayed.
# Set the SSID name, forwarding mode, and service VLAN. Set Service VLAN to
VLAN Pool. Click Create next to VLAN Pool. The Create VLAN Pool page is
displayed.
# Set VLAN pool name to sta-pool and VLAN assignment mode to Hash. Add
VLANs 101 and 102.
# Click OK. In the dialog box that is displayed, click OK.
# Set Security settings to Key (applicable to personnel networks) and set the
key.
# Click Finish.
Step 6 Enable radio calibration to allow APs to automatically select the optimal channels
and power.
1. Enable automatic channel and power calibration functions of radios.
NOTE
Radio 0 is used as an example. The configuration for other radios is similar and will not be
mentioned here.
# Click the AP group name ap-group1 in the AP group list. Choose Radio
Management > Radio 0. The Radio 0 Settings(2.4G) page is displayed.
NOTE
By default, the global automatic channel and power calibration functions are enabled.
Therefore, select Follow. If the global automatic channel and power calibration functions
are disabled, choose Configuration > AP Config > Radio Planning/Calibration > Radio
Calibration Configuration, and set Calibration to ON.
# Click next to 2G Radio Profile. Select Air Scan Profile. The Air Scan
Profile page is displayed. Click Create. On the Create Air Scan Profile page
that is displayed, enter the profile name wlan-airscan and click OK. The air
scan profile configuration page is displayed.
# Enable scanning, and configure the probe channel set, scan interval, and
scan duration.
# Click Immediate Calibration. In the dialog box that is displayed, click OK.
# Choose Monitoring > Radio. In Radio List, check the channel and power of
the radio. In this example, three APs have gone online on the AC, and the list
shows that AP channels have been automatically assigned through the radio
calibration function.
# Radio calibration stops one hour after the radio calibration is manually
triggered.
3. The STA can associate with the WLAN and obtain an IP address
10.23.101.x/24, and its gateway address is 10.23.101.1.
4. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
----End
Networking Requirements
● AC networking mode: Layer 3 networking in bypass mode
● DHCP deployment mode:
– The AC functions as a DHCP server to assign IP addresses to APs.
– The aggregation switch (SwitchB) functions as a DHCP server to assign IP
addresses to STAs.
● Service data forwarding mode: direct forwarding
Figure 3-7 Networking for configuring Layer 3 direct forwarding in bypass mode
Data Planning
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure network interworking of the AC, APs, and other network devices.
2. Configure a VLAN pool for service VLANs.
3. Select Config Wizard to configure system parameters for the AC.
4. Select Config Wizard to configure the APs to go online on the AC.
5. Select Config Wizard to configure WLAN services on the AC.
6. Deliver the WLAN services to the APs and verify the configuration.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on SwitchA to VLAN 10, VLAN 101, and VLAN 102.
The default VLAN of GE0/0/1 is VLAN 10.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
[SwitchA] vlan batch 10 101 102
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk pvid vlan 10
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 10 101 102
[SwitchA-GigabitEthernet0/0/1] port-isolate enable
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 10 101 102
[SwitchA-GigabitEthernet0/0/2] quit
# On SwitchB (aggregation switch), add GE0/0/1 to VLAN 10, VLAN 101, and
VLAN 102, GE0/0/2 to VLAN 100, and GE0/0/3 to VLAN 101 and VLAN 102. Create
VLANIF 100 and set its IP address to 10.23.100.2/24.
<HUAWEI> system-view
[HUAWEI] sysname SwitchB
[SwitchB] vlan batch 10 100 101 102
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] port link-type trunk
[SwitchB-GigabitEthernet0/0/1] port trunk allow-pass vlan 10 101 102
[SwitchB-GigabitEthernet0/0/1] quit
[SwitchB] interface gigabitethernet 0/0/2
[SwitchB-GigabitEthernet0/0/2] port link-type trunk
[SwitchB-GigabitEthernet0/0/2] port trunk allow-pass vlan 100
[SwitchB-GigabitEthernet0/0/2] quit
[SwitchB] interface gigabitethernet 0/0/3
[SwitchB-GigabitEthernet0/0/3] port link-type trunk
[SwitchB-GigabitEthernet0/0/3] port trunk allow-pass vlan 101 102
[SwitchB-GigabitEthernet0/0/3] quit
[SwitchB] interface vlanif 100
[SwitchB-Vlanif100] ip address 10.23.100.2 24
[SwitchB-Vlanif100] quit
# On Router, add GE1/0/0 to VLAN 101 and VLAN 102. Create VLANIF 101 and
VLANIF 102, and set the IP address of VLANIF 101 to 10.23.101.2/24 and the IP
address of VLANIF 102 to 10.23.102.2/24.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 101 102
[Router] interface gigabitethernet 1/0/0
[Router-GigabitEthernet1/0/0] port link-type trunk
[Router-GigabitEthernet1/0/0] port trunk allow-pass vlan 101 102
[Router-GigabitEthernet1/0/0] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.23.101.2 24
[Router-Vlanif101] quit
[Router] interface vlanif 102
[Router-Vlanif102] ip address 10.23.102.2 24
[Router-Vlanif102] quit
Step 2 Configure the DHCP services to assign IP addresses to APs and STAs.
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
[SwitchB] interface vlanif 101
[SwitchB-Vlanif101] ip address 10.23.101.1 24
[SwitchB-Vlanif101] dhcp select interface
[SwitchB-Vlanif101] dhcp server gateway-list 10.23.101.2
[SwitchB-Vlanif101] quit
[SwitchB] interface vlanif 102
[SwitchB-Vlanif102] ip address 10.23.102.1 24
[SwitchB-Vlanif102] dhcp select interface
[SwitchB-Vlanif102] dhcp server gateway-list 10.23.102.2
[SwitchB-Vlanif102] quit
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click OK.
# Click Create under DHCPv4 Address Pool List and configure a global
address pool named huawei.
– IP address pool subnet: 10.23.10.0
– Option 43: ASCII, IP address of 10.23.100.1
– Gateway IP address: 10.23.10.1
# Click OK.
# Under Static Route Table, click Create. The Create Static Route Table
page is displayed.
# Set Destination IP to 10.23.10.0, Subnet Mask to 24(255.255.255.0), and
Next hop address to 10.23.100.2.
# Click OK.
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 5 Configure WLAN services.
# Click Create. The Basic Information page is displayed.
# Set the SSID name, forwarding mode, and service VLAN. Set Service VLAN to
VLAN Pool. Click Create next to VLAN Pool. The Create VLAN Pool page is
displayed.
# Set VLAN pool name to sta-pool and VLAN assignment mode to Hash. Add
VLANs 101 and 102.
# Click OK. In the dialog box that is displayed, click OK.
# Click Finish.
Automatic channel and power calibration functions are enabled by default. The manual
channel and power configurations take effect only when these two functions are disabled.
# Choose Configuration > AP Config > AP Config > AP Info. The AP List
page is displayed.
# Click the ID of the AP whose channel and power need to be configured. The
AP customized settings page is displayed.
4. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
----End
Networking Requirements
● AC networking mode: Layer 3 bypass mode
● DHCP deployment mode:
– The AC functions as a DHCP server to assign IP addresses to APs.
– The aggregation switch (SwitchB) functions as a DHCP server to assign IP
addresses to STAs.
● Service data forwarding mode: tunnel forwarding
Figure 3-8 Networking for configuring Layer 3 tunnel forwarding in bypass mode
Data Planning
Item Data
Item Data
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure network interworking of the AC, APs, and other network devices.
2. Configure a VLAN pool for service VLANs.
3. Select Config Wizard to configure system parameters for the AC.
4. Select Config Wizard to configure the APs to go online on the AC.
5. Select Config Wizard to configure WLAN services on the AC.
6. Deliver the WLAN services to the APs and verify the configuration.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on SwitchA (access switch) to VLAN 10. The default
VLAN of GE0/0/1 is VLAN 10.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
[SwitchA] vlan batch 10
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk pvid vlan 10
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 10
[SwitchA-GigabitEthernet0/0/1] port-isolate enable
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 10
[SwitchA-GigabitEthernet0/0/2] quit
# On Router, add GE1/0/0 to VLAN 101 and VLAN 102. Create VLANIF 101 and
VLANIF 102, and set the IP address of VLANIF 101 to 10.23.101.2/24 and the IP
address of VLANIF 102 to 10.23.102.2/24.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 101 102
[Router] interface gigabitethernet 1/0/0
[Router-GigabitEthernet1/0/0] port link-type trunk
[Router-GigabitEthernet1/0/0] port trunk allow-pass vlan 101 102
[Router-GigabitEthernet1/0/0] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.23.101.2 24
[Router-Vlanif101] quit
[Router] interface vlanif 102
[Router-Vlanif102] ip address 10.23.102.2 24
[Router-Vlanif102] quit
Step 2 Configure the DHCP services to assign IP addresses to APs and STAs.
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
[SwitchB] interface vlanif 101
[SwitchB-Vlanif101] ip address 10.23.101.1 24
[SwitchB-Vlanif101] dhcp select interface
[SwitchB-Vlanif101] dhcp server gateway-list 10.23.101.2
[SwitchB-Vlanif101] quit
[SwitchB] interface vlanif 102
[SwitchB-Vlanif102] ip address 10.23.102.1 24
[SwitchB-Vlanif102] dhcp select interface
[SwitchB-Vlanif102] dhcp server gateway-list 10.23.102.2
[SwitchB-Vlanif102] quit
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click OK.
# Click Create under DHCPv4 Address Pool List and configure a global
address pool named huawei.
– IP address pool subnet: 10.23.10.0
– Option 43: ASCII, IP address of 10.23.100.1
– Gateway IP address: 10.23.10.1
# Click OK.
# Under Static Route Table, click Create. The Create Static Route Table
page is displayed.
# Set Destination IP to 10.23.10.0, Subnet Mask to 24(255.255.255.0), and
Next hop address to 10.23.100.2.
# Click OK.
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 5 Configure WLAN services.
# Click Create. The Basic Information page is displayed.
# Set the SSID name, forwarding mode, and service VLAN. Set Service VLAN to
VLAN Pool. Click Create next to VLAN Pool. The Create VLAN Pool page is
displayed.
# Set VLAN pool name to sta-pool and VLAN assignment mode to Hash. Add
VLANs 101 and 102.
# Click OK. In the dialog box that is displayed, click OK.
# Click Finish.
Automatic channel and power calibration functions are enabled by default. The manual
channel and power configurations take effect only when these two functions are disabled.
# Choose Configuration > AP Config > AP Config > AP Info. The AP List
page is displayed.
# Click the ID of the AP whose channel and power need to be configured. The
AP customized settings page is displayed.
4. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
----End
Networking Requirements
● AC networking mode: Layer 2 networking in inline mode
● DHCP deployment mode: The AC functions as a DHCP server to assign IP
addresses to the central AP, RUs, and STAs.
● Service data forwarding mode: tunnel forwarding
● Uplink interfaces of a central AP have a high transmission rate, and connect
to an AC and forward service traffic of all connected RUs. Downlink interfaces
of a central AP connect to RUs. If the number of downlink interfaces of the
central AP is insufficient, one downlink interface can be connected to an
uplink interface of a PoE switch, through which RUs can connect the central
AP. This increases the number of connected RUs. For example, an
AD9431DN-24X provides four 10GE uplink interfaces numbered from 0 to 3
and 24 GE downlink interfaces numbered from 0 to 23.
Data Planning
Item Data
IP address 10.23.100.2-10.23.100.254/24
pool for
central
APs and
RUs
IP address 10.23.101.2-10.23.101.254/24
pool for
STAs
Configuration Roadmap
1. Configure the AC, RUs, central APs, and network devices to communicate at
Layer 2.
2. Select Config Wizard to configure system parameters for the AC.
3. Select Config Wizard to configure the central APs and RUs to go online on
the AC.
4. Select Config Wizard to configure WLAN services on the AC.
5. Deliver the WLAN services to the central APs and RUs, and verify the
configuration.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure the network devices.
# Add GE1/0/0 on Router to VLAN 101. Create VLANIF 101 and set its IP address
to 10.23.101.2/24.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 101
[Router] interface gigabitethernet 1/0/0
[Router-GigabitEthernet1/0/0] port link-type trunk
[Router-GigabitEthernet1/0/0] port trunk allow-pass vlan 101
[Router-GigabitEthernet1/0/0] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.23.101.2 24
[Router-Vlanif101] quit
NOTE
On the network between RUs and the central AP, service packets of STAs must be properly
forwarded. In this example, the tunnel forwarding mode is used. Therefore, service VLAN packets
do not need to be permitted between the central AP and RUs. If the direct forwarding mode is
used, configure the network between the central AP and RUs to permit service VLAN packets
depending on the central AP model.
● If the central AP is a gigabit AP (such as the AD9430DN-24), such configuration is not
required on the switch. Because all service packets from RUs are first sent to the central AP
through MAC-IN-MAC tunnels, these packets need to be permitted only from the upstream
direction of the central AP.
● If the central AP is a 10GE AP (such as the AD9431DN-24X), add uplink and downlink
interfaces on the switch to the service VLAN. Because service packets are forwarded starting
from the upstream direction of RUs, these packets must be permitted from the upstream
direction of RUs.
# Choose Configuration > Config Wizard > AC. The Basic AC Configuration
page is displayed.
NOTE
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List, select Interface address
pool and select VLANIF 100.
# Click OK.
NOTE
# Under Static Route Table, click Create. The Create Static Route Table
page is displayed.
# Click OK.
# Click Next.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 4 Configure WLAN services.
# Click Create. The Basic Information page is displayed.
# Set the SSID name, forwarding mode, and service VLAN.
# Click Finish.
Automatic channel and power calibration functions are enabled by default. The manual
channel and power configurations take effect only when these two functions are disabled.
# Choose Configuration > AP Config > AP Config > AP Info. The AP List
page is displayed.
# Click the ID of the AP whose channel and power need to be configured. The
AP customized settings page is displayed.
4. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
----End
More Information
(Video) Example for Configuring AC and central AP Distributed Networking
Networking Requirements
● AC networking mode: NAT traversal between the AC at the headquarters and
APs in the branch
● DHCP deployment mode: Router_1 functions as a DHCP server to assign IP
addresses to APs and STAs.
● Service data forwarding mode: direct forwarding
Figure 3-10 Networking for configuring NAT traversal between the AC and APs
Data Planning
Item Data
Configuration Roadmap
1. Configure network interworking of the AC, APs, and other network devices.
2. Configure NAT for address translation.
3. Select Config Wizard to configure system parameters for the AC.
4. Select Config Wizard to configure the APs to go online on the AC.
5. Select Config Wizard to configure WLAN services on the AC.
6. Verify the configuration.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
Procedure
Step 1 Configure the network devices.
# On Switch, add GE0/0/1, GE0/0/2, and GE0/0/3 to VLAN 100 and VLAN 101.
VLAN 100 is the default VLAN of GE0/0/1 and GE0/0/2.
<HUAWEI> system-view
[HUAWEI] sysname Switch
[Switch] vlan batch 100 101
[Switch] interface gigabitethernet 0/0/1
[Switch-GigabitEthernet0/0/1] port link-type trunk
[Switch-GigabitEthernet0/0/1] port trunk pvid vlan 100
[Switch-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[Switch-GigabitEthernet0/0/1] port-isolate enable
[Switch-GigabitEthernet0/0/1] quit
[Switch] interface gigabitethernet 0/0/2
[Switch-GigabitEthernet0/0/2] port link-type trunk
[Switch-GigabitEthernet0/0/2] port trunk pvid vlan 100
[Switch-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[Switch-GigabitEthernet0/0/2] port-isolate enable
[Switch-GigabitEthernet0/0/2] quit
[Switch] interface gigabitethernet 0/0/3
[Switch-GigabitEthernet0/0/3] port link-type trunk
[Switch-GigabitEthernet0/0/3] port trunk allow-pass vlan 100 101
[Switch-GigabitEthernet0/0/3] quit
# On Router_1, add GE1/0/0 to VLAN 100 and VLAN 101. If the peer end of
GE0/0/1 is at 2.2.2.2/24, set the IP address of GE0/0/1 to 2.2.2.1/24.
<Huawei> system-view
[Huawei] sysname Router_1
[Router_1] vlan batch 100 101
[Router_1] interface gigabitethernet1/0/0
[Router_1-GigabitEthernet1/0/0] port link-type trunk
[Router_1-GigabitEthernet1/0/0] port trunk allow-pass vlan 100 to 101
[Router_1-GigabitEthernet1/0/0] quit
[Router_1] interface gigabitethernet0/0/1
[Router_1-GigabitEthernet0/0/1] ip address 2.2.2.1 255.255.255.0
[Router_1-GigabitEthernet0/0/1] quit
# Configure a default route with the next hop address 2.2.2.2 on Router_1.
[Router_1] ip route-static 0.0.0.0 0.0.0.0 2.2.2.2
# Configure a default route with the next hop address 3.3.3.2 on Router_2.
[Router_2] ip route-static 0.0.0.0 0.0.0.0 3.3.3.2
NOTE
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
# Click Create under DHCPv4 Address Pool List, select Interface address
pool and select VLANIF 200.
NOTE
# Under Static Route Table, click Create. The Create Static Route Table
page is displayed.
# Set Destination IP to 0.0.0.0, Subnet Mask to 0(0.0.0.0), and Next hop
address to 10.23.200.2.
# Click OK.
# Click Next.
# Set AC source address to VLANIF. Click the browse button and select
Vlanif200.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 6 Configure WLAN services.
# Click Create. The Basic Information page is displayed.
# Set the SSID name, forwarding mode, and service VLAN.
# Click Finish.
Automatic channel and power calibration functions are enabled by default. The manual
channel and power configurations take effect only when these two functions are disabled.
# Choose Configuration > AP Config > AP Config > AP Info. The AP List
page is displayed.
# Click the ID of the AP whose channel and power need to be configured. The
AP customized settings page is displayed.
4. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
----End
Service Requirements
Enterprise users can access the network through WLANs, which is the basic
requirement of mobile office. Furthermore, users' services are not affected during
roaming in the coverage area.
APs are located in an enterprise branch, while the AC is located at the
headquarters. Administrators require unified AP management by the AC and
protection on traffic exchanged between the branch and headquarters. Therefore,
an IPSec tunnel is established between the branch and headquarters to protect
traffic.
Networking Requirements
● AC networking mode: IPSec tunnel between the AC at the headquarters and
APs in the branch.
● DHCP deployment mode: Router_1 functions as a DHCP server to assign IP
addresses to APs and STAs.
● Service data forwarding mode: direct forwarding
Figure 3-11 Networking for configuring VPN traversal between the AC and APs
Data Planning
Item Data
Item Data
Configuration Roadmap
1. Configure network interworking of the AC, APs, and other network devices.
2. Configure IPSec parameters to set up an IPSec tunnel.
a. Configure an IP address and a static route on each interface to
implement communication between both ends.
b. Configure ACLs and define the data flows to be protected by the IPSec
tunnel.
c. Configure an IPSec proposal to define the traffic protection method.
d. Configure IKE peers and define the attributes used for IKE negotiation.
e. Configure an IPSec policy, and apply the ACL, IPSec proposal, and IKE
peers to the IPSec policy to define the data flows to be protected and
protection method.
f. Apply the IPSec policy to the interface so that the interface can protect
traffic.
3. Configure the APs to go online.
a. Create an AP group and add APs that require the same configuration to
the group for unified configuration.
b. Configure AC system parameters, including the country code and source
interface used by the AC to communicate with the APs.
c. Configure the AP authentication mode and import the APs offline to
allow the APs to go online.
4. Configure WLAN service parameters for STAs to access the WLAN.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
Procedure
Step 1 Configure the network devices.
# On Switch, add GE0/0/1 and GE0/0/2 to VLAN 100 and VLAN 101. VLAN 100 is
the default VLAN of GE0/0/1.
<HUAWEI> system-view
[HUAWEI] sysname Switch
[Switch] vlan batch 100 101
[Switch] interface gigabitethernet 0/0/1
[Switch-GigabitEthernet0/0/1] port link-type trunk
[Switch-GigabitEthernet0/0/1] port trunk pvid vlan 100
[Switch-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[Switch-GigabitEthernet0/0/1] port-isolate enable
[Switch-GigabitEthernet0/0/1] quit
[Switch] interface gigabitethernet 0/0/2
[Switch-GigabitEthernet0/0/2] port link-type trunk
[Switch-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[Switch-GigabitEthernet0/0/2] quit
# On Router_1, add GE1/0/0 to VLAN 100 and VLAN 101. If the peer end of
GE0/0/1 is at 192.168.1.2/24, set the IP address of GE0/0/1 to 192.168.1.1/24.
<Huawei> system-view
[Huawei] sysname Router_1
[Router_1] vlan batch 100 101
[Router_1] interface gigabitethernet 1/0/0
[Router_1-GigabitEthernet1/0/0] port link-type trunk
[Router_1-GigabitEthernet1/0/0] port trunk allow-pass vlan 100 101
[Router_1-GigabitEthernet1/0/0] quit
[Router_1] interface gigabitethernet 0/0/1
[Router_1-GigabitEthernet0/0/1] ip address 192.168.1.1 255.255.255.0
[Router_1-GigabitEthernet0/0/1] quit
# Configure a default route with the next hop address 192.168.1.2 on Router_1.
[Router_1] ip route-static 0.0.0.0 0.0.0.0 192.168.1.2
# On Router_2, add GE1/0/0 to VLAN 200. Create VLANIF 200 and set its IP
address to 10.23.200.2/24. If the peer end of GE0/0/1 is at 192.168.2.2/24, set the
IP address of GE0/0/1 to 192.168.2.1/24.
<Huawei> system-view
[Huawei] sysname Router_2
[Router_2] vlan batch 200
[Router_2] interface gigabitethernet 1/0/0
[Router_2-GigabitEthernet1/0/0] port link-type trunk
[Router_2-GigabitEthernet1/0/0] port trunk allow-pass vlan 200
[Router_2-GigabitEthernet1/0/0] quit
[Router_2] interface gigabitethernet 0/0/1
# Configure a static route from Router_2 to APs with the next hop address
192.168.2.2 on Router_2.
[Router_2] ip route-static 10.23.100.0 255.255.255.0 192.168.2.2
[Router_2] ip route-static 192.168.1.0 255.255.255.0 192.168.2.2
NOTE
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
Step 3 Configure ACLs and define the data flows to be protected by the IPSec tunnel.
# On Router_2, configure an ACL to protect the data flows from the AC (IP
address 10.23.200.0/24) at the headquarters to the APs (IP address
10.23.100.0/24) in the branch.
[Router_2] acl number 3101
[Router_2-acl-adv-3101] rule permit ip source 10.23.200.0 0.0.0.255 destination 10.23.100.0 0.0.0.255
[Router_2-acl-adv-3101] quit
# On Router_1, configure an ACL to protect the data flows from the APs (IP
address 10.23.100.0/24) in the branch to the AC (IP address 10.23.200.0/24) at the
headquarters.
[Router_1] acl number 3101
[Router_1-acl-adv-3101] rule permit ip source 10.23.100.0 0.0.0.255 destination 10.23.200.0 0.0.0.255
[Router_1-acl-adv-3101] quit
# Configure an IKE peer on Router_2, and configure the pre-shared key and
peer ID based on the default settings.
[Router_2] ike peer spub
[Router_2-ike-peer-spub] undo version 2
[Router_2-ike-peer-spub] ike-proposal 5
[Router_2-ike-peer-spub] pre-shared-key cipher YsHsjx_202206
[Router_2-ike-peer-spub] remote-address 192.168.1.1
[Router_2-ike-peer-spub] quit
# Configure an IKE peer on Router_1, and configure the pre-shared key and
peer ID based on the default settings.
[Router_1] ike peer spua
[Router_1-ike-peer-spub] undo version 2
[Router_1-ike-peer-spub] ike-proposal 5
[Router_1-ike-peer-spua] pre-shared-key cipher YsHsjx_202206
[Router_1-ike-peer-spua] remote-address 192.168.2.1
[Router_1-ike-peer-spua] quit
4. Apply the IPSec policies to the interfaces of Router_2 and Router_1, so that
the interfaces can protect traffic.
# Click Create under DHCPv4 Address Pool List, select Interface address
pool and select VLANIF 200.
NOTE
# Under Static Route Table, click Create. The Create Static Route Table
page is displayed.
# Set Destination IP to 0.0.0.0, Subnet Mask to 0(0.0.0.0), and Next hop
address to 10.23.200.2.
# Click OK.
# Click Next.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Set Security settings to Key (applicable to personal networks), select the AES
mode, and set the key.
# Click Finish.
Automatic channel and power calibration functions are enabled by default. The manual
channel and power configurations take effect only when these two functions are disabled.
# Choose Configuration > AP Config > AP Config > AP Info. The AP List
page is displayed.
# Click the ID of the AP whose channel and power need to be configured. The
AP customized settings page is displayed.
4. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
----End
Networking Requirements
● AC networking mode: Layer 2 networking in bypass mode
● DHCP deployment mode:
– The ME60 functions as a DHCP server to assign IP addresses to STAs.
– Switch functions as a DHCP server to assign IP addresses to APs.
● Service data forwarding mode: soft GRE forwarding
Data Planning
IP address 10.23.100.3-10.23.100.254/24
pool for
APs
AC data planning
Item Data
IP address 10.23.101.2-10.23.101.254/24
pool for
STAs
VE Virtual-Ethernet2/0/0
interface
for soft
GRE
Configuration Roadmap
1. Configure network interworking of the AC, APs, ME60, and other network
devices.
2. Configure the ME60, soft GRE tunnel, and authentication and accounting
functions.
3. Select Config Wizard to configure system parameters for the AC.
4. Select Config Wizard to configure the APs to go online on the AC.
5. Select Config Wizard to configure WLAN services on the AC.
6. Deliver the WLAN service to the AP and verify the configuration.
NOTE
● In this example, the ME60 in V600R008C10 is used. The actual configuration may vary
depending on versions.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure the network devices.
# On Switch, add GE0/0/1 to VLAN 100 and VLAN 101, GE0/0/2 to VLAN 100, and
GE0/0/3 to VLAN 199. Set the PVIDs of GE0/0/1 and GE0/0/3 to VLAN 100 and
VLAN 199, respectively. Create VLANIF 199 and set its IP address to
10.23.199.2/24.
<HUAWEI> system-view
[HUAWEI] sysname Switch
[Switch] vlan batch 100 101 199
[Switch] interface gigabitethernet 0/0/1
[Switch-GigabitEthernet0/0/1] port link-type trunk
[Switch-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[Switch-GigabitEthernet0/0/1] port trunk pvid vlan 100
[Switch-GigabitEthernet0/0/1] port-isolate enable
[Switch-GigabitEthernet0/0/1] quit
Step 2 Configure the DHCP servers to assign IP addresses to APs and STAs.
NOTE
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
[ME60] dhcp enable
[ME60] ip pool sta-pool bas local
[ME60-ip-pool-sta-pool] gateway 10.23.101.1 24
[ME60-ip-pool-sta-pool] section 1 10.23.101.3 10.23.101.254
[ME60-ip-pool-sta-pool] option 43 ip 10.23.101.1
[ME60-ip-pool-sta-pool] quit
# Configure an IP address for the loopback interface and bind the soft GRE group
to it.
[ME60] interface loopback 1
[ME60-LoopBack1] ip address 10.23.200.1 255.255.255.0
[ME60-LoopBack1] binding soft-gre group group1
[ME60-LoopBack1] quit
# Create a BAS interface and configure the BAS interface type and authentication
mode. Configure the user VLAN and service VLAN as the same VLAN.
[ME60] interface virtual-ethernet 2/0/0.1
[ME60-Virtual-Ethernet2/0/0.1] user-vlan 101
[ME60-Virtual-Ethernet2/0/0.1-vlan-101-101] bas
[ME60-Virtual-Ethernet2/0/0.1-bas] access-type layer2-subscriber default-domain authentication
aaadomain1
[ME60-Virtual-Ethernet2/0/0.1-bas] authentication-method bind
# Choose Configuration > Config Wizard > AC. The Basic AC Configuration
page is displayed.
2. Configure interfaces.
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Next.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Configure the SSID name, forwarding mode, and service VLAN ID.
Automatic channel and power calibration functions are enabled by default. The manual
channel and power configurations take effect only when these two functions are disabled.
# Choose Configuration > AP Config > AP Config > AP Info. The AP List
page is displayed.
# Click the ID of the AP whose channel and power need to be configured. The
AP customized settings page is displayed.
1. Choose Monitoring > SSID > VAP. In VAP List, check VAP status. You can see
that the status of the VAP in wlan-net is normal.
2. The WLAN with the SSID wlan-net is available.
3. The STA can associate with the WLAN and obtain an IP address
10.23.101.x/24, and its gateway address is 10.23.101.1.
4. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
----End
Data Planning
Item Data
Item Data
Item Data
Configuration Roadmap
1. Use the configuration wizard to configure system parameters for AC_1 and
AC_2.
2. Use the configuration wizard to configure APs to go online on AC_1.
3. Use the configuration wizard to configure WLAN services on AC_1.
4. Configure Ethernet over GRE on AC_1 and AC_2.
5. Deliver services to APs and verify the configuration.
Procedure
Step 1 Configure system parameters for AC_1.
1. Perform basic AC configurations.
# Choose Configuration > Config Wizard > AC. The Basic AC Configuration
page is displayed.
# Set Country/Region based on actual situations. For example, set Country/
Region to China. Set System time to Manual and Date and time to PC.
If the AC and AP are directly connected, set the default VLAN of the interface connected to
the AP to management VLAN 100.
# Click Create under DHCPv4 Address Pool List, select Interface address
pool and select VLANIF 100.
# Click OK.
# Set the IP address of VLANIF 10 to 10.20.1.1/24 in the same way.
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
NOTE
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 4 Configure WLAN services on AC_1.
# Click Create. The Basic Information page is displayed.
# Configure the SSID name, forwarding mode, and service VLAN ID.
# Click OK. In the dialog box that is displayed, click OK. On the VE interface
page that is displayed, select Virtual-Ethernet0/0/1 and click OK.
# Click OK.
2. Configure Ethernet over GRE on AC_2.
Complete the following configurations in the same way as configuring AC_1.
– Create a GRE tunnel. Set Tunnel ID to 1, IP address/mask to
10.40.1.2/255.255.255.0, Tunnel destination address to 10.20.1.1,
Tunnel source address type to IP address, and the tunnel source IP
address to 10.30.1.1.
– Create Virtual-Ethernet0/0/1 and add it to VLAN 101.
– Bind Virtual-Ethernet0/0/1 to the GRE tunnel.
Step 6 Verify the configuration.
1. Choose Monitoring > SSID > VAP. In VAP List, check VAP status. You can see
that the status of the VAP in wlan-net is normal.
2. The WLAN with the SSID wlan-net is available.
3. The STA can associate with the WLAN and obtain an IP address
10.23.101.x/24, and its gateway address is 10.23.101.1.
4. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
----End
Service Requirements
To improve WLAN security, an enterprise uses the external Portal authentication
mode to control user access.
Networking Requirements
● AC networking mode: Layer 2 bypass mode
● DHCP deployment mode:
– The AC functions as a DHCP server to assign IP addresses to APs.
– The aggregation switch (SwitchB) functions as a DHCP server to assign IP
addresses to STAs.
● Service data forwarding mode: tunnel forwarding
● Authentication mode: External Portal authentication
● Security policy: open
Data Planning
Managem VLAN100
ent VLAN
for APs
Service VLAN101
VLAN for
STAs
IP address 10.23.100.2-10.23.100.254/24
pool for
APs
IP address 10.23.101.4-10.23.101.254/24
pool for
STAs
Item Data
Authentica ● Name:default_free_rule
tion-free ● Authentication-free resource: IP address of the DNS server
rule profile (8.8.8.8)
Configuration Roadmap
1. Configure network interworking of the AC, APs, and other network devices.
2. Select Config Wizard to configure system parameters for the AC.
3. Select Config Wizard to configure the APs to go online on the AC.
4. Configure WLAN services and external Portal authentication on the AC using
the WLAN configuration wizard.
5. Configure authentication-free rules for an AP group.
6. Configure third-party server interconnection parameters.
7. Complete service verification.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on SwitchA to VLAN 100. The default VLAN of
GE0/0/1 is VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
[SwitchA] vlan batch 100
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk pvid vlan 100
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[SwitchA-GigabitEthernet0/0/1] port-isolate enable
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 100
[SwitchA-GigabitEthernet0/0/2] quit
# Add GE0/0/1 and GE0/0/2 on SwitchB (aggregation switch) to VLAN 100, and
GE0/0/2 and GE0/0/3 to VLAN 101.
<HUAWEI> system-view
[HUAWEI] sysname SwitchB
[SwitchB] vlan batch 100 101
[SwitchB] interface gigabitethernet 0/0/1
# Add GE1/0/0 on Router to VLAN 101. Create VLANIF 101 and set its IP address
to 10.23.101.2/24.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 101
[Router] interface gigabitethernet 1/0/0
[Router-GigabitEthernet1/0/0] port link-type trunk
[Router-GigabitEthernet1/0/0] port trunk allow-pass vlan 101
[Router-GigabitEthernet1/0/0] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.23.101.2 24
[Router-Vlanif101] quit
Step 2 Configure a DHCP server to assign IP addresses to STAs and specify the gateway
for the STAs.
[SwitchB] dhcp enable
[SwitchB] interface vlanif 101
[SwitchB-Vlanif101] ip address 10.23.101.1 24
[SwitchB-Vlanif101] dhcp select interface
[SwitchB-Vlanif101] dhcp server gateway-list 10.23.101.2
[SwitchB-Vlanif101] dhcp server dns-list 8.8.8.8
[SwitchB-Vlanif101] dhcp server excluded-ip-address 10.23.101.3
[SwitchB-Vlanif101] quit
# Choose Configuration > Config Wizard > AC. The Basic AC Configuration
page is displayed.
NOTE
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click OK.
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 5 Configure WLAN services.
# Click Create. The Basic Information page is displayed.
# Configure the SSID name, forwarding mode, and service VLAN ID.
6. Click OK.
7. Select the authentication-free rule with the ID 1 and click Apply. In the dialog
box that is displayed, click OK.
Step 7 Configure third-party server interconnection parameters.
For the detailed configuration, see the related product documentation.
Step 8 Verify the configuration.
1. The WLAN with the SSID wlan-net is available.
2. The STA can associate with the WLAN and obtain an IP address
10.23.101.x/24, and its gateway address is 10.23.101.2.
3. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
4. When a user opens the browser and attempts to access the network, the user
is automatically redirected to the authentication page provided by the Portal
server. After entering the correct user name and password on the page, the
user can access the network.
----End
Networking Requirements
● AC networking mode: Layer 2 bypass mode
● DHCP deployment mode:
– The AC functions as a DHCP server to assign IP addresses to APs.
– The aggregation switch (SwitchB) functions as a DHCP server to assign IP
addresses to STAs.
● Service data forwarding mode: tunnel forwarding
● Authentication mode: built-in Portal authentication
● Security policy: open
Figure 3-15 Networking for configuring built-in Portal authentication for local
users
Data Planning
IP address 10.23.100.2-10.23.100.254/24
pool for
APs
IP address 10.23.101.4-10.23.101.254/24
pool for
STAs
Item Data
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure network connectivity between the AC, APs, and other network
devices.
2. Configure system parameters for the AC using the configuration wizard.
3. Configure the APs to go online on the AC using the configuration wizard.
4. Configure WLAN services and built-in Portal authentication on the AC using
the configuration wizard.
5. Configure authentication-free rules for an AP group.
6. Complete service verification.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on SwitchA to VLAN 100. The default VLAN of
GE0/0/1 is VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
[SwitchA] vlan batch 100
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk pvid vlan 100
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[SwitchA-GigabitEthernet0/0/1] port-isolate enable
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 100
[SwitchA-GigabitEthernet0/0/2] quit
# Add GE0/0/1 and GE0/0/2 on SwitchB (aggregation switch) to VLAN 100, and
GE0/0/2 and GE0/0/3 to VLAN 101.
<HUAWEI> system-view
[HUAWEI] sysname SwitchB
[SwitchB] vlan batch 100 101
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] port link-type trunk
[SwitchB-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[SwitchB-GigabitEthernet0/0/1] quit
# Add GE1/0/0 on Router to VLAN 101. Create VLANIF 101 and set its IP address
to 10.23.101.2/24.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 101
[Router] interface gigabitethernet 1/0/0
[Router-GigabitEthernet1/0/0] port link-type trunk
[Router-GigabitEthernet1/0/0] port trunk allow-pass vlan 101
[Router-GigabitEthernet1/0/0] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.23.101.2 24
[Router-Vlanif101] quit
Step 2 Configure a DHCP server to assign IP addresses to STAs and specify the gateway
for the STAs.
# On SwitchB, configure VLANIF 101 to assign IP addresses to STAs and set the
default gateway address of STAs to 10.23.101.2.
NOTE
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
[SwitchB] dhcp enable
[SwitchB] interface vlanif 101
[SwitchB-Vlanif101] ip address 10.23.101.1 24
[SwitchB-Vlanif101] dhcp select interface
[SwitchB-Vlanif101] dhcp server gateway-list 10.23.101.2
[SwitchB-Vlanif101] quit
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click OK.
# Click Create under Interface Configuration. The Create Interface
Configuration page is displayed. Set Interface type to Loopback, Interface
number to 1, and IP address of Loopback1 to 10.1.1.1/24.
# Click OK.
# Under Static Route Table, click Create. The Create Static Route Table
page is displayed.
# Configure the default route and set its next hop address to 10.23.101.2.
# Click OK.
# Click Next.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 5 Configure WLAN services.
# Click Create. The Basic Information page is displayed.
# Configure the SSID name, forwarding mode, and service VLAN ID.
# Click Manage next to Local user. The Local User page is displayed
# Click Create. The Create Local User page is displayed.
# Set Creation mode to Manually add and configure the local user name and
password.
# Click OK.
# On the Create Local User page, select the new user and click OK.
# Click Next. The Access Control page is displayed.
# Set Binding the AP group to ap-group1.
# Click Finish.
Step 6 On the router (STAs' gateway), configure a route to the Portal server.
[Router] ip route-static 10.1.1.1 32 10.23.101.3
6. Click OK.
7. Select the authentication-free rule with the ID 1 and click Apply. In the dialog
box that is displayed, click OK.
Step 8 Verify the configuration.
1. The WLAN with the SSID wlan-net is available.
2. The STA can associate with the WLAN and obtain an IP address
10.23.101.x/24, and its gateway address is 10.23.101.2.
3. When a user browses a web page, the browser automatically redirects the
user to the Portal authentication page. After entering the correct user name
and password, the user passes the authentication and can access the web
page.
4. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
----End
Networking Requirements
● AC networking mode: Layer 2 bypass mode
● DHCP deployment mode:
– The AC functions as a DHCP server to assign IP addresses to APs.
– The aggregation switch (SwitchB) functions as a DHCP server to assign IP
addresses to STAs.
● Service data forwarding mode: tunnel forwarding
● Authentication mode: MAC address-prioritized Portal authentication
● Security policy: open
Data Planning
Managem VLAN100
ent VLAN
for APs
Service VLAN101
VLAN for
STAs
IP address 10.23.100.2–10.23.100.254/24
pool for
APs
IP address 10.23.101.4–10.23.101.254/24
pool for
STAs
Item Data
MAC Name:wlan-net
access
profile
Configuration Roadmap
1. Configure network interworking of the AC, APs, and other network devices.
2. Select Config Wizard to configure system parameters for the AC.
3. Select Config Wizard to configure the APs to go online on the AC.
4. Configure WLAN services and MAC address-prioritized Portal authentication
on the AC using the WLAN configuration wizard.
5. Configure authentication-free rules for an AP group.
6. Complete service verification.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on SwitchA to VLAN 100. The default VLAN of
GE0/0/1 is VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
[SwitchA] vlan batch 100
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk pvid vlan 100
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[SwitchA-GigabitEthernet0/0/1] port-isolate enable
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 100
[SwitchA-GigabitEthernet0/0/2] quit
# Add GE0/0/1 and GE0/0/2 on SwitchB (aggregation switch) to VLAN 100, and
GE0/0/2 and GE0/0/3 to VLAN 101.
<HUAWEI> system-view
[HUAWEI] sysname SwitchB
[SwitchB] vlan batch 100 101
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] port link-type trunk
[SwitchB-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[SwitchB-GigabitEthernet0/0/1] quit
[SwitchB] interface gigabitethernet 0/0/2
[SwitchB-GigabitEthernet0/0/2] port link-type trunk
[SwitchB-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[SwitchB-GigabitEthernet0/0/2] quit
[SwitchB] interface gigabitethernet 0/0/3
[SwitchB-GigabitEthernet0/0/3] port link-type trunk
[SwitchB-GigabitEthernet0/0/3] port trunk allow-pass vlan 101
[SwitchB-GigabitEthernet0/0/3] quit
# Add GE1/0/0 on Router to VLAN 101. Create VLANIF 101 and set its IP address
to 10.23.101.2/24.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 101
[Router] interface gigabitethernet 1/0/0
[Router-GigabitEthernet1/0/0] port link-type trunk
[Router-GigabitEthernet1/0/0] port trunk allow-pass vlan 101
[Router-GigabitEthernet1/0/0] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.23.101.2 24
[Router-Vlanif101] quit
Step 2 Configure a DHCP server to assign IP addresses to STAs and specify the gateway
for the STAs.
[SwitchB] dhcp enable
[SwitchB] interface vlanif 101
[SwitchB-Vlanif101] ip address 10.23.101.1 24
[SwitchB-Vlanif101] dhcp select interface
[SwitchB-Vlanif101] dhcp server gateway-list 10.23.101.2
[SwitchB-Vlanif101] dhcp server dns-list 8.8.8.8
[SwitchB-Vlanif101] dhcp server excluded-ip-address 10.23.101.3
[SwitchB-Vlanif101] quit
NOTE
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click OK.
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 5 Configure WLAN services.
# Click Create. The Basic Information page is displayed.
# Configure the SSID name, forwarding mode, and service VLAN ID.
6. Click OK.
7. Select the authentication-free rule with the ID 1 and click Apply. In the dialog
box that is displayed, click OK.
Step 7 Configure third-party server interconnection parameters.
For the detailed configuration, see the related product documentation.
Step 8 Verify the configuration.
1. The WLAN with the SSID wlan-net is available.
2. The STA can associate with the WLAN and obtain an IP address
10.23.101.x/24, and its gateway address is 10.23.101.2.
3. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
4. When a user opens the browser and attempts to access the network, the user
is automatically redirected to the authentication page provided by the Portal
server. After entering the correct user name and password on the page, the
user can access the network.
5. Assume that the MAC address validity period configured on the server is 60
minutes. If a user is disconnected from the wireless network for 5 minutes
and reconnects to the network, the user can directly access the network. If a
user is disconnected from the wireless network for 65 minutes and reconnects
to the network, the user will be redirected to the Portal authentication page.
----End
More Information
(Video) Example for Configuring Guests to Access the WLAN (MAC Address-
prioritized Portal Authentication)
Networking Requirements
● AC networking mode: Layer 2 bypass mode
● DHCP deployment mode:
– The AC functions as a DHCP server to assign IP addresses to APs.
– The aggregation switch (SwitchB) functions as a DHCP server to assign IP
addresses to STAs.
● Service data forwarding mode: tunnel forwarding
● Authentication mode: Built-in Portal access code authentication
● Security policy: open authentication
Data Planning
Item Data
IP address 10.23.100.2-10.23.100.254/24
pool for
APs
IP address 10.23.101.4-10.23.101.254/24
pool for
STAs
Item Data
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure network connectivity between the AC, APs, and other network
devices.
2. Configure system parameters for the AC using the configuration wizard.
3. Configure the APs to go online on the AC using the configuration wizard.
4. Configure WLAN services and built-in Portal authentication on the AC using
the configuration wizard.
5. Configure access code authentication parameters.
6. Configure authentication-free rules for an AP group.
7. Complete service verification.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on SwitchA to VLAN 100. The default VLAN of
GE0/0/1 is VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
[SwitchA] vlan batch 100
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk pvid vlan 100
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[SwitchA-GigabitEthernet0/0/1] port-isolate enable
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 100
[SwitchA-GigabitEthernet0/0/2] quit
# Add GE0/0/1 and GE0/0/2 on SwitchB (aggregation switch) to VLAN 100, and
GE0/0/2 and GE0/0/3 to VLAN 101.
<HUAWEI> system-view
[HUAWEI] sysname SwitchB
[SwitchB] vlan batch 100 101
[SwitchB] interface gigabitethernet 0/0/1
# Add GE1/0/0 on Router to VLAN 101. Create VLANIF 101 and set its IP address
to 10.23.101.2/24.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 101
[Router] interface gigabitethernet 1/0/0
[Router-GigabitEthernet1/0/0] port link-type trunk
[Router-GigabitEthernet1/0/0] port trunk allow-pass vlan 101
[Router-GigabitEthernet1/0/0] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.23.101.2 24
[Router-Vlanif101] quit
Step 2 Configure a DHCP server to assign IP addresses to STAs and specify the gateway
for the STAs.
# On SwitchB, configure VLANIF 101 to assign IP addresses to STAs and set the
default gateway address of STAs to 10.23.101.2.
NOTE
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
[SwitchB] dhcp enable
[SwitchB] interface vlanif 101
[SwitchB-Vlanif101] ip address 10.23.101.1 24
[SwitchB-Vlanif101] dhcp select interface
[SwitchB-Vlanif101] dhcp server gateway-list 10.23.101.2
[SwitchB-Vlanif101] quit
2. Configure interfaces.
# Select GigabitEthernet0/0/1 and expand Batch Modify. Set Interface type
to Trunk and add GigabitEthernet0/0/1 to VLAN 100 (management VLAN)
and VLAN 101 (service VLAN).
NOTE
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List, select Interface address
pool and select VLANIF 100.
# Click OK.
# Click Create under Interface Configuration. The Create Interface
Configuration page is displayed. Set Interface type to Loopback, Interface
number to 1, and IP address of Loopback1 to 10.1.1.1/24.
# Click OK.
# Under Static Route Table, click Create. The Create Static Route Table
page is displayed.
# Configure the default route and set its next hop address to 10.23.101.2.
# Click OK.
# Click Next.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 5 Configure WLAN services.
# Click Create. The Basic Information page is displayed.
# Configure the SSID name, forwarding mode, and service VLAN ID.
6. Click OK.
7. Select the authentication-free rule with the ID 1 and click Apply. In the dialog
box that is displayed, click OK.
Step 8 Create a lobby administrator account for hotel receptionists as the network
administrator.
# Choose Maintenance > Administrator. The administrator configuration page is
displayed.
# Click Create. Create a lobby administrator account and click OK.
# Click OK. On the page that is displayed, print the access code for the user.
2. The WLAN with the SSID wlan-net is available.
3. The STA can associate with the WLAN and obtain an IP address
10.23.101.x/24, and its gateway address is 10.23.101.2.
4. When the user browses a web page, the browser is automatically redirected
to the Portal authentication page. After entering the access code obtained
from the hotel receptionist, the user can properly access the web page.
5. Hotel IT personnel can choose Monitoring > User > Online STA Statistics. In
User List, set the search criteria to SSID, enter wlan-net, and click . STAs
go online successfully and obtain IP addresses.
----End
After you click Advanced, a message indicating that the certificate is incorrect is
displayed in the lower part of the window. You can find that the security certificate
is invalid.
By default, the device has a self-signed certificate, which can be used for HTTPS
services. However, this certificate is an untrusted certificate that is issued by the
device itself. Therefore, when you use this certificate to perform HTTPS services, a
message indicating that the security certificate of the website is faulty is displayed.
The trusted certificate is issued by the trusted CA. To obtain the security
certificate, the certificate user needs to contact the CA and apply for the related
information according to the requirements of the CA. After the application is
successful, the CA issues the certificate file and password to the certificate user.
The domain name in the certificate must match the domain name of the web
page. Therefore, you need to configure the DNS server in advance so that the DNS
server can correctly parse the domain name of the built-in Portal page. In this
case, the web browser can access the built-in Portal page of the device. When
configuring an IP address for a service terminal, you need to configure the DNS
server. If the IP address is automatically obtained through the DHCP server, you
need to configure the IP address of the DNS server for the client on the DHCP
server.
After obtaining a trusted certificate, perform the following steps to import the
certificate to the device to solve the above problems.
Procedure
Step 1 Upload the certificate file.
# Choose Configuration > Security > Certificate Management. The Certificate
Management page is displayed.
# In SSL policy, click the browse button and select the SSL policy name configured
in step 2.
# Click Apply.
----End
Networking Requirements
● AC networking mode: Layer 2 in bypass mode
● DHCP deployment mode: The AC functions as a DHCP server to assign IP
addresses to APs, and SwitchB functions as a DHCP server to assign IP
addresses to STAs.
● Service data forwarding mode: direct forwarding
● WLAN authentication mode: WPA-WPA2+802.1X+AES
Data Planning
Item Data
Item Data
Configuration Roadmap
1. Configure network connectivity between the AC, APs, and other network
devices.
2. Configure system parameters for the AC using the configuration wizard.
3. Configure the APs to go online on the AC using the configuration wizard.
4. Configure WLAN services on the AC using the configuration wizard. When
configuring a security policy, select 802.1X and RADIUS authentication and set
RADIUS server parameters.
NOTE
The AC and server must have the same RADIUS shared key.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on SwitchA (access switch) to VLAN 100 and VLAN
101, respectively.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
[SwitchA] vlan batch 100 101
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk pvid vlan 100
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[SwitchA-GigabitEthernet0/0/1] port-isolate enable
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[SwitchA-GigabitEthernet0/0/2] quit
# On SwitchB (aggregation switch), add GE0/0/1 to VLAN 100 and VLAN 101,
GE0/0/2 to VLAN 100 and VLAN 101, and GE0/0/4 to VLAN 104. Create VLANIF
104 and configure a default route with the router as the next hop.
<HUAWEI> system-view
[HUAWEI] sysname SwitchB
[SwitchB] vlan batch 100 101 104
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] port link-type trunk
[SwitchB-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[SwitchB-GigabitEthernet0/0/1] quit
[SwitchB] interface gigabitethernet 0/0/2
[SwitchB-GigabitEthernet0/0/2] port link-type trunk
[SwitchB-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[SwitchB-GigabitEthernet0/0/2] quit
[SwitchB] interface gigabitethernet 0/0/4
[SwitchB-GigabitEthernet0/0/4] port link-type trunk
[SwitchB-GigabitEthernet0/0/4] port trunk pvid vlan 104
[SwitchB-GigabitEthernet0/0/4] port trunk allow-pass vlan 104
[SwitchB-GigabitEthernet0/0/4] quit
[SwitchB] interface vlanif 104
[SwitchB-Vlanif104] ip address 10.23.104.1 24
[SwitchB-Vlanif104] quit
[SwitchB] ip route-static 0.0.0.0 0.0.0.0 10.23.104.2
# Configure an IP address for GE0/0/1 on the router and configure a static route
to the network segment for STAs.
<Huawei> system-view
[Huawei] sysname Router
[Router] interface gigabitethernet 0/0/1
[Router-GigabitEthernet0/0/1] ip address 10.23.104.2 24
[Router-GigabitEthernet0/0/1] quit
[Router] ip route-static 10.23.101.0 24 10.23.104.1
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
[SwitchB] dhcp enable
[SwitchB] interface vlanif 101
[SwitchB-Vlanif101] ip address 10.23.101.1 24
[SwitchB-Vlanif101] dhcp select interface
[SwitchB-Vlanif101] quit
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List. Select Interface address
pool and select VLANIF 100.
NOTE
# Click OK.
# Set the IP address of VLANIF 102 to 10.23.102.2/24 in the same way.
# Under Static Route Table, click Create. The Create Static Route Table
page is displayed.
# Set Destination IP to 10.23.103.0, Subnet Mask to 24(255.255.255.0), and
Next hop address to 10.23.102.1.
# Click OK.
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
Automatic channel and power calibration functions are enabled by default. The manual
channel and power configurations take effect only when these two functions are disabled.
# Choose Configuration > AP Config > AP Config > AP Info. The AP List
page is displayed.
# Click the ID of the AP whose channel and power need to be configured. The
AP customized settings page is displayed.
----End
Networking Requirements
● AC networking mode: Layer 2 in bypass mode
● DHCP deployment mode: The AC functions as a DHCP server to assign IP
addresses to APs, and SwitchB functions as a DHCP server to assign IP
addresses to STAs.
● Service data forwarding mode: direct forwarding
● Authentication mode: local EAP authentication
● Security policy: WPA-WPA2+802.1X+AES
Data Planning
Item Data
IP address 10.23.100.2-10.23.100.254/24
pool for
APs
IP address 10.23.101.2-10.23.101.254/24
pool for
STAs
Item Data
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure network connectivity between the AC, APs, and other network
devices.
2. Configure system parameters for the AC using the configuration wizard.
3. Configure the APs to go online on the AC using the configuration wizard.
4. Configure WLAN services and local EAP authentication on the AC using the
configuration wizard.
5. Configure a local user.
6. Complete service verification.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on SwitchA (access switch) to VLAN 100 and VLAN
101, respectively.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
[SwitchA] vlan batch 100 101
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk pvid vlan 100
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[SwitchA-GigabitEthernet0/0/1] port-isolate enable
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[SwitchA-GigabitEthernet0/0/2] quit
# On SwitchB (aggregation switch), add GE0/0/1 to VLAN 100 and VLAN 101,
GE0/0/2 to VLAN 100 and VLAN 101, and GE0/0/4 to VLAN 104. Create VLANIF
104 and configure a default route with the router as the next hop.
<HUAWEI> system-view
[HUAWEI] sysname SwitchB
[SwitchB] vlan batch 100 101 104
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] port link-type trunk
[SwitchB-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[SwitchB-GigabitEthernet0/0/1] quit
[SwitchB] interface gigabitethernet 0/0/2
[SwitchB-GigabitEthernet0/0/2] port link-type trunk
[SwitchB-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[SwitchB-GigabitEthernet0/0/2] quit
[SwitchB] interface gigabitethernet 0/0/4
[SwitchB-GigabitEthernet0/0/4] port link-type trunk
[SwitchB-GigabitEthernet0/0/4] port trunk pvid vlan 104
[SwitchB-GigabitEthernet0/0/4] port trunk allow-pass vlan 104
[SwitchB-GigabitEthernet0/0/4] quit
[SwitchB] interface vlanif 104
[SwitchB-Vlanif104] ip address 10.23.104.1 24
[SwitchB-Vlanif104] quit
[SwitchB] ip route-static 0.0.0.0 0.0.0.0 10.23.104.2
# Configure an IP address for GE0/0/1 on the router and configure a static route
to the network segment for STAs.
<Huawei> system-view
[Huawei] sysname Router
[Router] interface gigabitethernet 0/0/1
[Router-GigabitEthernet0/0/1] ip address 10.23.104.2 24
[Router-GigabitEthernet0/0/1] quit
[Router] ip route-static 10.23.101.0 24 10.23.104.1
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
[SwitchB] dhcp enable
[SwitchB] interface vlanif 101
[SwitchB-Vlanif101] ip address 10.23.101.1 24
[SwitchB-Vlanif101] dhcp select interface
[SwitchB-Vlanif101] quit
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List. Select Interface address
pool and select VLANIF 100.
# Click OK.
# Click Next.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Choose Configuration > Security > AAA > Local User. The local user
configuration page is displayed.
# Configure the user name and password for a local user and set Access mode to
802.1X. You can manually add or import local users in batches. This example
describes how to manually add local users.
# Click OK.
Step 7 Verify the configuration.
After a STA is associated with a WLAN SSID and logs in with the correct user
name and password, the user can access the network service normally.
The following uses Windows 10 as an example to describe how to set EAP access
parameters.
1. On the Network and Internet page, choose Wi-Fi > Manage known
networks. The Manage known networks page is displayed.
2. Click Add a new network. Set the network name, Security type to WPA2-
Enterprise AES, EAP Method to Protected EAP (PEAP), and the
authentication method to Smart Card or other certificate.
----End
Networking Requirements
● AC networking mode: Layer 2 in bypass mode
● DHCP deployment mode: The AC functions as a DHCP server to assign IP
addresses to APs, and SwitchB functions as a DHCP server to assign IP
addresses to STAs.
● Service data forwarding mode: direct forwarding
● WLAN authentication mode: open-system authentication
Data Planning
Configuration Roadmap
1. Configure network connectivity between the AC, APs, and other network
devices.
2. Configure system parameters for the AC using the configuration wizard.
3. Configure the APs to go online on the AC using the configuration wizard.
4. Configure WLAN services on the AC using the configuration wizard. When
configuring a security policy, select MAC and RADIUS authentication and set
RADIUS server parameters.
5. Configure third-party server parameters.
NOTE
The AC and server must have the same RADIUS shared key.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on SwitchA (access switch) to VLAN 100 and VLAN
101, respectively.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
# On SwitchB (aggregation switch), add GE0/0/1 to VLAN 100 and VLAN 101,
GE0/0/2 to VLAN 100 and VLAN 102, GE0/0/3 to VLAN 103, and GE0/0/4 to VLAN
104. Create VLANIF 102, VLANIF 103, and VLANIF 104, and configure a default
route with the router as the next hop.
<HUAWEI> system-view
[HUAWEI] sysname SwitchB
[SwitchB] vlan batch 100 to 104
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] port link-type trunk
[SwitchB-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[SwitchB-GigabitEthernet0/0/1] quit
[SwitchB] interface gigabitethernet 0/0/2
[SwitchB-GigabitEthernet0/0/2] port link-type trunk
[SwitchB-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 102
[SwitchB-GigabitEthernet0/0/2] quit
[SwitchB] interface gigabitethernet 0/0/3
[SwitchB-GigabitEthernet0/0/3] port link-type trunk
[SwitchB-GigabitEthernet0/0/3] port trunk pvid vlan 103
[SwitchB-GigabitEthernet0/0/3] port trunk allow-pass vlan 103
[SwitchB-GigabitEthernet0/0/3] quit
[SwitchB] interface gigabitethernet 0/0/4
[SwitchB-GigabitEthernet0/0/4] port link-type trunk
[SwitchB-GigabitEthernet0/0/4] port trunk pvid vlan 104
[SwitchB-GigabitEthernet0/0/4] port trunk allow-pass vlan 104
[SwitchB-GigabitEthernet0/0/4] quit
[SwitchB] interface vlanif 102
[SwitchB-Vlanif102] ip address 10.23.102.1 24
[SwitchB-Vlanif102] quit
[SwitchB] interface vlanif 103
[SwitchB-Vlanif103] ip address 10.23.103.2 24
[SwitchB-Vlanif103] quit
[SwitchB] interface vlanif 104
[SwitchB-Vlanif104] ip address 10.23.104.1 24
[SwitchB-Vlanif104] quit
[SwitchB] ip route-static 0.0.0.0 0.0.0.0 10.23.104.2
# Configure an IP address for GE0/0/1 on the router and configure a static route
to the network segment for STAs.
<Huawei> system-view
[Huawei] sysname Router
[Router] interface gigabitethernet 0/0/1
[Router-GigabitEthernet0/0/1] ip address 10.23.104.2 24
[Router-GigabitEthernet0/0/1] quit
[Router] ip route-static 10.23.101.0 24 10.23.104.1
NOTE
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
[SwitchB] dhcp enable
[SwitchB] interface vlanif 101
[SwitchB-Vlanif101] ip address 10.23.101.1 24
[SwitchB-Vlanif101] dhcp select interface
[SwitchB-Vlanif101] quit
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List. Select Interface address
pool and select VLANIF 100.
NOTE
# Click OK.
# Set the IP address of VLANIF 102 to 10.23.102.2/24 in the same way.
# Under Static Route Table, click Create. The Create Static Route Table
page is displayed.
# Set Destination IP to 10.23.103.0, Subnet Mask to 24(255.255.255.0), and
Next hop address to 10.23.102.1.
# Click OK.
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 5 Configure WLAN services.
# Click Create. The Basic Information page is displayed.
# Set the SSID name, forwarding mode, and service VLAN ID.
The user name and password used for MAC address authentication must be the same as
those configured for local authentication.
# Click under RADIUS Server Profile. The RADIUS Server Profile page
is displayed.
# Click Create. On the Create RADIUS Server Profile page that is displayed,
set Profile Name to wlan-net and Profile default shared key to
YsHsjx_202206.
# Choose Create Server. In the Create Server Configuration dialog box that
is displayed, configure the RADIUS server parameters.
# Click OK. On the Create RADIUS Server Profile page, select the created
server and click OK. On the RADIUS Server Profile page, select the created
RADIUS server template wlan-net and click OK.
Automatic channel and power calibration functions are enabled by default. The manual
channel and power configurations take effect only when these two functions are disabled.
# Choose Configuration > AP Config > AP Config > AP Info. The AP List
page is displayed.
# Click the ID of the AP whose channel and power need to be configured. The
AP customized settings page is displayed.
----End
Networking Requirements
● AC networking mode: Layer 2 bypass mode
● DHCP deployment mode:
– The AC functions as a DHCP server to assign IP addresses to APs.
– The aggregation switch (SwitchB) functions as a DHCP server to assign IP
addresses to STAs.
● Service data forwarding mode: tunnel forwarding
● Authentication mode: MAC authentication
● Security policy: open
Figure 3-22 Networking for configuring MAC authentication for local users
Data Planning
Item Data
Item Data
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure network interworking of the AC, APs, and other network devices.
2. Select Config Wizard to configure system parameters for the AC.
3. Select Config Wizard to configure the AP to go online on the AC.
4. Select Config Wizard to configure WLAN services on the AC. When
configuring a security policy, select MAC address authentication and local
authentication. When adding a local user, ensure that the user name is the
same as the MAC address of the user, and the password is the same as that
configured in the MAC access profile. Configure the planned password in the
MAC access profile.
5. Complete service verification.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on SwitchA to VLAN 100. The default VLAN of
GE0/0/1 is VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
[SwitchA] vlan batch 100
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk pvid vlan 100
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[SwitchA-GigabitEthernet0/0/1] port-isolate enable
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 100
[SwitchA-GigabitEthernet0/0/2] quit
# Add GE0/0/1 and GE0/0/2 on SwitchB (aggregation switch) to VLAN 100, and
GE0/0/2 and GE0/0/3 to VLAN 101.
<HUAWEI> system-view
[HUAWEI] sysname SwitchB
[SwitchB] vlan batch 100 101
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] port link-type trunk
[SwitchB-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[SwitchB-GigabitEthernet0/0/1] quit
[SwitchB] interface gigabitethernet 0/0/2
[SwitchB-GigabitEthernet0/0/2] port link-type trunk
[SwitchB-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[SwitchB-GigabitEthernet0/0/2] quit
[SwitchB] interface gigabitethernet 0/0/3
[SwitchB-GigabitEthernet0/0/3] port link-type trunk
[SwitchB-GigabitEthernet0/0/3] port trunk allow-pass vlan 101
[SwitchB-GigabitEthernet0/0/3] quit
# Add GE1/0/0 on Router to VLAN 101. Create VLANIF 101 and set its IP address
to 10.23.101.2/24.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 101
[Router] interface gigabitethernet 1/0/0
[Router-GigabitEthernet1/0/0] port link-type trunk
[Router-GigabitEthernet1/0/0] port trunk allow-pass vlan 101
[Router-GigabitEthernet1/0/0] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.23.101.2 24
[Router-Vlanif101] quit
Step 2 Configure a DHCP server to assign IP addresses to STAs and specify the gateway
for the STAs.
# On SwitchB, configure VLANIF 101 to assign IP addresses to STAs and set the
default gateway address of STAs to 10.23.101.2.
NOTE
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
[SwitchB] dhcp enable
[SwitchB] interface vlanif 101
[SwitchB-Vlanif101] ip address 10.23.101.1 24
[SwitchB-Vlanif101] dhcp select interface
[SwitchB-Vlanif101] dhcp server gateway-list 10.23.101.2
[SwitchB-Vlanif101] quit
# Choose Configuration > Config Wizard > AC. The Basic AC Configuration
page is displayed.
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click OK.
# Click Next.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 5 Configure WLAN services.
# Click Create. The Basic Information page is displayed.
# Configure the SSID name, forwarding mode, and service VLAN ID.
# Click Finish.
The user name and password used for MAC address authentication must be the same as
those configured for local authentication.
# Click Create. In the dialog box that is displayed, enter the user name and
password.
NOTE
The local user name and password must be the same as those in the MAC authentication
profile.
----End
Networking Requirements
● AC networking mode: Layer 2 in bypass mode
● DHCP deployment mode: The AC and SwitchB function as DHCP servers to
assign IP addresses to APs and STAs, respectively.
● Service data forwarding mode: direct forwarding
● WLAN authentication mode: WPA-WPA2+802.1X+AES
Figure 3-23 Networking diagram for configuring user authorization based on user
groups
Data Planning
Item Data
Configuration Roadmap
1. Configure network connectivity between the AC, APs, and other network
devices.
2. Configure system parameters for the AC using the configuration wizard.
3. Configure the APs to go online on the AC using the configuration wizard.
4. Configure WLAN services on the AC using the configuration wizard. When
configuring a security policy, select 802.1X and RADIUS authentication and set
RADIUS server parameters.
5. Configure a user group.
6. Configure third-party server parameters.
NOTE
The AC and server must have the same RADIUS shared key.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on SwitchA (access switch) to VLAN 100 and VLAN
101, respectively.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
[SwitchA] vlan batch 100 101
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk pvid vlan 100
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[SwitchA-GigabitEthernet0/0/1] port-isolate enable
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[SwitchA-GigabitEthernet0/0/2] quit
# On SwitchB (aggregation switch), add GE0/0/1 to VLAN 100 and VLAN 101,
GE0/0/2 to VLAN 100 and VLAN 102, GE0/0/3 to VLAN 103, and GE0/0/4 to VLAN
104. Create VLANIF 102, VLANIF 103, and VLANIF 104, and configure a default
route with the router as the next hop.
<HUAWEI> system-view
[HUAWEI] sysname SwitchB
[SwitchB] vlan batch 100 to 104
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] port link-type trunk
[SwitchB-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[SwitchB-GigabitEthernet0/0/1] quit
[SwitchB] interface gigabitethernet 0/0/2
[SwitchB-GigabitEthernet0/0/2] port link-type trunk
[SwitchB-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 102
[SwitchB-GigabitEthernet0/0/2] quit
[SwitchB] interface gigabitethernet 0/0/3
# Configure an IP address for GE0/0/1 on the router and configure a static route
to the network segment for STAs.
<Huawei> system-view
[Huawei] sysname Router
[Router] interface gigabitethernet 0/0/1
[Router-GigabitEthernet0/0/1] ip address 10.23.104.2 24
[Router-GigabitEthernet0/0/1] quit
[Router] ip route-static 10.23.101.0 24 10.23.104.1
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
[SwitchB] dhcp enable
[SwitchB] interface vlanif 101
[SwitchB-Vlanif101] ip address 10.23.101.1 24
[SwitchB-Vlanif101] dhcp select interface
[SwitchB-Vlanif101] quit
# Choose Configuration > Config Wizard > AC. The Basic AC Configuration
page is displayed.
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click OK.
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 5 Configure WLAN services.
1. # Click Create. The Basic Information page is displayed.
2. # Set the SSID name, forwarding mode, and service VLAN ID.
Automatic channel and power calibration functions are enabled by default. The manual
channel and power configurations take effect only when these two functions are disabled.
# Choose Configuration > AP Config > AP Config > AP Info. The AP List
page is displayed.
# Click the ID of the AP whose channel and power need to be configured. The
AP customized settings page is displayed.
# Click OK. On the Advanced ACL Settings page that is displayed, add
another ACL rule in the same way.
# Click OK.
2. Configure a user group.
# Choose Configuration > Security > User Group > User Group. The User
Group page is displayed.
# Click Create. On the Create User Group page that is displayed, set User
group name and bind an ACL.
# Click OK.
For details about the configuration method, see the corresponding product
manual.
----End
Service Requirements
An enterprise deploys a cloud AC to manage users connected to the Internet and
the iMaster NCE-Campus as a Huawei Agile Cloud Authentication (HACA) server.
The HACA server is located on the cloud to implement functions of an external
Portal server, authentication server, and accounting server. Access users are
authenticated and charged on the HACA server through the cloud AC. This reduces
routing network maintenance costs of the enterprise.
Networking Requirements
● AC networking mode: Layer 2 bypass mode
● DHCP deployment mode:
– The AC functions as a DHCP server to assign IP addresses to APs.
– The aggregation switch (SwitchB) functions as a DHCP server to assign IP
addresses to STAs.
● Service data forwarding mode: tunnel forwarding
● AAA scheme: HACA
● Authentication mode: External Portal authentication
Figure 3-24 Networking for configuring external Portal authentication (in HACA
mode)
Data Planning
Item Data
IP address 10.23.100.2-10.23.100.254/24
pool for
APs
IP address 10.23.101.3-10.23.101.254/24
pool for
STAs
Item Data
Authentica ● Name:default_free_rule
tion-free ● Authentication-free resource: IP address of the DNS server
rule profile (8.8.8.8)
Configuration Roadmap
1. Configure network interworking of the AC, APs, and other network devices.
2. Register the AC with the iMaster NCE-Campus and go to the web platform of
the AC.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on SwitchA to VLAN 100. The default VLAN of
GE0/0/1 is VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
[SwitchA] vlan batch 100
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk pvid vlan 100
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[SwitchA-GigabitEthernet0/0/1] port-isolate enable
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 100
[SwitchA-GigabitEthernet0/0/2] quit
# Add GE0/0/1 and GE0/0/2 on SwitchB (aggregation switch) to VLAN 100, and
GE0/0/2 and GE0/0/3 to VLAN 101.
<HUAWEI> system-view
[HUAWEI] sysname SwitchB
[SwitchB] vlan batch 100 101
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] port link-type trunk
[SwitchB-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[SwitchB-GigabitEthernet0/0/1] quit
[SwitchB] interface gigabitethernet 0/0/2
[SwitchB-GigabitEthernet0/0/2] port link-type trunk
[SwitchB-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[SwitchB-GigabitEthernet0/0/2] quit
[SwitchB] interface gigabitethernet 0/0/3
[SwitchB-GigabitEthernet0/0/3] port link-type trunk
[SwitchB-GigabitEthernet0/0/3] port trunk allow-pass vlan 101
[SwitchB-GigabitEthernet0/0/3] quit
# Add GE1/0/0 on Router to VLAN 101. Create VLANIF 101 and set its IP address
to 10.23.101.2/24.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 101
[Router] interface gigabitethernet 1/0/0
[Router-GigabitEthernet1/0/0] port link-type trunk
[Router-GigabitEthernet1/0/0] port trunk allow-pass vlan 101
[Router-GigabitEthernet1/0/0] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.23.101.2 24
[Router-Vlanif101] quit
Step 2 Configure a DHCP server to assign IP addresses to STAs and specify the gateway
for the STAs.
# On SwitchB, configure VLANIF 101 to assign IP addresses to STAs and set the
default gateway address of STAs to 10.23.101.2.
NOTE
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
[SwitchB] dhcp enable
[SwitchB] interface vlanif 101
[SwitchB-Vlanif101] ip address 10.23.101.1 24
[SwitchB-Vlanif101] dhcp select interface
[SwitchB-Vlanif101] dhcp server gateway-list 10.23.101.2
[SwitchB-Vlanif101] quit
Step 3 Register the AC with the iMaster NCE-Campus and add APs. For the registration
procedure, see Configuration - Cloud-based Management Configuration of AC. For
operations of adding APs, see CloudCampus Cloud Managed Campus Solution
Product Documentation.
Step 4 Log in to the iMaster NCE-Campus through the Internet, go to the web platform
of the AC, and remotely configure WLAN service data.
1. Select a site.
a. Choose Deploy > Site > Site Configuration from the main menu.
b. In the displayed window, select a site from the Site drop-down list box in
the upper left corner, and set the selected site as the operation object.
2. In the navigation tree on the left, choose AC(Fit AP) > Fit AP.
3. Click the name of the desired WLAN AC in the Device Name area. The WLAN
AC management page is displayed.
4. Click Open Web System in the upper right corner and the WLAN AC web
platform page is displayed.
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click OK.
# Click Next.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
# Click in front of Authentication Profile. Under it, click HACA Access. The
Portal Profile page is displayed.
# Click OK. In Portal Authentication Server List, select the server named
wlan-net and click OK.
# Click Apply. In the dialog box that is displayed, click OK.
3. Configure the HACA server.
6. Click OK.
7. Select the authentication-free rule with the ID 1 and click Apply. In the dialog
box that is displayed, click OK.
Step 10 Configure the user group and users on the iMaster NCE-Campus.
1. Choose Admission > User Management > Users from the main menu.
2. Click to batch import users and user groups using the Excel template.
Download the template, fill users and user groups in the document, and
upload the Excel document.
3. Click OK.
Step 11 Configure authentication parameters on the iMaster NCE-Campus.
1. Select a site.
a. Choose Deploy > Site > Site configuration from the main menu.
b. Select a site from the Site drop-down list box in the upper left corner and
set the site as an operation object.
2. In the navigation tree on the left, choose AC(Fit AP) > Fit AP.
3. Click Add and configure authentication parameters as follows:
– Name: wlan-net
– SSID: wlan-net, which must be the same as the SSID configured on the
AC
– Authentication mode: Open network
– Push mode: Fast
– Push page: Default customization page with user name and password
authentication
– User group: Guest
4. Click OK.
Step 12 Verify the configuration.
● The WLAN with the SSID wlan-net is available for STAs after the
configuration is complete.
● The STAs obtain IP addresses when they successfully associate with the
WLAN.
● When a user opens the browser and attempts to access the network, the user
is automatically redirected to the authentication page provided by the Portal
server. After entering the correct user name and password on the page, the
user can access the network.
----End
NOTE
When terminal accounts are stored on an LDAP server, it is recommended that 802.1X +
RADIUS authentication be used. In this case, the device connects to the LDAP server
through a RADIUS server.
Data Planning
Item Data
Item Data
IP address 10.23.100.2-10.23.100.254/24
pool for
APs
IP address 10.23.101.2-10.23.101.254/24
pool for
STAs
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure network connectivity between the AC, APs, and other network
devices.
2. Configure system parameters for the AC using the configuration wizard.
3. Configure the APs to go online on the AC using the configuration wizard.
4. Configure WLAN services on the AC using the configuration wizard. Configure
MAC address authentication and LDAP authentication to authenticate users.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure system parameters for the AC.
1. Configure AC basic parameters.
Choose Configuration > Config Wizard > AC. The Basic AC Configuration
page is displayed.
# Set Country/Region as required (China as an example). Set System time
to Manual and Date and time to PC.
# Click Apply.
# Select GigabitEthernet0/0/2. Expand Batch Modify. Set Interface type to
Trunk and add GigabitEthernet0/0/2 to VLAN 101 (service VLAN).
# Click Apply.
# Click Next. The Network Interconnection page is displayed.
3. Configure network connectivity.
# Click Create under Interface Configuration. The Create Interface
Configuration page is displayed.
# Set the IP address of VLANIF 100 to 10.23.100.1/24, DHCP status to ON,
and DHCP type to Interface address pool.
# Click OK.
# Configure the address pool for VLANIF 101 in the similar way. Set the IP
address of VLANIF 101 to 10.23.101.1/24, DHCP status to ON, and DHCP
type to Interface address pool.
# Under Static Route Table, click Create. The Create Static Route Table
page is displayed.
# Click OK.
# Click Next.
# Set AC source address to VLANIF. Click the browse button and select
Vlanif100.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Configure the SSID name, forwarding mode, and service VLAN ID.
NOTE
– User filtering field: The value of the user filtering field is used as the user name to
log in to an LDAP server. The user filtering field must be the same as that on the
server. The default value is sAMAccountName.
– Group filtering field: The device uses the value of a group filtering field as the
group name to perform authorization. The group filtering field must be the same
as that on the server. The default value is ou.
# Click OK. Select the created LDAP server template, and click OK.
# Choose Wireless Service > VAP Profile > wlan-net > Authentication
Profile > Authorization Scheme. The Authorization Scheme page is
displayed.
# Set Authorization Scheme to wlan-net.
# Click Apply. In the dialog box that is displayed, click OK.
Step 5 Verify the configuration.
1. STAs automatically connect to the WLAN with the SSID wlan-net.
2. Choose Monitoring > User > User List. In User List, set the search criteria to
SSID, enter wlan-net, and click . STAs go online successfully and obtain IP
addresses.
----End
NOTE
When terminal accounts are stored on an LDAP server, it is recommended that 802.1X +
RADIUS authentication be used. In this case, the device connects to the LDAP server
through a RADIUS server.
Data Planning
Item Data
IP address 10.23.100.2-10.23.100.254/24
pool for
APs
IP address 10.23.101.2-10.23.101.254/24
pool for
STAs
Item Data
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure network connectivity between the AC, APs, and other network
devices.
2. Configure system parameters for the AC using the configuration wizard.
3. Configure the APs to go online on the AC using the configuration wizard.
4. Configure WLAN services on the AC using the configuration wizard. Configure
MAC address authentication and AD authentication to authenticate users.
5. Complete service verification.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
Procedure
Step 1 Configure system parameters for the AC.
1. Configure AC basic parameters.
Choose Configuration > Config Wizard > AC. The Basic AC Configuration
page is displayed.
# Set Country/Region as required (China as an example). Set System time
to Manual and Date and time to PC.
# Click Apply.
# Select GigabitEthernet0/0/2. Expand Batch Modify. Set Interface type to
Trunk and add GigabitEthernet0/0/2 to VLAN 101 (service VLAN).
# Click Apply.
# Click Next. The Network Interconnection page is displayed.
3. Configure network connectivity.
# Click Create under Interface Configuration. The Create Interface
Configuration page is displayed.
# Set the IP address of VLANIF 100 to 10.23.100.1/24, DHCP status to ON,
and DHCP type to Interface address pool.
# Click OK.
# Configure the address pool for VLANIF 101 in the similar way. Set the IP
address of VLANIF 101 to 10.23.101.1/24, DHCP status to ON, and DHCP
type to Interface address pool.
# Under Static Route Table, click Create. The Create Static Route Table
page is displayed.
# Click OK.
# Click Next.
# Set AC source address to VLANIF. Click the browse button and select
Vlanif100.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Configure the SSID name, forwarding mode, and service VLAN ID.
# Click Finish.
NOTE
– User filtering field: The value of the user filtering field is used as the user name to
log in to an AD server. The user filtering field must be the same as that on the
server. The default value is sAMAccountName.
– Group filtering field: The device uses the value of a group filtering field as the
group name to perform authorization. The group filtering field must be the same
as that on the server. The default value is ou.
# Click OK. Select the created AD server template, and click OK.
# Click Apply. In the dialog box that is displayed, click OK.
4. Configure an AD authorization scheme.
# Choose Configuration > AP Config > Profile. On the Profile Management
page, choose AAA > Authorization Scheme. The Authorization Scheme List
page is displayed.
# Click Create. On the Create Authorization Scheme page that is displayed,
set Profile name to wlan-net and click OK.
# Set First authorization to AD authorization and click Apply. In the dialog
box that is displayed, click OK.
# Choose Wireless Service > VAP Profile > wlan-net > Authentication
Profile > Authorization Scheme. The Authorization Scheme page is
displayed.
# Set Authorization Scheme to wlan-net.
# Click Apply. In the dialog box that is displayed, click OK.
Step 5 Verify the configuration.
1. STAs automatically connect to the WLAN with the SSID wlan-net.
2. Choose Monitoring > User > User List. In User List, set the search criteria to
SSID, enter wlan-net, and click . STAs go online successfully and obtain IP
addresses.
----End
Service Requirements
To ensure that services are running normally, an enterprise wants to improve
network reliability while reducing the configuration maintenance workload.
Wireless configuration synchronization can be deployed in VRRP HSB to meet this
requirement. In this solution, the master and backup ACs are often deployed in the
same location, and the service switchover is fast and has higher reliability than
dual-link HSB.
Networking Requirements
● AC networking mode: Layer 2 networking in bypass mode
● DHCP deployment mode: The AC functions as a DHCP server to assign IP
addresses to APs, and a CSS functions as a DHCP server to assign IP addresses
to STAs.
● Service data forwarding mode: direct forwarding
● Switch cluster: A cluster is set up using CSS cards, containing SwitchB and
SwitchC at the core layer. SwitchB is the master switch, and SwitchC is the
standby switch.
Data Planning
Item Data
Configuration Roadmap
1. Configure a cluster between SwitchB and SwitchC through cluster cards to
improve the core layer reliability and configure SwitchB as the master switch.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● During the configuration, check whether loops occur on the wired network. If
so, configure MSTP on corresponding NEs.
● In the VRRP HSB networking, the configurations of the DHCP address pools
on the master and backup ACs must be consistent. For example, the ranges of
IP addresses that cannot be automatically assigned to clients in the DHCP
address pools must be consistent.
Procedure
Step 1 Establish a cluster using CSS card.
# Set the CSS ID, CSS priority, and CSS connection mode to 1, 100, and CSS card
connection for SwitchB.
<HUAWEI> system-view
[HUAWEI] sysname SwitchB
[SwitchB] set css mode css-card
[SwitchB] set css id 1
[SwitchB] set css priority 100
# Set the CSS ID, CSS priority, and CSS connection mode to 2, 10, and CSS card
connection for SwitchC.
<HUAWEI> system-view
[HUAWEI] sysname SwitchC
[SwitchC] set css mode css-card
[SwitchC] set css id 2
[SwitchC] set css priority 10
# Log in to the CSS through the console port on any MPU to check whether the
CSS is established successfully.
<SwitchB> display device
Chassis 1 (Master Switch)
S12708's Device status:
Slot Sub Type Online Power Register Status Role
-------------------------------------------------------------------------------
1 - ET1D2SFUD000 Present PowerOn Registered Normal NA
1 EH1D2VS08000 Present PowerOn Registered Normal NA
5 - ET1D2G48SEC0 Present PowerOn Registered Normal NA
7 - ET1D2X16SSC0 Present PowerOn Registered Normal NA
9 - ET1D2MPUA000 Present PowerOn Registered Normal Slave
10 - ET1D2MPUA000 Present PowerOn Registered Normal Master
12 - ET1D2SFUD000 Present PowerOn Registered Normal NA
1 EH1D2VS08000 Present PowerOn Registered Normal NA
13 - ET1D2SFUD000 Present PowerOn Registered Normal NA
1 EH1D2VS08000 Present PowerOn Registered Normal NA
14 - ET1D2SFUD000 Present PowerOn Registered Normal NA
1 EH1D2VS08000 Present PowerOn Registered Normal NA
PWR1 - - Present PowerOn Registered Normal NA
PWR2 - - Present PowerOn Registered Normal NA
CMU2 - EH1D200CMU00 Present PowerOn Registered Normal Master
FAN1 - - Present PowerOn Registered Normal NA
FAN2 - - Present PowerOn Registered Normal NA
FAN3 - - Present PowerOn Registered Normal NA
FAN4 - - Present PowerOn Registered Normal NA
Chassis 2 (Standby Switch)
S12708's Device status:
Slot Sub Type Online Power Register Status Role
-------------------------------------------------------------------------------
1 - ET1D2SFUD000 Present PowerOn Registered Normal NA
1 EH1D2VS08000 Present PowerOn Registered Normal NA
3 - ET1D2G48SEC0 Present PowerOn Registered Normal NA
Chassis Id CSS Enable CSS Status CSS Mode Priority Master Force
------------------------------------------------------------------------------
1 On Master CSS card 100 Off
2 On Standby CSS card 10 Off
The command output shows the card status and CSS status of both member
switches, indicating that the CSS is established successfully.
# Check whether the cluster links are normal.
<SwitchB> display css channel
Chassis 1 || Chassis 2
--------------------------------------------------------------------------------
Num [Port] [Speed] || [Speed] [Port]
1 1/1/0/1 10G 10G 2/1/0/1
2 1/1/0/2 10G 10G 2/1/0/2
3 1/1/0/3 10G 10G 2/1/0/3
4 1/1/0/4 10G 10G 2/1/0/4
5 1/1/0/5 10G 10G 2/1/0/5
6 1/1/0/6 10G 10G 2/1/0/6
7 1/1/0/7 10G 10G 2/1/0/7
8 1/1/0/8 10G 10G 2/1/0/8
9 1/12/0/1 10G 10G 2/12/0/1
10 1/12/0/2 10G 10G 2/12/0/2
11 1/12/0/3 10G 10G 2/12/0/3
12 1/12/0/4 10G 10G 2/12/0/4
13 1/12/0/5 10G 10G 2/12/0/5
14 1/12/0/6 10G 10G 2/12/0/6
15 1/12/0/7 10G 10G 2/12/0/7
16 1/12/0/8 10G 10G 2/12/0/8
17 1/13/0/1 10G 10G 2/13/0/1
18 1/13/0/2 10G 10G 2/13/0/2
19 1/13/0/3 10G 10G 2/13/0/3
20 1/13/0/4 10G 10G 2/13/0/4
21 1/13/0/5 10G 10G 2/13/0/5
22 1/13/0/6 10G 10G 2/13/0/6
23 1/13/0/7 10G 10G 2/13/0/7
24 1/13/0/8 10G 10G 2/13/0/8
25 1/14/0/1 10G 10G 2/14/0/1
26 1/14/0/2 10G 10G 2/14/0/2
27 1/14/0/3 10G 10G 2/14/0/3
28 1/14/0/4 10G 10G 2/14/0/4
29 1/14/0/5 10G 10G 2/14/0/5
30 1/14/0/6 10G 10G 2/14/0/6
31 1/14/0/7 10G 10G 2/14/0/7
32 1/14/0/8 10G 10G 2/14/0/8
--------------------------------------------------------------------------------
The command output shows that all the cluster links are in Up state, indicating
that the CSS has been established successfully.
Step 2 Configure SwitchA, SwitchB, and SwitchC to ensure that APs and ACs can
exchange CAPWAP packets.
NOTE
# Add GE1/1/0/2 on SwitchB and GE2/1/0/2 on SwitchC to Eth-Trunk 10, and add
E1/1/0/1 on SwitchB and GE2/1/0/1 on SwitchC both to VLAN 100.
[SwitchB] sysname CSS
[CSS] vlan batch 100 101
[CSS] interface gigabitethernet 1/1/0/1
[CSS-GigabitEthernet1/1/0/1] port link-type trunk
[CSS-GigabitEthernet1/1/0/1] undo port trunk allow-pass vlan 1
[CSS-GigabitEthernet1/1/0/1] port trunk allow-pass vlan 100
[CSS-GigabitEthernet1/1/0/1] quit
[CSS] interface gigabitethernet 2/1/0/1
[CSS-GigabitEthernet2/1/0/1] port link-type trunk
[CSS-GigabitEthernet2/1/0/1] undo port trunk allow-pass vlan 1
[CSS-GigabitEthernet2/1/0/1] port trunk allow-pass vlan 100
[CSS-GigabitEthernet2/1/0/1] quit
[CSS] interface eth-trunk 10
[CSS-Eth-Trunk10] port link-type trunk
[CSS-Eth-Trunk10] undo port trunk allow-pass vlan 1
[CSS-Eth-Trunk10] port trunk allow-pass vlan 100 101
[CSS-Eth-Trunk10] quit
[CSS] interface gigabitethernet 1/1/0/2
[CSS-GigabitEthernet1/1/0/2] undo port link-type
[CSS-GigabitEthernet1/1/0/2] eth-trunk 10
[CSS-GigabitEthernet1/1/0/2] quit
[CSS] interface gigabitethernet 2/1/0/2
[CSS-GigabitEthernet2/1/0/2] undo port link-type
[CSS-GigabitEthernet2/1/0/2] eth-trunk 10
[CSS-GigabitEthernet2/1/0/2] quit
NOTE
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Apply.
# Deselect GigabitEthernet0/0/1 and then select GigabitEthernet0/0/2. Add
GigabitEthernet0/0/2 to VLAN 102 in the same way.
# Click OK.
# Click Create under DHCPv4 Address Pool List, set Address pool type to
Interface address pool, and select VLANIF 100. Expand Advanced. Click
to add 10.23.100.1 to 10.23.100.3 to Excluded IP address.
NOTE
# Click OK.
# Set the IP address of VLANIF 102 to 10.23.102.1/24.
# Click Next. The AC Backup Configuration page is displayed.
4. Configure AC backup.
# Enable the HSB function.
# Click OK.
# Configure HSB. Set the parameters as follows:
– Local AC IP address: 10.23.102.1
– Peer AC IP address: 10.23.102.2
– Local port: 10241
– Remote port: 10241
– Associated VRID: 1
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
# Set the SSID name, forwarding mode, and service VLAN ID.
# Click Finish.
# Configure AC2 in the same way as that for configuring AC1. The difference
lies in the VLANIF interfaces' IP addresses (VLANIF 100: 10.23.100.2/24;
VLANIF 102: 10.23.102.2/24).
4. Configure AC backup.
# Configure AC2 in the same way as that for configuring AC1. The difference
lies in the priority and preemption delay (s). When configuring a VRRP group,
retain the default settings of Priority and Preemption delay(s). When
configuring HSB, set Local AC IP address to 10.23.102.2 and Peer AC IP
address to 10.23.102.1.
5. Configure the source address for AC2.
# Configure AC2 in the same way as that for configuring AC1.
6. Confirm the configuration.
# Confirm the configuration and click Finish.
Step 8 Trigger wireless configuration synchronization manually on AC1.
# Choose Monitoring > AC > Wireless Configuration Synchronization
Information. The Wireless Configuration Synchronization Information page is
displayed. Set Auto refresh to ON.
# Click Manual synchronization under Operation. In the Confirm dialog box that
is displayed, click OK. AC2 restarts automatically.
# The WLAN with SSID wlan-net is available for STAs connected to the AP, and
these STAs can connect to the WLAN and go online normally.
# Simulate a master AC fault by restarting the master AC to verify the backup
configuration. Restart AC1. When an AP detects a fault on the link connected to
AC1, AC2 takes the active role, ensuring service stability.
NOTE
Before restarting the AC, click Save in the upper right corner of the web page to save the
configuration file on the AC to prevent configuration loss after the restart.
# During the restart of AC1, services on the STAs are not interrupted. The AP goes
online on AC2. On AC2, choose Monitoring > AP > AP Statistics Collection. It is
found that the AP status changes from standby to normal.
# After AC1 recovers from the restart, an active/standby switchback is triggered.
The AP automatically goes online on AC1.
----End
Service Requirements
To ensure that services are running normally, an enterprise wants to improve
network reliability while reducing the configuration maintenance workload.
Wireless configuration synchronization can be deployed in dual-link HSB to meet
this requirement. This solution frees active and standby ACs from location
restrictions and allows both ACs to be flexibly deployed.
Networking Requirements
● AC networking mode: Layer 2 bypass mode
● DHCP deployment mode: The router functions as a DHCP server to assign IP
addresses to APs and STAs.
● Service data forwarding mode: direct forwarding
Data Planning
Item Data
Active AC AC1
Standby AC AC2
Master AC AC1
Local AC AC2
Item Data
Configuration Roadmap
1. Configure network interconnection. Configure Router as a DHCP server to
assign IP addresses to APs and STAs.
2. Configure AC1, APs going online, and WLAN services following the
configuration wizard.
3. Configure dual-link hot standby (HSB) on AC1.
4. Configure AC2 following the configuration wizard.
5. Configure dual-link HSB on AC2.
6. Trigger wireless configuration synchronization on AC1.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure SwitchA and SwitchB to ensure that the APs and ACs can exchange
CAPWAP packets.
# On SwitchA, set the PVID on GE0/0/1 connected to the AP to the management
VLAN 100 and add the interface to VLAN 100 and VLAN 101. Add GE0/0/2
connected to SwitchB to VLAN 100 and VLAN 101.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
[SwitchA] vlan batch 100 101
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk pvid vlan 100
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[SwitchA-GigabitEthernet0/0/2] quit
# On SwitchB, add GE0/0/1 (connected to SwitchA) to VLAN 100 and VLAN 101,
and GE0/0/2 (connected to AC1) and GE0/0/3 (connected to AC2) to VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname SwitchB
[SwitchB] vlan batch 100
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] port link-type trunk
[SwitchB-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[SwitchB-GigabitEthernet0/0/1] quit
[SwitchB] interface gigabitethernet 0/0/2
[SwitchB-GigabitEthernet0/0/2] port link-type trunk
[SwitchB-GigabitEthernet0/0/2] port trunk allow-pass vlan 100
[SwitchB-GigabitEthernet0/0/2] quit
[SwitchB] interface gigabitethernet 0/0/3
[SwitchB-GigabitEthernet0/0/3] port link-type trunk
[SwitchB-GigabitEthernet0/0/3] port trunk allow-pass vlan 100
[SwitchB-GigabitEthernet0/0/3] quit
Configure the DNS server as required. The common methods are as follows:
● In the interface address pool scenario, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In the global address pool scenario, run the dns-list ip-address &<1-8> command in the IP
address pool view.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 100 101
[Router] dhcp enable
[Router] ip pool sta
[Router-ip-pool-sta] network 10.23.101.0 mask 24
[Router-ip-pool-sta] gateway-list 10.23.101.1
[Router-ip-pool-sta] quit
[Router] ip pool ap
[Router-ip-pool-ap] network 10.23.100.0 mask 24
[Router-ip-pool-ap] excluded-ip-address 10.23.100.2
[Router-ip-pool-ap] excluded-ip-address 10.23.100.3
[Router-ip-pool-ap] gateway-list 10.23.100.1
[Router-ip-pool-ap] quit
[Router] interface vlanif 100
[Router-Vlanif100] ip address 10.23.100.1 24
[Router-Vlanif100] dhcp select global
[Router-Vlanif100] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.23.101.1 24
[Router-Vlanif101] dhcp select global
[Router-Vlanif101] quit
[Router] interface gigabitethernet 0/0/1
[Router-GigabitEthernet0/0/1] port link-type trunk
[Router-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[Router-GigabitEthernet0/0/1] quit
# Choose Configuration > Config Wizard > AC from the main menu. The
Basic AC Configuration page is displayed.
NOTE
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Apply.
# Repeat the preceding steps to configure VLANIF 102. Set the IP address of
VLANIF 102 to 10.23.102.1/24.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
# STAs associated with the AP can find the SSID wlan-net and connect to the
WLAN.
# Simulate a master AC fault by restarting the master AC to verify the backup
configuration. Restart AC1. When an AP detects a fault on the link connected to
AC1, AC2 takes the active role, ensuring service stability.
NOTE
Before restarting the AC, click Save in the upper right corner of the web page to save the
configuration file on the AC to prevent configuration loss after the restart.
# During the restart of AC1, services on the STAs are not interrupted. The AP goes
online on AC2. On AC2, choose Monitoring > AP > AP Statistics Collection. It is
found that the AP status changes from standby to normal.
# After AC1 recovers from the restart, an active/standby switchback is triggered.
The AP automatically goes online on AC1.
----End
Service Requirements
An enterprise uses two APs to deploy WLAN area A to provide WLAN services. The
enterprise requires that dual-link backup be used to improve data transmission
reliability.
Networking Requirements
● AC networking mode: Layer 2 networking in bypass mode
● DHCP deployment mode: The switch functions as a DHCP server to assign IP
addresses to APs and STAs.
● Service data forwarding mode: direct forwarding
Data Planning
Item Data
Item Data
Configuration Roadmap
1. Set up connections between AC1, AC2, and other network devices. Configure
the switch as a DHCP server to assign IP addresses to APs and STAs.
2. Configure AC1 as the active AC and configure basic WLAN services on AC1.
3. Configure AC2 as the standby AC and configure basic WLAN services on AC2.
Ensure that service configurations on AC1 and AC2 are the same.
4. Configure dual-link backup on the active AC first and then on the standby AC.
When dual-link backup is enabled, all APs are restarted. With dual-link
backup enabled, the standby AC will replace the active AC to manage APs if
the CAPWAP tunnel between the active AC and APs is disconnected.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
Procedure
Step 1 Configure the switch.
# On the switch, create VLAN 100 and VLAN 101. VLAN 100 is used as the
management VLAN and VLAN 101 is used as the service VLAN. Set the link type
of GE0/0/1 and GE0/0/4 that connect the switch to the APs to trunk and the PVID
of the two interfaces to 100, and configure the interfaces to allow packets in
VLAN 100 and VLAN 101 to pass. Set the link type of GE0/0/2 and GE0/0/3 on the
switch to trunk, and configure the interfaces to allow packets in VLAN 100 to pass.
<HUAWEI> system-view
[HUAWEI] sysname Switch
[Switch] vlan batch 100 101
[Switch] interface gigabitethernet 0/0/1
[Switch-GigabitEthernet0/0/1] port link-type trunk
[Switch-GigabitEthernet0/0/1] port trunk pvid vlan 100
[Switch-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 101
[Switch-GigabitEthernet0/0/1] port-isolate enable
[Switch-GigabitEthernet0/0/1] quit
[Switch] interface gigabitethernet 0/0/4
[Switch-GigabitEthernet0/0/4] port link-type trunk
[Switch-GigabitEthernet0/0/4] port trunk pvid vlan 100
[Switch-GigabitEthernet0/0/4] port trunk allow-pass vlan 100 to 101
[Switch-GigabitEthernet0/0/4] port-isolate enable
[Switch-GigabitEthernet0/0/4] quit
[Switch] interface gigabitethernet 0/0/2
[Switch-GigabitEthernet0/0/2] port link-type trunk
[Switch-GigabitEthernet0/0/2] port trunk allow-pass vlan 100
[Switch-GigabitEthernet0/0/2] quit
[Switch] interface gigabitethernet 0/0/3
[Switch-GigabitEthernet0/0/3] port link-type trunk
Configure the DHCP function on the switch to assign IP addresses to APs and
STAs.
NOTE
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
# Configure VLANIF 100 to use the interface address pool to assign IP addresses
to APs.
[Switch] dhcp enable
[Switch] interface vlanif 100
[Switch-Vlanif100] ip address 10.23.100.1 255.255.255.0
[Switch-Vlanif100] dhcp select interface
[Switch-Vlanif100] dhcp server excluded-ip-address 10.23.100.2 10.23.100.3
[Switch-Vlanif100] quit
# Configure VLANIF 101 to use the interface address pool to assign IP addresses
to STAs.
[Switch] interface vlanif 101
[Switch-Vlanif101] ip address 10.23.101.1 255.255.255.0
[Switch-Vlanif101] dhcp select interface
[Switch-Vlanif101] quit
# Choose Configuration > Config Wizard > AC. The Basic AC Configuration
page is displayed.
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Apply.
# Click Next. The Network Interconnection Configuration page is displayed.
3. Configuring network interconnections.
# Click Create under Interface Configuration. The Create Interface
Configuration page is displayed.
# Set the IP address of VLANIF 100 to 10.23.100.2/24.
# Click OK.
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 4 Configure WLAN services on AC1.
# Click Create. The Basic Information page is displayed.
# Configure the SSID name, forwarding mode, and service VLAN ID.
By default, dual-link backup is disabled. Enabling dual-link backup will restart all APs. After the
APs are restarted, the dual-link backup function takes effect.
If dual-link backup is already enabled, performing the configuration does not restart APs.
Choose Maintenance > AP Maintenance > AP Restart on the active AC to restart the APs and
make the dual-link backup function take effect.
# The WLAN with the SSID wlan-net is available for STAs connected to AP1 and
AP2, and the STAs can connect to the WLAN and go online properly.
# Simulate a master AC fault by restarting the master AC to verify the backup
configuration. Restart AC1. When an AP detects a fault on the link connected to
AC1, AC2 takes the active role, ensuring service stability.
NOTE
Before restarting the AC, click Save in the upper right corner of the web page to save the
configuration file on the AC to prevent configuration loss after the restart.
# During the restart of AC1, the AP goes online on AC2. On AC2, choose
Monitoring > AP > AP Statistics Collection. It is found that the AP status
changes from standby to normal.
# After AC1 recovers from the restart, an active/standby switchback is triggered.
The AP automatically goes online on AC1.
----End
Service Requirements
An enterprise deploys a WLAN to provide WLAN services. The enterprise requires
that dual-link HSB be used to improve data transmission reliability.
Networking Requirements
● AC networking mode: Layer 2 networking in bypass mode
● DHCP deployment mode: The router functions as a DHCP server to assign IP
addresses to APs and STAs.
● Service data forwarding mode: direct forwarding
Data Planning
Item Data
Configuration Roadmap
1. Configure network interworking of the APs, ACs, and other network devices.
2. Configure AC1 as the active AC and configure basic WLAN services on AC1.
3. Configure AC2 as the standby AC and configure basic WLAN services on AC2.
Ensure that service configurations on AC1 and AC2 are the same.
4. Configure hot standby on the ACs so that the WLAN and NAC services on AC1
are backed up to AC2 in real time or in a batch. If AC1 is faulty, AC2 takes
over services from AC1. User services are not interrupted.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure SwitchA and SwitchB to ensure that the APs and ACs can exchange
CAPWAP packets.
# On SwitchA, set the PVID on GE0/0/1 connected to the AP to the management
VLAN 100 and add the interface to VLAN 100 and VLAN 101. Add GE0/0/2
connected to SwitchB to VLAN 100 and VLAN 101.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
[SwitchA] vlan batch 100 101
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk pvid vlan 100
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[SwitchA-GigabitEthernet0/0/2] quit
# On SwitchB, add GE0/0/1 (connected to SwitchA) to VLAN 100 and VLAN 101,
and GE0/0/2 (connected to AC1) and GE0/0/3 (connected to AC2) to VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname SwitchB
[SwitchB] vlan batch 100
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] port link-type trunk
[SwitchB-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[SwitchB-GigabitEthernet0/0/1] quit
[SwitchB] interface gigabitethernet 0/0/2
[SwitchB-GigabitEthernet0/0/2] port link-type trunk
[SwitchB-GigabitEthernet0/0/2] port trunk allow-pass vlan 100
[SwitchB-GigabitEthernet0/0/2] quit
[SwitchB] interface gigabitethernet 0/0/3
[SwitchB-GigabitEthernet0/0/3] port link-type trunk
[SwitchB-GigabitEthernet0/0/3] port trunk allow-pass vlan 100
[SwitchB-GigabitEthernet0/0/3] quit
NOTE
Configure the DNS server as required. The common methods are as follows:
● In the interface address pool scenario, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In the global address pool scenario, run the dns-list ip-address &<1-8> command in the IP
address pool view.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 100 101
[Router] dhcp enable
[Router] ip pool sta
[Router-ip-pool-sta] network 10.23.101.0 mask 24
[Router-ip-pool-sta] gateway-list 10.23.101.1
[Router-ip-pool-sta] quit
[Router] ip pool ap
[Router-ip-pool-ap] network 10.23.100.0 mask 24
[Router-ip-pool-ap] excluded-ip-address 10.23.100.2
[Router-ip-pool-ap] excluded-ip-address 10.23.100.3
[Router-ip-pool-ap] gateway-list 10.23.100.1
[Router-ip-pool-ap] quit
[Router] interface vlanif 100
[Router-Vlanif100] ip address 10.23.100.1 24
[Router-Vlanif100] dhcp select global
[Router-Vlanif100] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.23.101.1 24
[Router-Vlanif101] dhcp select global
[Router-Vlanif101] quit
[Router] interface gigabitethernet 0/0/1
[Router-GigabitEthernet0/0/1] port link-type trunk
[Router-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[Router-GigabitEthernet0/0/1] quit
# Choose Configuration > Config Wizard > AC from the main menu. The
Basic AC Configuration page is displayed.
NOTE
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Apply.
# Repeat the preceding steps to configure VLANIF 102. Set the IP address of
VLANIF 102 to 10.23.102.1/24.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
# On the page that displays the template import result, click OK.
# AP group information has been added in the template file. Click Next. The
Confirm Configurations page is displayed.
3. Confirm the configuration.
# Configure the SSID name, forwarding mode, and service VLAN ID.
# Set Security settings to Key (applicable to personnel networks) and set the
key.
Click Finish.
The configuration is similar to that on AC1. The difference is that the IP addresses
of VLANIF 100 and VLANIF 102 are 10.23.100.3/24 and 10.23.102.2/24,
respectively.
Step 10 Configure IP addresses for primary ACs and the backup AC on AC_1.
1. # Choose Configuration > AP Config > AP Group > AP Group.
2. # In the AP group list, click ap-group1. Choose AP > AP System Profile. The
AP System Profile page is displayed.
3. # Click Create. On the page that is displayed, set Profile name to wlan-net
and click OK.
4. # On the Advanced Configuration page of the AP system profile, expand
Dual-Link/N+1 Backup. Set Configuration mode to IP address-based,
Primary AC IP address to 10.23.100.2, and Backup AC IP address to
10.23.100.3.
Step 11 Configure IP addresses for primary ACs and the backup AC on AC_1.
The configuration is similar to that on AC1. The following parameter settings are
different:
● Local AC IP address: 10.23.102.2
● Peer AC IP address: 10.23.102.1
# The WLAN with the SSID wlan-net is available for STAs connected to AP1 and
AP2, and these STAs can connect to the WLAN and go online properly.
Before restarting the AC, click Save in the upper right corner of the web page to save the
configuration file on the AC to prevent configuration loss after the restart.
# During the restart of AC1, services on the STAs are not interrupted. The AP goes
online on AC2. On AC2, choose Monitoring > AP > AP Statistics Collection. It is
found that the AP status changes from standby to normal.
----End
Service Requirements
An enterprise deploys a WLAN to provide WLAN services to users. The enterprise
requires that VRRP HSB be used to improve data transmission reliability.
Networking Requirements
● AC networking mode: Layer 2 networking in bypass mode
● DHCP deployment mode: The AC functions as a DHCP server to assign IP
addresses to APs, and a CSS functions as a DHCP server to assign IP addresses
to STAs.
● Service data forwarding mode: direct forwarding
● Switch cluster: A cluster is set up using CSS cards, containing SwitchB and
SwitchC at the core layer. SwitchB is the master switch, and SwitchC is the
standby switch.
Figure 3-31 Networking diagram for configuring VRRP HSB (direct forwarding)
Data Planning
Item Data
Item Data
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure a cluster between SwitchB and SwitchC through cluster cards to
improve the core layer reliability and configure SwitchB as the master switch.
2. Configure AC1 and AC2 using the configuration wizard.
– Configure network connectivity between the AC, APs, and other network
devices.
– Configure a VRRP group on AC1 and AC2. Configure a high priority for
AC1 as the active device to forward traffic, and a low priority for AC2 as
the standby device.
– Configure the hot standby (HSB) function on the ACs so that service
information on AC1 is backed up to AC2 in real time or in batches,
ensuring seamless service switchover from the active device to the
standby device.
– Add APs on AC1 and AC2, and configure basic WLAN services.
NOTE
During the configuration, check whether loops occur on the wired network. If so, configure
MSTP on corresponding NEs.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Establish a cluster using CSS card.
# Set the CSS ID, CSS priority, and CSS connection mode to 1, 100, and CSS card
connection for SwitchB.
<HUAWEI> system-view
[HUAWEI] sysname SwitchB
[SwitchB] set css mode css-card
[SwitchB] set css id 1
[SwitchB] set css priority 100
# Set the CSS ID, CSS priority, and CSS connection mode to 2, 10, and CSS card
connection for SwitchC.
<HUAWEI> system-view
[HUAWEI] sysname SwitchC
[SwitchC] set css mode css-card
[SwitchC] set css id 2
[SwitchC] set css priority 10
# Log in to the CSS through the console port on any MPU to check whether the
CSS is established successfully.
<SwitchB> display device
Chassis 1 (Master Switch)
S12708's Device status:
Slot Sub Type Online Power Register Status Role
-------------------------------------------------------------------------------
1 - ET1D2SFUD000 Present PowerOn Registered Normal NA
1 EH1D2VS08000 Present PowerOn Registered Normal NA
5 - ET1D2G48SEC0 Present PowerOn Registered Normal NA
7 - ET1D2X16SSC0 Present PowerOn Registered Normal NA
9 - ET1D2MPUA000 Present PowerOn Registered Normal Slave
10 - ET1D2MPUA000 Present PowerOn Registered Normal Master
12 - ET1D2SFUD000 Present PowerOn Registered Normal NA
1 EH1D2VS08000 Present PowerOn Registered Normal NA
Chassis Id CSS Enable CSS Status CSS Mode Priority Master Force
------------------------------------------------------------------------------
1 On Master CSS card 100 Off
2 On Standby CSS card 10 Off
The command output shows the card status and CSS status of both member
switches, indicating that the CSS is established successfully.
# Check whether the cluster links are normal.
<SwitchB> display css channel
Chassis 1 || Chassis 2
--------------------------------------------------------------------------------
Num [Port] [Speed] || [Speed] [Port]
1 1/1/0/1 10G 10G 2/1/0/1
2 1/1/0/2 10G 10G 2/1/0/2
3 1/1/0/3 10G 10G 2/1/0/3
4 1/1/0/4 10G 10G 2/1/0/4
5 1/1/0/5 10G 10G 2/1/0/5
6 1/1/0/6 10G 10G 2/1/0/6
7 1/1/0/7 10G 10G 2/1/0/7
8 1/1/0/8 10G 10G 2/1/0/8
9 1/12/0/1 10G 10G 2/12/0/1
10 1/12/0/2 10G 10G 2/12/0/2
11 1/12/0/3 10G 10G 2/12/0/3
12 1/12/0/4 10G 10G 2/12/0/4
13 1/12/0/5 10G 10G 2/12/0/5
14 1/12/0/6 10G 10G 2/12/0/6
15 1/12/0/7 10G 10G 2/12/0/7
16 1/12/0/8 10G 10G 2/12/0/8
17 1/13/0/1 10G 10G 2/13/0/1
18 1/13/0/2 10G 10G 2/13/0/2
19 1/13/0/3 10G 10G 2/13/0/3
The command output shows that all the cluster links are in Up state, indicating
that the CSS has been established successfully.
Step 2 Configure SwitchA, SwitchB, and SwitchC to ensure that APs and ACs can
exchange CAPWAP packets.
NOTE
# Add GE1/1/0/2 on SwitchB and GE2/1/0/2 on SwitchC to Eth-Trunk 10, and add
E1/1/0/1 on SwitchB and GE2/1/0/1 on SwitchC both to VLAN 100.
[SwitchB] sysname CSS
[CSS] vlan batch 100 101
[CSS] interface gigabitethernet 1/1/0/1
[CSS-GigabitEthernet1/1/0/1] port link-type trunk
[CSS-GigabitEthernet1/1/0/1] undo port trunk allow-pass vlan 1
[CSS-GigabitEthernet1/1/0/1] port trunk allow-pass vlan 100
[CSS-GigabitEthernet1/1/0/1] quit
[CSS] interface gigabitethernet 2/1/0/1
[CSS-GigabitEthernet2/1/0/1] port link-type trunk
[CSS-GigabitEthernet2/1/0/1] undo port trunk allow-pass vlan 1
NOTE
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Apply.
# Deselect GigabitEthernet0/0/1 and then select GigabitEthernet0/0/2. Add
GigabitEthernet0/0/2 to VLAN 102 in the same way.
# Click Next. The Network Interconnection Configuration page is displayed.
3. Configure network connectivity.
# Set DHCP status to ON.
# Click Create under Interface Configuration. The Create Interface
Configuration page is displayed.
# Set the IP address of VLANIF 100 to 10.23.100.1/24.
# Click OK.
# Click Create under DHCPv4 Address Pool List, set Address pool type to
Interface address pool, and select VLANIF 100. Expand Advanced. Click
to add 10.23.100.1 to 10.23.100.3 to Excluded IP address.
NOTE
# Click OK.
# Set the IP address of VLANIF 102 to 10.23.102.1/24.
# Click Next. The AC Backup Configuration page is displayed.
4. Configure AC backup.
# Enable the HSB function.
# Click Create. The Create VRID page is displayed.
# Create an mVRRP group. Set parameters as follows:
– VLANIF/IP: VLANIF100
– VRID: 1
– VRRP type: mVRRP group
– Virtual IP address: 10.23.100.3
– Priority: 120
– Preemption delay(s): 1800
# Click OK.
NOTE
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
# Click Finish.
# Configure AC2 in the same way as that for configuring AC1. The difference
lies in the VLANIF interfaces' IP addresses (VLANIF 100: 10.23.100.2/24;
VLANIF 102: 10.23.102.2/24).
4. Configure AC backup.
# Configure AC2 in the same way as that for configuring AC1. The difference
lies in the priority and preemption delay (s). When configuring a VRRP group,
retain the default settings of Priority and Preemption delay(s). When
configuring HSB, set Local AC IP address to 10.23.102.2 and Peer AC IP
address to 10.23.102.1.
5. Configure the source address for AC2.
The configuration is the same as that on AC1 and is not mentioned here.
The configuration is the same as that on AC1 and is not mentioned here.
# The WLAN with SSID wlan-net is available for STAs connected to the AP, and
these STAs can connect to the WLAN and go online normally.
Before restarting the AC, click Save in the upper right corner of the web page to save the
configuration file on the AC to prevent configuration loss after the restart.
# During the restart of AC1, services on the STAs are not interrupted. The AP goes
online on AC2. On AC2, choose Monitoring > AP > AP Statistics Collection. It is
found that the AP status changes from standby to normal.
----End
Service Requirements
A large enterprise has branches in different areas. ACs are deployed in the
branches to manage APs, providing WLAN access and email services. These
services require low network reliability and allow temporary service interruption.
An AC is required to be a backup of all ACs to save costs. In this scenario, the
enterprise can deploy a high-performance AC at the headquarters as a standby AC
to provide backup services for active ACs in the branches.
Networking Requirements
● AC networking mode: Layer 3 bypass mode
● DHCP deployment mode: Router_3 functions as a DHCP server to assign IP
addresses to APs and STAs.
● Service data forwarding mode: direct forwarding
Data Planning
Item Data
Item Data
AC_2:
● Name: wlan-net1
● SSID name: wlan-net1
AC_3:
● Name: wlan-net
● SSID name: wlan-net
● Name: wlan-net1
● SSID name: wlan-net1
Item Data
AC_2:
● Name: wlan-net1
● Forwarding mode: direct forwarding
● Service VLAN: VLAN 102
● Referenced profiles: SSID profile
wlan-net1 and security profile
wlan-net1
AC_3:
● Name: wlan-net
– Forwarding mode: direct
forwarding
– Service VLAN: VLAN 101
– Referenced profiles: SSID profile
wlan-net and security profile
wlan-net
● Name: wlan-net1
– Forwarding mode: direct
forwarding
– Service VLAN: VLAN 102
– Referenced profiles: SSID profile
wlan-net1 and security profile
wlan-net1
On AC_2:
● Name: ap-system1
– Primary AC IP address:
10.23.202.1
– Backup AC IP address:
10.23.203.1
Item Data
On AC_3:
● Name: ap-system
– Primary AC IP address:
10.23.201.1
– Backup AC IP address:
10.23.203.1
● Name: ap-system1
– Primary AC IP address:
10.23.202.1
– Backup AC IP address:
10.23.203.1
Configuration Roadmap
1. Configure network connectivity between ACs and other network devices.
Configure Router_3 as a DHCP server to assign IP addresses to APs and STAs.
2. Configure AC_1 and AC_2 as the active ACs of AP_1 and AP_2, respectively,
and configure basic WLAN services on AC_1 and AC_2.
3. Configure AC_3 as the standby AC of AP_1 and AP_2, and configure basic
WLAN services on AC_3. Ensure that service configurations on AC_3 are the
same as those on AC_1 and AC_2.
4. Configure N+1 backup on the active ACs first and then on the standby AC.
After the configuration, restart all the APs.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure the routers and switches to communicate with each other.
# On Router_1, create VLAN 99, VLAN 101, and VLAN 201. VLAN 99 is used as the
management VLAN and VLAN 101 is used as the service VLAN. Add Eth2/0/0
connected to Switch_1 to VLAN 99 and VLAN 101, and Eth2/0/1 connected to
AC_1 to VLAN 201. Configure the IP address 10.23.99.1/24 for VLANIF 99,
10.23.101.1/24 for VLANIF 101, and 10.23.201.2/24 for VLANIF 201.
<HUAWEI> system-view
[HUAWEI] sysname Router_1
[Router_1] vlan batch 99 101 201
[Router_1] interface ethernet 2/0/0
[Router_1-Ethernet2/0/0] port link-type trunk
[Router_1-Ethernet2/0/0] port trunk allow-pass vlan 99 101
[Router_1-Ethernet2/0/0] quit
[Router_1] interface ethernet 2/0/1
[Router_1-Ethernet2/0/1] port link-type trunk
[Router_1-Ethernet2/0/1] port trunk allow-pass vlan 201
[Router_1-Ethernet2/0/1] quit
[Router_1] interface vlanif 99
[Router_1-Vlanif99] ip address 10.23.99.1 255.255.255.0
[Router_1-Vlanif99] quit
[Router_1] interface vlanif 101
[Router_1-Vlanif101] ip address 10.23.101.1 255.255.255.0
[Router_1-Vlanif101] quit
[Router_1] interface vlanif 201
[Router_1-Vlanif201] ip address 10.23.201.2 255.255.255.0
[Router_1-Vlanif201] quit
# On Router_2, create VLAN 100, VLAN 102, and VLAN 202. VLAN 100 is used as
the management VLAN and VLAN 102 is used as the service VLAN. Add Eth2/0/0
connected to Switch_2 to VLAN 100 and VLAN 102, and Eth2/0/1 connected to
AC_2 to VLAN 202. Configure the IP address 10.23.100.1/24 for VLANIF 100,
10.23.102.1/24 for VLANIF 102, and 10.23.202.2/24 for VLANIF 202. The
configuration procedure is the same as that on Router_1.
# On Router_3, create VLAN 200 and VLAN 203. Add Eth2/0/0 connected to the
Internet to VLAN 200, and Eth2/0/1 connected to AC_3 to VLAN 203. Configure
the IP address 10.23.200.1/24 for VLANIF 200 and 10.23.203.2/24 for VLANIF 203.
The configuration procedure is the same as that on Router_1.
# On Switch_1, create VLAN 99 and VLAN 101. Add GE0/0/2 connected to
Router_1 and GE0/0/1 connected to AP_1 to VLAN 99 and VLAN 101. Set the PVID
of the interfaces to VLAN 99.
<HUAWEI> system-view
[HUAWEI] sysname Switch_1
[Switch_1] vlan batch 99 101
[Switch_1] interface gigabitethernet 0/0/1
[Switch_1-GigabitEthernet0/0/1] port link-type trunk
[Switch_1-GigabitEthernet0/0/1] port trunk pvid vlan 99
[Switch_1-GigabitEthernet0/0/1] port trunk allow-pass vlan 99 101
[Switch_1-GigabitEthernet0/0/1] port-isolate enable
[Switch_1-GigabitEthernet0/0/1] quit
[Switch_1] interface gigabitethernet 0/0/2
[Switch_1-GigabitEthernet0/0/2] port link-type trunk
[Switch_1-GigabitEthernet0/0/2] port trunk allow-pass vlan 99 101
[Switch_1-GigabitEthernet0/0/2] quit
# On Switch_2, create VLAN 100 and VLAN 102. Add GE0/0/2 connected to
Router_2 and GE0/0/1 connected to AP_2 to VLAN 100 and VLAN 102. Set the
PVID of the interfaces to VLAN 100. The configuration procedure is the same as
that on Switch_1.
Step 2 Configure a DHCP server to assign IP addresses to APs and STAs.
# Configure Router_1 as a DHCP relay agent.
[Router_1] dhcp enable
[Router_1] interface vlanif 99
[Router_1-Vlanif99] dhcp select relay
[Router_1-Vlanif99] dhcp relay server-ip 10.23.200.1
[Router_1-Vlanif99] quit
[Router_1] interface vlanif 101
[Router_1-Vlanif101] dhcp select relay
[Router_1-Vlanif101] dhcp relay server-ip 10.23.200.1
[Router_1-Vlanif101] quit
# Configure Router_3 as the DHCP server to assign IP addresses to APs and STAs,
and configure the Option 43 field to advertise the IP addresses of AC_1 and AC_3
to AP_1, and to advertise the IP addresses of AC_2 and AC_3 to AP_2. Configure
the DHCP server to assign IP addresses to AP_1 from the IP address pool
ap_1_pool, to AP_2 from ap_2_pool, to STA_1 from sta_1_pool, and to STA_2
from sta_2_pool.
NOTE
In this example, AP_1 and AP_2 cannot share an IP address pool; otherwise, AP_1 can discover
AC_2 and AP_2 can discover AC_1, which will cause APs unable to connect to the correct AC
based on the AC priority.
Configure the DNS server as required. The common methods are as follows:
● In the interface address pool scenario, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In the global address pool scenario, run the dns-list ip-address &<1-8> command in the IP
address pool view.
[Router_3] dhcp enable
[Router_3] ip pool ap_1_pool
[Router_3-ip-pool-ap_1_pool] network 10.23.99.0 mask 24
[Router_3-ip-pool-ap_1_pool] gateway-list 10.23.99.1
[Router_3-ip-pool-ap_1_pool] option 43 sub-option 2 ip-address 10.23.201.1 10.23.203.1
[Router_3-ip-pool-ap_1_pool] quit
[Router_3] ip pool ap_2_pool
[Router_3-ip-pool-ap_2_pool] network 10.23.100.0 mask 24
[Router_3-ip-pool-ap_2_pool] gateway-list 10.23.100.1
[Router_3-ip-pool-ap_2_pool] option 43 sub-option 2 ip-address 10.23.202.1 10.23.203.1
[Router_3-ip-pool-ap_2_pool] quit
[Router_3] ip pool sta_1_pool
[Router_3-ip-pool-sta_1_pool] network 10.23.101.0 mask 24
[Router_3-ip-pool-sta_1_pool] gateway-list 10.23.101.1
[Router_3-ip-pool-sta_1_pool] quit
[Router_3] ip pool sta_2_pool
[Router_3-ip-pool-sta_2_pool] network 10.23.102.0 mask 24
[Router_3-ip-pool-sta_2_pool] gateway-list 10.23.102.1
[Router_3-ip-pool-sta_2_pool] quit
[Router_3] interface Vlanif200
[Router_3-Vlanif200] dhcp select global
[Router_3-Vlanif200] quit
# Choose Configuration > Config Wizard > AC. The Basic AC Configuration
page is displayed.
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Apply.
# Under Static Route Table, click Create. The Create Static Route Table
page is displayed.
# Click OK.
# Click Next.
# Set AC source address to VLANIF. Click the browse button and select
Vlanif201.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 5 Configure WLAN services on AC_1.
# Click Create. The Basic Information page is displayed.
# Set the SSID name, forwarding mode, and service VLAN.
By default, N+1 backup is enabled. You need to restart all APs on the primary AC. After the
APs are restarted, N+1 backup takes effect.
2. Enable N+1 backup on AC_2 and AC_3. The configuration is similar to that on
AC_1.
Step 10 Verify the configuration.
# The WLAN with SSIDs wlan-net and wlan-net1 is available for STAs connected
to the APs, and these STAs can connect to the WLAN and go online properly.
# Simulate a master AC fault by restarting the master AC to verify the backup
configuration. Restart AC_1. When the AP_1 detects a fault on the link connected
to AC_1, AC_3 takes the active role, ensuring service stability.
NOTE
Before restarting the AC, click Save in the upper right corner of the web page to save the
configuration file on the AC to prevent configuration loss after the restart.
# During the restart of AC_1, the AP_1 goes online on AC_3. On AC_3, choose
Monitoring > AP > AP Statistics Collection. It is found that the AP status
changes from fault to normal.
# After AC_1 recovers from the restart, an active/standby switchback is triggered.
The AP_1 automatically goes online on AC_1.
----End
Service Requirements
Enterprise users can access the network through WLANs, which is the basic
requirement of mobile office. Furthermore, users' services are not affected during
roaming in the coverage area.
The enterprise requires that data forwarding be not affected even when the AC is
faulty to improve data transmission reliability.
Networking Requirements
● AC networking mode: Layer 2 bypass mode
Figure 3-33 Networking for configuring service holding upon WLAN CAPWAP link
disconnection
Data Planning
Item Data
Item Data
Configuration Roadmap
1. Configure network interworking of the AC, APs, and other network devices.
2. Select Config Wizard to configure system parameters for the AC.
3. Select Config Wizard to configure the APs to go online on the AC.
4. Select Config Wizard to configure WLAN services on the AC.
5. Configure service holding upon CAPWAP link disconnection to improve data
transmission reliability so that data forwarding is not affected even when the
AC is faulty.
6. Deliver the WLAN services to the APs and verify the configuration.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
Procedure
Step 1 Configure the network devices.
# Create VLAN 100 (management VLAN) and VLAN 101 (service VLAN) on the
switch. Set the link type of GE0/0/1 that connects the switch to the APs to trunk
and PVID of the interface to 100, and configure the interface to allow packets of
VLAN 100 and VLAN 101 to pass. Set the link type of GE0/0/2 on the switch to
trunk, and configure the interface to allow packets of VLAN 100 to pass.
<HUAWEI> system-view
[HUAWEI] sysname Switch
[Switch] vlan batch 100 101
[Switch] interface gigabitethernet 0/0/1
[Switch-GigabitEthernet0/0/1] port link-type trunk
[Switch-GigabitEthernet0/0/1] port trunk pvid vlan 100
[Switch-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 101
[Switch-GigabitEthernet0/0/1] port-isolate enable
[Switch-GigabitEthernet0/0/1] quit
[Switch] interface gigabitethernet 0/0/2
[Switch-GigabitEthernet0/0/2] port link-type trunk
# Add GE1/0/0 on Router to VLAN 101. Create VLANIF 101 and set its IP address
to 10.1.2.2/24.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 101
[Router] interface gigabitethernet 1/0/0
[Router-GigabitEthernet1/0/0] port link-type trunk
[Router-GigabitEthernet1/0/0] port trunk allow-pass vlan 101
[Router-GigabitEthernet1/0/0] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.1.2.2 24
[Router-Vlanif101] quit
Step 2 Configure the DHCP servers to assign IP addresses to APs and STAs.
NOTE
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
# Configure VLANIF 100 to use the interface address pool to allocate IP addresses
to APs.
[Switch] dhcp enable
[Switch] interface vlanif 100
[Switch-Vlanif100] ip address 10.1.1.1 255.255.255.0
[Switch-Vlanif100] dhcp select interface
[Switch-Vlanif100] quit
# Configure VLANIF 101 to use the interface address pool to allocate IP addresses
to STAs.
[Switch] interface vlanif 101
[Switch-Vlanif101] ip address 10.1.2.1 255.255.255.0
[Switch-Vlanif101] dhcp select interface
[Switch-Vlanif101] quit
# Choose Configuration > Config Wizard > AC. The Basic AC Configuration
page is displayed.
2. Configure interfaces.
# Select GigabitEthernet0/0/1 and expand Batch Modify. Set Interface type
to Trunk and add GigabitEthernet0/0/1 to VLAN 100 (management VLAN).
NOTE
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 5 Configure WLAN services.
# Click Create. The Basic Information page is displayed.
# Set the SSID name, forwarding mode, and service VLAN.
# Click Finish.
Step 6 Create an AP system profile and configure service holding upon link disconnection.
# Click Create. On the Create AP System Profile page that is displayed, enter the
profile name ap-system and click OK. The AP system profile configuration page is
displayed.
# Set Policy for service holding upon link disconnection to Holding and
prohibiting new user access.
Automatic channel and power calibration functions are enabled by default. The manual
channel and power configurations take effect only when these two functions are disabled.
# Choose Configuration > AP Config > AP Config > AP Info. The AP List
page is displayed.
# Click the ID of the AP whose channel and power need to be configured. The
AP customized settings page is displayed.
The WLAN with the SSID wlan-net is available, and STAs can access the WLAN
normally. When the CAPWAP link is disconnected due to an AC fault, service data
forwarding of STAs in Area A is not affected.
----End
Service Requirements
Enterprise users can access the network through WLANs, which is the basic
requirement of mobile office. Furthermore, users' services are not affected during
inter-VLAN roaming in the coverage area.
Networking Requirement
● AC networking mode: Layer 3 networking in bypass mode
● DHCP deployment mode:
Data Planning
Item Data
Item Data
● Name: ap-group2
● Referenced profiles: VAP profile
wlan-net2, regulatory domain
profile default, 2G radio profile
wlan-radio2g, and 5G radio profile
wlan-radio5g
Item Data
● Name: wlan-net2
● Forwarding mode: direct forwarding
● Service VLAN: VLAN 102
● Referenced profiles: SSID profile
wlan-net and security profile wlan-
net
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure network interworking of the AC, APs, and other network devices.
2. Configure the management VLANs and service VLANs.
3. Select Config Wizard to configure system parameters for the AC.
4. Select Config Wizard to configure the APs to go online on the AC.
5. Select Config Wizard to configure WLAN services on the AC.
6. Deliver the WLAN services to the APs and verify the configuration.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure the network devices.
# On SwitchA, add GE0/0/1 to VLAN 10 and VLAN 101, GE0/0/2 to VLAN 10,
VLAN 101, and VLAN102, and GE0/0/3 to VLAN 10 and VLAN 102. The default
VLAN of GE0/0/1 and GE0/0/3 is VLAN 10.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
[SwitchA] vlan batch 10 101 102
# On SwitchB (aggregation switch), add GE0/0/1 to VLAN 10, VLAN 101, and
VLAN 102, GE0/0/2 to VLAN 100, and GE0/0/3 to VLAN 101 and VLAN 102. Create
VLANIF 100 and set its IP address to 10.23.100.2/24.
<HUAWEI> system-view
[HUAWEI] sysname SwitchB
[SwitchB] vlan batch 10 100 101 102
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] port link-type trunk
[SwitchB-GigabitEthernet0/0/1] port trunk allow-pass vlan 10 101 102
[SwitchB-GigabitEthernet0/0/1] quit
[SwitchB] interface gigabitethernet 0/0/2
[SwitchB-GigabitEthernet0/0/2] port link-type trunk
[SwitchB-GigabitEthernet0/0/2] port trunk allow-pass vlan 100
[SwitchB-GigabitEthernet0/0/2] quit
[SwitchB] interface gigabitethernet 0/0/3
[SwitchB-GigabitEthernet0/0/3] port link-type trunk
[SwitchB-GigabitEthernet0/0/3] port trunk allow-pass vlan 101 102
[SwitchB-GigabitEthernet0/0/3] quit
[SwitchB] interface vlanif 100
[SwitchB-Vlanif100] ip address 10.23.100.2 24
[SwitchB-Vlanif100] quit
# On Router, add GE1/0/0 to VLAN 101 and VLAN 102. Create VLANIF 101 and
VLANIF 102, and set the IP address of VLANIF 101 to 10.23.101.2/24 and the IP
address of VLANIF 102 to 10.23.102.2/24.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 101 102
[Router] interface gigabitethernet 1/0/0
[Router-GigabitEthernet1/0/0] port link-type trunk
[Router-GigabitEthernet1/0/0] port trunk allow-pass vlan 101 102
[Router-GigabitEthernet1/0/0] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.23.101.2 24
[Router-Vlanif101] quit
[Router] interface vlanif 102
[Router-Vlanif102] ip address 10.23.102.2 24
[Router-Vlanif102] quit
Step 2 Configure the DHCP services to assign IP addresses to APs and STAs.
# On SwitchB, configure DHCP relay to assign IP addresses on behalf of the AC.
[SwitchB] dhcp enable
[SwitchB] interface vlanif 10
[SwitchB-Vlanif10] ip address 10.23.10.1 24
[SwitchB-Vlanif10] dhcp select relay
[SwitchB-Vlanif10] dhcp relay server-ip 10.23.100.1
[SwitchB-Vlanif10] quit
NOTE
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
[SwitchB] interface vlanif 101
[SwitchB-Vlanif101] ip address 10.23.101.1 24
[SwitchB-Vlanif101] dhcp select interface
[SwitchB-Vlanif101] dhcp server gateway-list 10.23.101.2
[SwitchB-Vlanif101] quit
[SwitchB] interface vlanif 102
[SwitchB-Vlanif102] ip address 10.23.102.1 24
[SwitchB-Vlanif102] dhcp select interface
[SwitchB-Vlanif102] dhcp server gateway-list 10.23.102.2
[SwitchB-Vlanif102] quit
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click OK.
# Click Create under DHCPv4 Address Pool List and configure a global
address pool named huawei.
– IP address pool subnet: 10.23.10.0
– Option 43: ASCII, IP address of 10.23.100.1
– Gateway IP address: 10.23.10.1
# Click OK.
# Under Static Route Table, click Create. The Create Static Route Table
page is displayed.
# Set Destination IP to 10.23.10.0, Subnet Mask to 24(255.255.255.0), and
Next hop address to 10.23.100.2.
# Click OK.
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Set Security settings to Key (applicable to personnel networks) and set the
key.
# Click in front of wlan-net2. The profiles referenced by the VAP profile are
displayed.
# Click SSID Profile. On the SSID profile configuration page that is displayed, set
SSID Profile to wlan-net and click Apply. In the dialog box that is displayed, click
OK.
# Click Security Profile. On the security profile configuration page that is
displayed, set Security Profile to wlan-net and click Apply. In the dialog box that
is displayed, click OK.
Step 6 Set the AP channel and power.
1. Disable automatic channel and power calibration functions of AP radios, and
manually configure the AP channel and power.
NOTE
Automatic channel and power calibration functions are enabled by default. The manual
channel and power configurations take effect only when these two functions are disabled.
# Choose Configuration > AP Config > AP Config > AP Info. The AP List
page is displayed.
# Click the ID of the AP whose channel and power need to be configured. The
AP customized settings page is displayed.
4. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
5. When a STA roams from area_1 to area_2, choose Monitoring > User. In User
List, select the STA of which you want to view the roaming tracks and click
Roaming Track. The roaming tracks of the STA are displayed.
----End
Networking Requirement
● AC networking mode: Layer 2 bypass mode
● DHCP deployment mode:
– The AC functions as a DHCP server to assign IP addresses to APs.
– The aggregation switch (SwitchB) functions as a DHCP server to assign IP
addresses to STAs.
● Service data forwarding mode: tunnel forwarding
Data Planning
IP address 10.23.100.2-10.23.100.254/24
pool for
APs
IP address 10.23.101.3-10.23.101.254/24
pool for
STAs
Item Data
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure network interworking of the AC, APs, and other network devices.
2. Select Config Wizard to configure system parameters for the AC.
3. Select Config Wizard to configure the APs to go online on the AC.
4. Select Config Wizard to configure WLAN services on the AC.
5. Deliver the WLAN services to the APs and verify the configuration.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1, GE0/0/2, and GE0/0/3 on SwitchA to VLAN 100. The default VLAN
of GE0/0/1 and GE0/0/3 is VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
[SwitchA] vlan batch 100
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk pvid vlan 100
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[SwitchA-GigabitEthernet0/0/1] port-isolate enable
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 100
[SwitchA-GigabitEthernet0/0/2] quit
[SwitchA] interface gigabitethernet 0/0/3
[SwitchA-GigabitEthernet0/0/3] port link-type trunk
[SwitchA-GigabitEthernet0/0/3] port trunk pvid vlan 100
[SwitchA-GigabitEthernet0/0/3] port trunk allow-pass vlan 100
[SwitchA-GigabitEthernet0/0/3] port-isolate enable
[SwitchA-GigabitEthernet0/0/3] quit
# Add GE0/0/1 and GE0/0/2 on SwitchB (aggregation switch) to VLAN 100, and
GE0/0/2 and GE0/0/3 to VLAN 101.
<HUAWEI> system-view
[HUAWEI] sysname SwitchB
[SwitchB] vlan batch 100 101
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] port link-type trunk
[SwitchB-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[SwitchB-GigabitEthernet0/0/1] quit
[SwitchB] interface gigabitethernet 0/0/2
[SwitchB-GigabitEthernet0/0/2] port link-type trunk
[SwitchB-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[SwitchB-GigabitEthernet0/0/2] quit
# Add GE1/0/0 on Router to VLAN 101. Create VLANIF 101 and set its IP address
to 10.23.101.2/24.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 101
[Router] interface gigabitethernet 1/0/0
[Router-GigabitEthernet1/0/0] port link-type trunk
[Router-GigabitEthernet1/0/0] port trunk allow-pass vlan 101
[Router-GigabitEthernet1/0/0] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.23.101.2 24
[Router-Vlanif101] quit
Step 2 Configure a DHCP server to assign IP addresses to STAs and specify the gateway
for the STAs.
# On SwitchB, configure VLANIF 101 to assign IP addresses to STAs and set the
default gateway address of STAs to 10.23.101.2.
NOTE
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
[SwitchB] dhcp enable
[SwitchB] interface vlanif 101
[SwitchB-Vlanif101] ip address 10.23.101.1 24
[SwitchB-Vlanif101] dhcp select interface
[SwitchB-Vlanif101] dhcp server gateway-list 10.23.101.2
[SwitchB-Vlanif101] quit
NOTE
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List. Select Interface address
pool and select VLANIF 100.
# Click OK.
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
Radio 0 is used as an example. The configuration for other radios is similar and will not be
mentioned here.
NOTE
By default, the global automatic channel and power calibration functions are enabled.
Therefore, select Follow. If the global automatic channel and power calibration functions
are disabled, choose Configuration > AP Config > Radio Planning/Calibration > Radio
Calibration Configuration, and set Calibration to ON.
# Click next to 2G Radio Profile. Select Air Scan Profile. The Air Scan
Profile page is displayed. Click Create. On the Create Air Scan Profile page
that is displayed, enter the profile name wlan-airscan and click OK. The air
scan profile configuration page is displayed.
# Enable scanning, and configure the probe channel set, scan interval, and
scan duration.
# Radio calibration stops one hour after the radio calibration is manually
triggered.
# Choose Configuration > AP Config > Radio Planning/Calibration > Radio
Calibration Configuration. The Radio Calibration Configuration page is
displayed. The Radio Calibration Configuration page is displayed. On the
Radio Calibration Configuration page, set Triggering condition to
Scheduled and set the start time to 3:00 am.
4. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
5. When a STA roams from area_1 to area_2, choose Monitoring > User. In User
List, select the STA of which you want to view the roaming tracks and click
Roaming Track. The roaming tracks of the STA are displayed.
----End
Networking Requirement
● AC networking mode: AC_1 and AC_2 in a mobility group
● DHCP deployment mode: AC_1 functions as a DHCP server to assign IP
addresses to APs and STAs.
● Service data forwarding mode: tunnel forwarding
Data Planning
Item Data
Item Data
IP address 10.23.100.3-10.23.100.254/24
pool for
APs
IP address 10.23.101.3-10.23.101.254/24
pool for
STAs
Configuration Roadmap
1. Configure network interworking of the AC, APs, and other network devices.
2. Select Config Wizard to configure system parameters for the AC.
3. Select Config Wizard to configure the APs to go online on the AC.
4. Select Config Wizard to configure WLAN services on the AC.
5. Deliver the WLAN services to the APs and verify the configuration.
6. Configure WLAN roaming on AC_1 and AC_2 to implement inter-AC roaming.
NOTE
During AP deployment, you can manually specify the working channels of the APs according to
network planning or configure the radio calibration function to enable the APs to automatically
select the optimal channels.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on Switch_1 to VLAN 100. The default VLAN of
GE0/0/1 is VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname Switch_1
[Switch_1] vlan batch 100
[Switch_1] interface gigabitethernet 0/0/1
[Switch_1-GigabitEthernet0/0/1] port link-type trunk
[Switch_1-GigabitEthernet0/0/1] port trunk pvid vlan 100
[Switch_1-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[Switch_1-GigabitEthernet0/0/1] quit
[Switch_1] interface gigabitethernet 0/0/2
[Switch_1-GigabitEthernet0/0/2] port link-type trunk
[Switch_1-GigabitEthernet0/0/2] port trunk allow-pass vlan 100
[Switch_1-GigabitEthernet0/0/2] quit
# Add GE0/0/1 and GE0/0/2 on Switch_2 to VLAN 100. The default VLAN of
GE0/0/1 is VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname Switch_2
[Switch_2] vlan batch 100
[Switch_2] interface gigabitethernet 0/0/1
[Switch_2-GigabitEthernet0/0/1] port link-type trunk
[Switch_2-GigabitEthernet0/0/1] port trunk pvid vlan 100
[Switch_2-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[Switch_2-GigabitEthernet0/0/1] quit
[Switch_2] interface gigabitethernet 0/0/2
[Switch_2-GigabitEthernet0/0/2] port link-type trunk
[Switch_2-GigabitEthernet0/0/2] port trunk allow-pass vlan 100
[Switch_2-GigabitEthernet0/0/2] quit
# Choose Configuration > Config Wizard > AC. The Basic AC Configuration
page is displayed.
If the AC and AP are directly connected, set the default VLAN of the interface connected to
the AP to management VLAN 100.
# Click Create under DHCPv4 Address Pool List, select Interface address
pool and select VLANIF 100. Exclude the IP address 10.23.100.2 from being
automatically allocated.
# Click OK. Set the IP address of VLANIF 101 to 10.23.101.1/24 and configure
the interface address pool on VLANIF 101 in the same way. Exclude the IP
address 10.23.101.2 from being automatically allocated.
NOTE
# Click Next.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Radio 0 is used as an example. The configuration for other radios is similar and will not be
mentioned here.
NOTE
By default, the global automatic channel and power calibration functions are enabled.
Therefore, select Follow. If the global automatic channel and power calibration functions
are disabled, choose Configuration > AP Config > Radio Planning/Calibration > Radio
Calibration Configuration, and set Calibration to ON.
# Click next to 2G Radio Profile. Select Air Scan Profile. The Air Scan
Profile page is displayed. Click Create. On the Create Air Scan Profile page
that is displayed, enter the profile name wlan-airscan and click OK. The air
scan profile configuration page is displayed.
# Enable scanning, and configure the probe channel set, scan interval, and
scan duration.
# Radio calibration stops one hour after the radio calibration is manually
triggered.
# Choose Configuration > AP Config > Radio Planning/Calibration > Radio
Calibration Configuration. The Radio Calibration Configuration page is
displayed. The Radio Calibration Configuration page is displayed. On the
Radio Calibration Configuration page, set Triggering condition to
Scheduled and set the start time to 3:00 am.
2. Create a mobility group, and add AC_1 and AC_2 to the mobility group.
# Click Create. The Create Mobility Group page is displayed.
# Set Mobility group name to mobility, and add AC_1 and AC_2 to the
mobility group.
4. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
5. When a STA roams from area_1 to area_2, choose Monitoring > User. In User
List, select the STA of which you want to view the roaming tracks and click
Roaming Track. The roaming tracks of the STA are displayed.
----End
Networking Requirement
● AC networking mode: AC_1 and AC_2 in a mobility group
● DHCP deployment mode:
– AC_1 functions as a DHCP server to assign IP addresses to APs and STAs
connected to it.
– AC_2 functions as a DHCP server to assign IP addresses to APs and STAs
connected to it.
● Service data forwarding mode: direct forwarding
Data Planning
Item Data
IP address 10.23.100.2-10.23.100.254/24
pool for 10.23.200.2-10.23.200.254/24
APs
IP address 10.23.101.2-10.23.101.254/24
pool for 10.23.102.2-10.23.102.254/24
STAs
Item Data
AP group AC_1:
● Name: ap-group1
● Referenced profiles: VAP profile wlan-net and regulatory
domain profile default
AC_2:
● Name: ap-group2
● Referenced profiles: VAP profile wlan-net and regulatory
domain profile default
VAP AC_1:
profile ● Name: wlan-net
● Forwarding mode: direct forwarding
● Service VLAN: VLAN 101
● Referenced profiles: SSID profile wlan-net and security profile
wlan-net
AC_2:
● Name: wlan-net
● Forwarding mode: direct forwarding
● Service VLAN: VLAN 102
● Referenced profiles: SSID profile wlan-net and security profile
wlan-net
Item Data
Configuration Roadmap
1. Configure network interworking of the AC, APs, and other network devices.
2. Select Config Wizard to configure system parameters for the AC.
3. Select Config Wizard to configure the APs to go online on the AC.
4. Select Config Wizard to configure WLAN services on the AC.
5. Deliver the WLAN services to the APs and verify the configuration.
6. Configure WLAN roaming on AC_1 and AC_2 to implement inter-AC roaming.
NOTE
During AP deployment, you can manually specify the working channels of the APs according to
network planning or configure the radio calibration function to enable the APs to automatically
select the optimal channels.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on Switch_1 to VLAN 100 and VLAN 101. The default
VLAN of GE0/0/1 is VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname Switch_1
[Switch_1] vlan batch 100 101
[Switch_1] interface GigabitEthernet 0/0/1
[Switch_1-GigabitEthernet0/0/1] port link-type trunk
[Switch_1-GigabitEthernet0/0/1] port trunk pvid vlan 100
[Switch_1-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[Switch_1-GigabitEthernet0/0/1] quit
[Switch_1] interface gigabitethernet 0/0/2
[Switch_1-GigabitEthernet0/0/2] port link-type trunk
[Switch_1-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[Switch_1-GigabitEthernet0/0/2] quit
# Add GE0/0/1 and GE0/0/2 on Switch_2 to VLAN 200 and VLAN 102. The default
VLAN of GE0/0/1 is VLAN 200.
<HUAWEI> system-view
[HUAWEI] sysname Switch_2
[Switch_2] vlan batch 200 102
[Switch_2] interface gigabitethernet 0/0/1
[Switch_2-GigabitEthernet0/0/1] port link-type trunk
[Switch_2-GigabitEthernet0/0/1] port trunk pvid vlan 200
[Switch_2-GigabitEthernet0/0/1] port trunk allow-pass vlan 200 102
[Switch_2-GigabitEthernet0/0/1] quit
# Configure Router.
<HUAWEI> system-view
[HUAWEI] sysname Router
[Router] interface gigabitethernet 0/0/1
[Router-GigabitEthernet0/0/1] ip address 10.23.100.2 255.255.255.0
[Router-GigabitEthernet0/0/1] quit
[Router] interface gigabitethernet 0/0/2
[Router-GigabitEthernet0/0/2] ip address 10.23.200.2 255.255.255.0
[Router-GigabitEthernet0/0/2] quit
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List, select Interface address
pool and select VLANIF 100.
# Click OK. Set the IP address of VLANIF 101 to 10.23.101.1/24 and configure
the interface address pool on VLANIF 101 in the same way.
NOTE
# Under Static Route Table, click Create. The Create Static Route Table
page is displayed.
# Set Destination IP to 10.23.200.0, Subnet Mask to 24(255.255.255.0), and
Next hop address to 10.23.100.2.
# Click OK.
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 5 Configure an AP to go online on AC_2.
Configure the AP to go online on AC_2 according to the configuration of AC_1.
The following lists configuration differences between AC_1 and AC_2:
● Add an AP (MAC address dcd2-fc04-b500 and SN 210235554710CB000078)
on AC_2, set the AP name to area_2, and add the AP to the AP group ap-
group2.
Step 6 Configure WLAN services on AC_1.
# Click Create. The Basic Information page is displayed.
Radio 0 is used as an example. The configuration for other radios is similar and will not be
mentioned here.
NOTE
By default, the global automatic channel and power calibration functions are enabled.
Therefore, select Follow. If the global automatic channel and power calibration functions
are disabled, choose Configuration > AP Config > Radio Planning/Calibration > Radio
Calibration Configuration, and set Calibration to ON.
# Click next to 2G Radio Profile. Select Air Scan Profile. The Air Scan
Profile page is displayed. Click Create. On the Create Air Scan Profile page
that is displayed, enter the profile name wlan-airscan and click OK. The air
scan profile configuration page is displayed.
# Enable scanning, and configure the probe channel set, scan interval, and
scan duration.
# Click Immediate Calibration. In the dialog box that is displayed, click OK.
# Choose Monitoring > Radio. In Radio List, check the channel and power of
the radio. In this example, three APs have gone online on the AC, and the list
shows that AP channels have been automatically assigned through the radio
calibration function.
# Radio calibration stops one hour after the radio calibration is manually
triggered.
2. Create a mobility group, and add AC_1 and AC_2 to the mobility group.
# Set Mobility group name to mobility, and add AC_1 and AC_2 to the
mobility group.
4. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
5. When a STA roams from area_1 to area_2, choose Monitoring > User. In User
List, select the STA of which you want to view the roaming tracks and click
Roaming Track. The roaming tracks of the STA are displayed.
----End
Networking Requirements
● AC networking mode: Layer 2 bypass mode
● DHCP deployment mode:
– The AC functions as a DHCP server to assign IP addresses to the central
AP and RUs.
– SwitchA functions as a DHCP server to assign IP addresses to STAs.
● Service data forwarding mode: direct forwarding
Data Planning
IP address 10.23.100.2-10.23.100.254/24
pool for
the central
AP and
RUs
IP address 10.23.101.3-10.23.101.254/24
pool for
STAs
Item Data
Agile Enabled
distributed
SFN
roaming
Configuration Roadmap
1. Configure the central AP, AC, RUs, and upper-layer devices to communicate at
Layer 2.
2. Select Config Wizard to configure system parameters for the AC.
3. Select Config Wizard to configure the central AP and RUs to go online on the
AC.
4. Select Config Wizard to configure WLAN services on the AC.
5. Configure agile distributed SFN roaming.
6. Deliver the WLAN services to the central AP and RUs and verify the
configuration.
Configuration Notes
● Network planning precautions:
– Agile distributed SFN roaming is supported only by the AD9430DN-12
(including matching RUs) and AD9430DN-24 (including matching RUs).
RUs support agile distributed SFN roaming in the following combination
modes:
▪ Between the R230D and R240D (Note: Only the 2.4 GHz radio of the
R230D and R240D supports agile distributed SFN roaming, and the 5
GHz radio does not support.)
▪ SSID
Procedure
Step 1 Configure the network devices.
# On SwitchA, add GE0/0/1 to VLAN 100 (management VLAN) and VLAN 101
(service VLAN), set the default VLAN of GE0/0/1 to VLAN 100, add GE0/0/2 to
VLAN 100, and add GE0/0/3 and GE0/0/4 to VLAN 101.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
[SwitchA] vlan batch 100 101
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk pvid vlan 100
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[SwitchA-GigabitEthernet0/0/1] port-isolate enable
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 100
[SwitchA-GigabitEthernet0/0/2] quit
[SwitchA] interface gigabitethernet 0/0/3
[SwitchA-GigabitEthernet0/0/3] port link-type trunk
[SwitchA-GigabitEthernet0/0/3] port trunk allow-pass vlan 101
[SwitchA-GigabitEthernet0/0/3] quit
[SwitchA] interface gigabitethernet 0/0/4
[SwitchA-GigabitEthernet0/0/4] port link-type trunk
[SwitchA-GigabitEthernet0/0/4] port trunk allow-pass vlan 101
[SwitchA-GigabitEthernet0/0/4] quit
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
[SwitchA] dhcp enable
[SwitchA] interface vlanif 101
[SwitchA-Vlanif101] ip address 10.23.101.1 24
[SwitchA-Vlanif101] dhcp select interface
[SwitchA-Vlanif101] dhcp server excluded-ip-address 10.23.101.2
[SwitchA-Vlanif101] quit
[SwitchA] ip route-static 0.0.0.0 0.0.0.0 10.23.101.2
# Click Create under DHCPv4 Address Pool List. Select Interface address
pool and select VLANIF 100.
# Click OK.
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 5 Configure WLAN services.
# Click Create. The Basic Information page is displayed.
# Configure the SSID name, forwarding mode, and service VLAN.
The automatic channel and power calibration function is enabled for radios by default. When
this function is enabled, the manual calibration configuration does not take effect. The settings
of the RU channel and power in this example are for reference only. You need to configure the
RU channel and power based on the actual country code and network planning.
# Choose Configuration > AP Config > AP Config > AP Info. The AP List page is
displayed.
# Click AP ID 1. The AP customized settings page for ru_1 is displayed.
# Click in front of VAP Configuration and click wlan-net. The VAP profile
configuration page is displayed.
# On the Advanced Configuration page, set SFN to ON. In the dialog box that is
displayed, click OK.
# Set radio parameters related to roaming based on the network planning result.
The configuration is not mentioned here. The following figure shows the default
settings.
4. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
5. When a STA roams from ru_1 to ru_2, choose Monitoring > User. In User
List, select the STA of which you want to view the roaming tracks and click
Roaming Track. The roaming tracks of the STA are displayed.
----End
Networking Requirements
● AC networking mode: Layer 2 networking in off-path mode
● Wireless backhaul mode: Mesh portal-node
● Backhaul radio: 5 GHz radio
Data Planning
area_1 00e0-fc76-e360
area_2 00e0-fc04-b500
area_3 00e0-fc74-9640
Item Data
Configuration Roadmap
1. Configure network connectivity and enable the AP (MPP) in area A to go
online on the AC in wired mode.
2. Configure Mesh services to enable APs (MPs) in area B and area C to go
online on the AC through Mesh links.
3. Configure the wireless coverage service so that wireless STAs in area C can
access the Wi-Fi network through an SSID.
4. Configure wired services so that wired STAs in area C can access the network
in wired mode.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on Switch_B to VLAN 100, and set the PVID of
GE0/0/1 to VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname Switch_B
[Switch_B] vlan batch 100
[Switch_B] interface gigabitEthernet 0/0/1
[Switch_B-GigabitEthernet0/0/1] port link-type trunk
[Switch_B-GigabitEthernet0/0/1] port trunk pvid vlan 100
[Switch_B-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[Switch_B-GigabitEthernet0/0/1] port-isolate enable
[Switch_B-GigabitEthernet0/0/1] quit
[Switch_B] interface gigabitEthernet 0/0/2
[Switch_B-GigabitEthernet0/0/2] port link-type trunk
[Switch_B-GigabitEthernet0/0/2] port trunk allow-pass vlan 100
[Switch_B-GigabitEthernet0/0/2] quit
# Add GE0/0/1 and GE0/0/2 on the aggregation switch Switch_A to VLAN 100 and
VLANs 100, 101, and 102, respectively.
<HUAWEI> system-view
[HUAWEI] sysname Switch_A
[Switch_A] vlan batch 100 to 102
[Switch_A] interface gigabitEthernet 0/0/1
[Switch_A-GigabitEthernet0/0/1] port link-type trunk
[Switch_A-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[Switch_A-GigabitEthernet0/0/1] quit
[Switch_A] interface gigabitEthernet 0/0/2
[Switch_A-GigabitEthernet0/0/2] port link-type trunk
[Switch_A-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 to 102
[Switch_A-GigabitEthernet0/0/2] quit
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List. Select Interface address
pool and select VLANIF 100.
# Click OK.
# Click Next.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
Step 3 Add APs and configure the Mesh roles for them.
1. Choose Configuration > Config Wizard > Mesh.
● Click Add in the Mesh whitelist area to add MAC addresses of Mesh nodes.
----End
Service Requirements
An enterprise needs to establish Mesh wireless backhaul links in different areas to
expand wireless coverage and reduce wired deployment costs.
Networking Requirements
● AC networking mode: Layer 2 networking in off-path mode
● Wireless backhaul mode: Mesh portal-node
● Backhaul radio: 5 GHz radio
Data Planning
AP MAC
area_1 00e0-fc76-e360
AP MAC
area_2 00e0-fc04-b500
area_3 00e0-fc74-9640
area_4 00e0-fc04-c600
IP address 10.23.100.2–10.23.100.254/24
pool for
APs
Radios Radio 0
used by ● Switched to the 5 GHz radio
Mesh
services ● Bandwidth: 80 MHz
● Channel: 35
● Radio coverage distance parameter: 20 (unit: 100 m)
Radio 1
● Bandwidth: 80 MHz
● Channel: 149
● Radio coverage distance parameter: 20 (unit: 100 m)
Configuration Roadmap
1. Configure network connectivity and enable the AP (MPP) in area A to go
online on the AC in wired mode.
2. Configure Mesh services to enable APs (MPs) in other areas to go online on
the AC through Mesh links.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on Switch_B to VLAN 100, and set the PVID of
GE0/0/1 to VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname Switch_B
[Switch_B] vlan batch 100
[Switch_B] interface gigabitEthernet 0/0/1
[Switch_B-GigabitEthernet0/0/1] port link-type trunk
[Switch_B-GigabitEthernet0/0/1] port trunk pvid vlan 100
[Switch_B-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[Switch_B-GigabitEthernet0/0/1] port-isolate enable
[Switch_B-GigabitEthernet0/0/1] quit
[Switch_B] interface gigabitEthernet 0/0/2
[Switch_B-GigabitEthernet0/0/2] port link-type trunk
[Switch_B-GigabitEthernet0/0/2] port trunk allow-pass vlan 100
[Switch_B-GigabitEthernet0/0/2] quit
# Add GE0/0/1 and GE0/0/2 on the aggregation switch Switch_A to VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname Switch_A
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List. Select Interface address
pool and select VLANIF 100.
# Click OK.
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
Step 3 Add APs and configure the Mesh roles for them.
1. Choose Configuration > Config Wizard > Mesh.
2. Create the AP group ap-group1.
# On the AP Config tab page, click Add. The Add AP page is displayed.
# Set Mode to Manually add and manually add APs. If there are a large
number of APs, you can add APs in batches.
5. Click Apply.
Step 5 Configure the Mesh service.
1. Choose Configuration > Config Wizard > Mesh.
2. Click the Service Settings tab and configure Mesh parameters.
– Select Radio 0 and Radio 1 as the radios used by Mesh links.
– Set Mesh ID to mesh-net.
– For radio 0, set Bandwidth to 80 MHz, Channel to 36, and WDS/Mesh
bridge distance to 20.
– For radio 1, set Bandwidth to 80 MHz, Channel to 149, and WDS/Mesh
bridge distance to 20.
– In Security Settings set Key type to Pass-phrase and enter Key to
YsH_2022.
– In the Mesh Whitelist area of radio 0 and radio 1, click Add and add
MAC addresses of Mesh nodes.
3. After configuring Mesh parameters, click Apply. In the dialog box that is
displayed, click OK.
1. Choose Configuration > Config Wizard > Mesh. In AP Group List, select ap-
group1 and check whether the AP status is normal. If so, the AP has gone
online on the AC through a Mesh link.
2. Choose Monitoring > Mesh&WDS > Mesh Link Information to view Mesh
link information. Detailed information about the Mesh links that are
successfully established is displayed on this page. In V200R022C00 and later
versions, the Mesh topology is displayed on this page.
----End
Networking Requirements
● AC networking mode: Layer 2 bypass mode
● Wireless backhaul node: dual Mesh portal-nodes
● Backhaul radio: 5 GHz radio
Data Planning
AP_1 60de-4474-9640
AP_2 dcd2-fc04-b500
AP_3 dcd2-fc96-e4c0
AP_4 1047-80ac-cc60
Item Data
Item Data
Configuration Roadmap
1. Configure network connectivity and enable APs (MPPs) in Area A to go online
on the AC in wired mode.
2. Configure Mesh services to enable APs (MPs) in Area B to go online on the AC
through Mesh links.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on the aggregation switch Switch_A to VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname Switch_A
[Switch_A] vlan batch 100
[Switch_A] interface gigabitEthernet 0/0/1
[Switch_A-GigabitEthernet0/0/1] port link-type trunk
[Switch_A-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[Switch_A-GigabitEthernet0/0/1] quit
[Switch_A] interface gigabitEthernet 0/0/2
[Switch_A-GigabitEthernet0/0/2] port link-type trunk
[Switch_A-GigabitEthernet0/0/2] port trunk allow-pass vlan 100
[Switch_A-GigabitEthernet0/0/2] quit
# Add GE0/0/1, GE0/0/2, and GE0/0/3 on the access switch Switch_B to VLAN 100,
and set the PVID of GE0/0/1 and GE0/0/2 to VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname Switch_B
[Switch_B] vlan batch 100
[Switch_B] interface gigabitEthernet 0/0/1
[Switch_B-GigabitEthernet0/0/1] port link-type trunk
[Switch_B-GigabitEthernet0/0/1] port trunk pvid vlan 100
[Switch_B-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[Switch_B-GigabitEthernet0/0/1] port-isolate enable
[Switch_B-GigabitEthernet0/0/1] quit
[Switch_B] interface gigabitEthernet 0/0/2
[Switch_B-GigabitEthernet0/0/2] port link-type trunk
[Switch_B-GigabitEthernet0/0/2] port trunk pvid vlan 100
[Switch_B-GigabitEthernet0/0/2] port trunk allow-pass vlan 100
[Switch_B-GigabitEthernet0/0/2] port-isolate enable
[Switch_B-GigabitEthernet0/0/2] quit
[Switch_B] interface gigabitEthernet 0/0/3
[Switch_B-GigabitEthernet0/0/3] port link-type trunk
[Switch_B-GigabitEthernet0/0/3] port trunk allow-pass vlan 100
[Switch_B-GigabitEthernet0/0/3] quit
# Choose Configuration > Config Wizard > AC. The Basic AC Configuration
page is displayed.
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List. Select Interface address
pool and select VLANIF 100.
# Click OK.
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
● Click Add in the Mesh whitelist area to add MAC addresses of Mesh nodes.
----End
ground communications and expects that multicast servers on the ground network
can deliver multimedia information services to passengers.
Networking Requirements
● AC networking mode: Layer 2 bypass mode
● Wireless backhaul mode: Mesh-based vehicle-ground fast link handover
● Backhaul radio: 5 GHz radio
Data Planning
...
...
Item Data
Item Data
Multicast 225.1.1.1-225.1.1.3
group
Configuration Roadmap
1. Configure the ground network to enable Layer 2 communications between
trackside APs and the AC.
2. Configure multicast services on ground network devices to enable proper
multicast data forwarding on the ground network.
3. Configure vehicle-ground fast link handover on trackside and vehicle-
mounted APs so that the vehicle-mounted AP can set up Mesh links with the
trackside APs.
4. Configure the vehicle-mounted network to enable intra-network data
communications.
NOTE
● Switches and routers used in this example are all Huawei products.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure other network devices on the ground network.
1. Configure Switch_A. Create VLAN 100, VLAN 101 and VLAN 200, add
interfaces GE0/0/1 to GE0/0/4 to VLAN 101, and configure these interfaces to
allow packets from VLAN 101 to pass through. Set PVIDs of GE0/0/3 and
GE0/0/4 to VLAN 101. Add GE0/0/5 to VLAN 200, set its PVID to VLAN 200,
and configure GE0/0/5 to allow packets from VLAN 200 to pass through.
Configure GE0/0/1, GE0/0/2, and GE0/0/6 to allow packets from VLAN 100 to
pass through.
<HUAWEI> system-view
[HUAWEI] sysname Switch_A
[Switch_A] vlan batch 100 101 200
[Switch_A] interface gigabitEthernet 0/0/1
[Switch_A-GigabitEthernet0/0/1] port link-type trunk
[Switch_A-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[Switch_A-GigabitEthernet0/0/1] quit
[Switch_A] interface gigabitEthernet 0/0/2
[Switch_A-GigabitEthernet0/0/2] port link-type trunk
[Switch_A-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[Switch_A-GigabitEthernet0/0/2] quit
[Switch_A] interface gigabitEthernet 0/0/3
[Switch_A-GigabitEthernet0/0/3] port link-type trunk
[Switch_A-GigabitEthernet0/0/3] port trunk pvid vlan 101
[Switch_A-GigabitEthernet0/0/3] port trunk allow-pass vlan 101
[Switch_A-GigabitEthernet0/0/3] quit
[Switch_A] interface gigabitEthernet 0/0/4
[Switch_A-GigabitEthernet0/0/4] port link-type trunk
[Switch_A-GigabitEthernet0/0/4] port trunk pvid vlan 101
[Switch_A-GigabitEthernet0/0/4] port trunk allow-pass vlan 101
[Switch_A-GigabitEthernet0/0/4] quit
[Switch_A] interface gigabitEthernet 0/0/5
[Switch_A-GigabitEthernet0/0/5] port link-type trunk
[Switch_A-GigabitEthernet0/0/5] port trunk pvid vlan 200
[Switch_A-GigabitEthernet0/0/5] port trunk allow-pass vlan 200
[Switch_A-GigabitEthernet0/0/5] quit
[Switch_A] interface gigabitEthernet 0/0/6
[Switch_A-GigabitEthernet0/0/6] port link-type trunk
[Switch_A-GigabitEthernet0/0/6] port trunk allow-pass vlan 100
[Switch_A-GigabitEthernet0/0/6] quit
2. On Switch_A, configure an IP address for VLANIF 101 and enable the DHCP
server function to assign IP addresses for vehicle-mounted terminals.
[Switch_A] dhcp enable
[Switch_A] interface vlanif 101
[Switch_A-Vlanif101] ip address 10.23.224.1 24
[Switch_A-Vlanif101] dhcp select interface
[Switch_A-Vlanif101] dhcp server excluded-ip-address 10.23.224.2 10.23.224.3
[Switch_A-Vlanif101] quit
NOTE
You can configure routes to external networks and the NAT function on the egress router
according to service requirements to ensure normal communications between internal and
external networks.
5. Configure Switch_B and Switch_C to enable Layer 2 communication between
trackside APs and the ground network.
# On Switch_B, create VLAN 100 and VLAN 101, configure GE0/0/2 and
GE0/0/1 to allow packets from VLAN 100 and VLAN 101 to pass through, and
set the PVID of GE0/0/1 to VLAN 100 (management VLAN for trackside APs).
# Configure other interfaces on Switch_B connected to trackside APs
according to the configuration for GE0/0/1. Configure these interfaces to
allow packets from VLAN 100 and VLAN 101 to pass through, and set their
PVIDs to VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname Switch_B
[Switch_B] vlan batch 100 101
[Switch_B] interface gigabitEthernet 0/0/2
[Switch_B-GigabitEthernet0/0/2] port link-type trunk
[Switch_B-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[Switch_B-GigabitEthernet0/0/2] quit
[Switch_B] interface gigabitEthernet 0/0/1
[Switch_B-GigabitEthernet0/0/1] port link-type trunk
[Switch_B-GigabitEthernet0/0/1] port trunk pvid vlan 100
[Switch_B-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[Switch_B-GigabitEthernet0/0/1] quit
# On Switch_C, create VLAN 100 and VLAN 101, configure GE0/0/2 and
GE0/0/1 to allow packets from VLAN 100 and VLAN 101 to pass through, and
set the PVID of GE0/0/1 to VLAN 100.
# Configure other interfaces on Switch_C connected to trackside APs
according to the configuration for GE0/0/1. Configure these interfaces to
allow packets from VLAN 100 and VLAN 101 to pass through, and set their
PVIDs to VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname Switch_C
[Switch_C] vlan batch 100 101
[Switch_C] interface gigabitEthernet 0/0/2
[Switch_C-GigabitEthernet0/0/2] port link-type trunk
[Switch_C-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[Switch_C-GigabitEthernet0/0/2] quit
[Switch_C] interface gigabitEthernet 0/0/1
[Switch_C-GigabitEthernet0/0/1] port link-type trunk
[Switch_C-GigabitEthernet0/0/1] port trunk pvid vlan 100
[Switch_C-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[Switch_C-GigabitEthernet0/0/1] quit
6. Enable Layer 2 multicast on Switch_A, Switch_B, and Switch_C to allow them
to properly forward multicast data.
# Enable IGMP snooping globally on Switch_A.
NOTICE
If trackside APs are directly connected to the switches and Layer 2 multicast is
configured, enabling the fast leave function improves the quality of multicast
services. If the trackside APs are not directly connected to the switches or
Layer 3 multicast is configured, you cannot configure the fast leave function
because this function may interrupt multicast services.
# Choose Configuration > Config Wizard > AC. The Basic AC Configuration
page is displayed.
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List. Select Interface address
pool and select VLANIF 100.
# Click OK.
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– In the Mesh Whitelist area, click Edit and add the MAC addresses of
vehicle-mounted APs. In this example, MAC addresses 0046-4b59-2e10
and 0046-4b59-2e20 are added. Click OK.
# Choose AP > AP Wired Port Settings. Click GE0. The GE0 profile
management page is displayed.
# Click Create. The Create AP Wired Port Profile page is displayed. Set
Profile name to wired-port and click OK. The configuration page of the
wired port profile is displayed.
# On the Advanced Configuration page of the AP wired port profile, set Port
mode to Endpoint, add the wired port to VLAN 101 in tagged mode, and set
Port PVID to 101.
– In the Mesh Whitelist area, click Edit and add the MAC addresses of
vehicle-mounted APs. In this example, MAC addresses 0046-4b59-2e10
and 0046-4b59-2e20 are added. Click OK.
# Click OK.
6. Configure the AP's wired port profile.
# Choose AP > AP Wired Port Settings. Click GE0. The GE0 profile
management page is displayed.
# Click Create. The Create AP Wired Port Profile page is displayed. Set
Profile name to wired-port and click OK. The configuration page of the
wired port profile is displayed.
# On the Advanced Configuration page of the AP wired port profile, set Port
mode to Endpoint, add the wired port to VLAN 101 in tagged mode, and set
Port PVID to 101.
This example provides the detailed procedure for configuring the vehicle-mounted AP in the
front of the train. The procedure for configuring the vehicle-mounted AP in the rear is similar.
The configuration differences are described in the subsequent steps.
1. Create VLAN 101 on the vehicle-mounted AP, configure GE0/0/0 on the
vehicle-mounted AP to allow packets from VLAN 101 to pass through, and set
the PVID of GE0/0/0 to VLAN 101.
# Choose Advanced > Interface > VLAN. On the VLAN tab page, click
Create. On the Create VLAN page, set VLAN ID to 101.
# Click OK.
# Choose Advanced > Interface > ETH Interface. Click
GigabitEthernet0/0/0. The page for modifying the interface configuration is
displayed.
# Set Default VLAN to 101 and add the interface to VLAN 101 in tagged
mode.
# Click OK.
2. Configure the Mesh network.
# Choose Configuration > Mesh Configuration.
# In Mesh ID List, click Create. The Create Mesh ID page is displayed.
# Set Mesh ID to mesh-net, Location-based enhanced link handover
algorithm to ON, Direction to Forward, Security policy to WPA2-PSK-AES,
Key type to PASS-PHRASE, and Key to a1234567.
3. Bind the Mesh profile to the AP radio and configure IGMP snooping on the AP
wired interface.
# Choose Configuration > Mesh Configuration.
# In AP List, select the AP with the AP ID of 0. The Mesh Configuration page
is displayed.
# In Mesh ID(Radio1), set Index0 to the Mesh ID for setting up Mesh links
with trackside APs, and Index1 to the Mesh ID for setting up Mesh links with
depot APs.
# In AP Wired Port Settings, enable IGMP snooping of the interface.
NOTE
This example provides the detailed procedure for configuring the vehicle-mounted AP in the
front of the train. The procedure for configuring the vehicle-mounted AP in the rear is similar.
The configuration differences are described in the subsequent steps.
1. Create VLAN 101 on the vehicle-mounted AP, configure GE0/0/0 on the
vehicle-mounted AP to allow packets from VLAN 101 to pass through, and set
the PVID of GE0/0/0 to VLAN 101.
# Choose Configuration > Interface > VLAN. On the VLAN tab page, click
Create. On the Create VLAN page, set VLAN ID to 101.
# Click OK.
# Set Default VLAN to 101 and add the interface to VLAN 101 in tagged
mode.
# Click OK.
# Choose Maintenance > Train To Ground COMM > Mesh Link Information
to view Mesh link information. Displayed information is the same as that
checked on the AC.
----End
Networking Requirements
AP area_1 and AP area_2 form a dynamic load balancing group to balance loads
on the APs to prevent excessive user access to a single AP. A dynamic load
balancing group can be set up only when:
● AP area_1 and AP area_2 are managed by the same AC.
● STAs can detect SSIDs of both the APs.
Data Planning
Configuration Roadmap
Configure dynamic load balancing to prevent one AP from being heavily loaded.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
Procedure
Step 1 Check the basic configuration of the WLAN.
1. Choose Configuration > AP Config > AP Group > AP Group, and confirm
that the AP group ap-group1 already exists.
2. Click ap-group1. Choose VAP Configuration, confirm that the VAP profile
wlan-net already exists, and check all referenced profiles.
Step 2 Configure dynamic load balancing.
1. In the RRM profile, enable dynamic load balancing, and set the start threshold
for dynamic load balancing to 15 and load difference threshold to 25%.
# Choose Radio Management > Radio 0 > 2G Radio Profile > RRM Profile.
Click Create. The Create RRM Profile page that is displayed
# Enter the profile name wlan-net and click OK. The RRM Profile page is
displayed.
# On the Advanced Configuration tab, enable dynamic load balancing, and
set the start threshold for dynamic load balancing to 15 and load difference
threshold to 25%.
# Choose Radio Management > Radio 1 > 5G Radio Profile > RRM Profile.
The RRM Profile page is displayed. Configure dynamic load balancing for
radio 1. The configuration is similar to that of radio 0 and is not mentioned
here.
----End
Related Topics
● 3.1.1 Example for Configuring Layer 2 Direct Forwarding in Inline Mode
● 3.1.2 Example for Configuring Layer 2 Tunnel Forwarding in Inline Mode
● 3.1.3 Example for Configuring Layer 2 Direct Forwarding in Bypass Mode
● 3.1.4 Example for Configuring Layer 2 Tunnel Forwarding in Bypass Mode
● 3.1.5 Example for Configuring Layer 3 Direct Forwarding in Inline Mode
● 3.1.6 Example for Configuring Layer 3 Tunnel Forwarding in Inline Mode
● 3.1.7 Example for Configuring Layer 3 Direct Forwarding in Bypass Mode
● 3.1.8 Example for Configuring Layer 3 Tunnel Forwarding in Bypass Mode
Service Requirements
Enterprise users can access the network through WLANs, which is the basic
requirement of mobile office. The enterprises also need to prevent one AP radio
from being heavily loaded. Furthermore, users' services are not affected during
roaming in the coverage area.
For the WLAN access configuration, see Related Topics.
As shown in Figure 3-44, before load balancing is configured, 30 users are
connected to AP area_1, and 10 users are connected to AP area_2.
Networking Requirements
AP area_1 and AP area_2 form a static load balancing group to balance loads on
the APs to prevent excessive user access to a single AP. A static load balancing
group can be set up only when:
● AP area_1 and AP area_2 are managed by the same AC.
● STAs can detect SSIDs of both the APs.
Data Planning
Configuration Roadmap
Configure static load balancing based on the number of users to prevent one AP
from being heavily loaded.
Configuration Notes
● If dual-band APs are used, traffic is load balanced among APs working on the
same frequency band.
● Each load balancing group supports a maximum of 16 AP radios.
● Under the agile distributed network architecture composed of the central AP
and RUs, you only need to add radios of the RUs to a static load balancing
group.
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
Procedure
Step 1 Configure static load balancing.
1. Create the static load balancing group wlan-static and set the start threshold
for static load balancing to 10 and load difference threshold to 5%.
# Choose Configuration > AP Config > AP Group > Static Load Balancing
Group. The Static Load Balancing Group page is displayed.
# Click Create. On the page that is displayed, enter the profile name wlan-
static, and set the start threshold for static load balancing to 10 and load
difference threshold to 5%. Add AP area_1 and AP area_2 to the static load
balancing group.
# Click OK.
----End
Related Topics
● 3.1.1 Example for Configuring Layer 2 Direct Forwarding in Inline Mode
● 3.1.2 Example for Configuring Layer 2 Tunnel Forwarding in Inline Mode
● 3.1.3 Example for Configuring Layer 2 Direct Forwarding in Bypass Mode
● 3.1.4 Example for Configuring Layer 2 Tunnel Forwarding in Bypass Mode
● 3.1.5 Example for Configuring Layer 3 Direct Forwarding in Inline Mode
● 3.1.6 Example for Configuring Layer 3 Tunnel Forwarding in Inline Mode
● 3.1.7 Example for Configuring Layer 3 Direct Forwarding in Bypass Mode
● 3.1.8 Example for Configuring Layer 3 Tunnel Forwarding in Bypass Mode
Service Requirements
Enterprise users can access the network through WLANs, which is the basic
requirement of mobile office. Furthermore, users' services are not affected during
roaming in the coverage area. To relieve pressure on the 2.4 GHz frequency band,
enable STAs to connect to the 5 GHz frequency band.
Networking Requirements
Use APs that support both 5 GHz and 2.4 GHz frequency bands.
Data Planning
Item Data
Item Data
Configuration Roadmap
Configure the band steering function and proper band steering parameters so that
STAs can preferentially access the 5 GHz frequency band.
Configuration Notes
● Use APs that support both 5 GHz and 2.4 GHz frequency bands and configure
the same SSID and security policy on the 5 GHz and 2.4 GHz radios.
● To allow a STA to preferentially associate with the 5 GHz radio and achieve a
better access effect, configure larger power for the 5 GHz radio than the 2.4
GHz radio.
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
Procedure
Step 1 Check the basic configuration of the WLAN.
1. Choose Configuration > AP Config > AP Group > AP Group, and confirm
that the AP group ap-group1 already exists.
2. Click ap-group1. Choose VAP Configuration, confirm that the VAP profile
wlan-net already exists, and check all referenced profiles.
# Choose VAP Configuration > wlan-net. The VAP profile page is displayed.
# Choose Radio Management > Radio 0 > 2G Radio Profile > RRM Profile.
Click Create. The Create RRM Profile page that is displayed
# Enter the profile name wlan-rrm and click OK. The RRM profile
configuration page is displayed.
# On the Advanced Configuration tab, set the start threshold for load
balancing between radios to 15, and the load difference threshold to 25%.
# Choose Radio Management > Radio 1 > 5G Radio Profile > RRM Profile >
wlan-rrm. The RRM profile configuration page is displayed. Configure inter-
frequency load balancing for radio 1. The configuration is similar to that of
radio 0 and is not mentioned here.
NOTE
If different RRM profiles are bound to the 2G and 5G radio profiles and configured with
different band steering parameters, parameters in the 2G radio profile preferentially take
effect.
# Choose Monitoring > User > User Distribution. Most STAs can connect to the 5
GHz frequency band, and users enjoy good service experience.
----End
Related Topics
● 3.1.1 Example for Configuring Layer 2 Direct Forwarding in Inline Mode
● 3.1.2 Example for Configuring Layer 2 Tunnel Forwarding in Inline Mode
● 3.1.3 Example for Configuring Layer 2 Direct Forwarding in Bypass Mode
● 3.1.4 Example for Configuring Layer 2 Tunnel Forwarding in Bypass Mode
● 3.1.5 Example for Configuring Layer 3 Direct Forwarding in Inline Mode
● 3.1.6 Example for Configuring Layer 3 Tunnel Forwarding in Inline Mode
● 3.1.7 Example for Configuring Layer 3 Direct Forwarding in Bypass Mode
● 3.1.8 Example for Configuring Layer 3 Tunnel Forwarding in Bypass Mode
Data Planning
Configuration Roadmap
Configure smart roaming and adjust smart roaming parameters to steer STAs
(especially sticky STAs) to reconnect or roam to APs with strong signals.
NOTE
Some STAs on live networks have low roaming aggressiveness. As a result, they stick to the
initially connected APs regardless of whether they move far from the APs, and have weak
signals or low rates. The STAs fail to roam to neighbor APs with better signals. They are called
sticky STAs.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
Procedure
Step 1 Check the basic configuration of the WLAN.
1. Choose Configuration > AP Config > AP Group > AP Group, and confirm
that the AP group ap-group1 already exists.
2. Click ap-group1. Choose VAP Configuration, confirm that the VAP profile
wlan-net already exists, and check all referenced profiles.
# Choose Radio Management > Radio 0 > 2G Radio Profile > RRM Profile.
Click Create. The Create RRM Profile page that is displayed
# Enter the profile name wlan-rrm and click OK. The RRM Profile page is
displayed.
----End
Related Topics
● 3.1.1 Example for Configuring Layer 2 Direct Forwarding in Inline Mode
● 3.1.2 Example for Configuring Layer 2 Tunnel Forwarding in Inline Mode
● 3.1.3 Example for Configuring Layer 2 Direct Forwarding in Bypass Mode
● 3.1.4 Example for Configuring Layer 2 Tunnel Forwarding in Bypass Mode
● 3.1.5 Example for Configuring Layer 3 Direct Forwarding in Inline Mode
● 3.1.6 Example for Configuring Layer 3 Tunnel Forwarding in Inline Mode
● 3.1.7 Example for Configuring Layer 3 Direct Forwarding in Bypass Mode
● 3.1.8 Example for Configuring Layer 3 Tunnel Forwarding in Bypass Mode
Networking Requirements
APs use the 5 GHz radio to provide wireless network coverage.
Data Planning
Item Data
Configuration Roadmap
Configure the DBS function to enable APs to automatically adjust the channel
bandwidth, improving the network capacity.
Procedure
Step 1 Check the basic configuration of the WLAN.
1. Choose Configuration > AP Config > AP Group > AP Group, and confirm
that the AP group ap-group1 already exists.
2. Click ap-group1. Choose VAP Configuration, confirm that the VAP profile
wlan-net already exists, and check all referenced profiles.
Step 2 Configure the DBS function.
# Click Apply.
● DBS based on an AP group
# Choose Configuration > AP Config > AP Group > AP Group.
# Click the AP group name. Click a radio under Radio Management.
# Set Automatic Frequency Bandwidth Adjustment to ON.
NOTE
The DBS function is supported only for 5 GHz radios. For radios supporting frequency band
switching, set Switch to 5G to ON.
Before enabling DFS, set Automatic channel optimization to ON.
# Click Apply.
Step 3 Verify the configuration.
When a large number of users in a stadium access the WLAN, they can still enjoy
good Internet experience.
----End
Related Topics
● 3.1.1 Example for Configuring Layer 2 Direct Forwarding in Inline Mode
● 3.1.2 Example for Configuring Layer 2 Tunnel Forwarding in Inline Mode
Data Planning
Item Data
Configuration Roadmap
Configure radio calibration so that the AC can automatically allocate proper
working channels to APs.
Configuration Notes
When the AirEngine 5762-16W is configured, set the parameters as follows:
You can use the preset scenario profile multi-partition-cross-room to enable the
AP to automatically obtain the parameter settings that meet the preceding
requirements.
NOTE
When AirEngine 5762-16W APs are used to provide wireless coverage in a tube-shaped
building scenario:
● If there is no bathroom at the door of a room, it is recommended that one AP be
deployed to cover three adjacent rooms. The corridor is covered by the side lobe of the
AP and therefore requires no additional AP.
● If there is a bathroom at the door of a room, the recommended plan is to use one AP to
cover two adjacent rooms and deploy APs with omnidirectional antennas in the corridor
at spacing of 25 m.
There are other network construction requirements and network planning constraints in
this scenario. For details, see Scenario-based WLAN Planning Design for Education.
Procedure
Step 1 Check the basic configuration of the WLAN.
1. Choose Configuration > AP Config > AP Group > AP Group, and confirm
that the AP group ap-group1 already exists.
2. Click ap-group1. Choose VAP Configuration, confirm that the VAP profile
wlan-net already exists, and check all referenced profiles.
Step 2 Configure a scenario profile.
1. Select Display all profiles. Choose Scenario-Specific Configuration >
Scenario Profile.
2. Select multi-partition-cross-room from the Scenario Profile drop-down list
box and click Apply.
----End
Networking Requirements
● AC networking mode: Layer 2 networking in bypass mode
● DHCP deployment mode: Switch functions as a DHCP server to assign IP
addresses to APs and STAs.
● Service data forwarding mode: direct forwarding
Data Planning
Item Data
Item Data
Configuration Roadmap
1. Configure network interworking of the AC, APs, and other network devices.
2. Select Config Wizard to configure system parameters for the AC.
3. Select Config Wizard to configure the APs to go online on the AC.
4. Select Config Wizard to configure WLAN services on the AC.
5. Configure channel switching without service interruption to improve WLAN
service reliability so that services are not interrupted even when APs change
their working channels.
6. Deliver the WLAN services to the APs and verify the configuration.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on Switch to VLAN 100 and VLAN 101, and GE0/0/3
to VLAN 100. VLAN 100 is the default VLAN of GE0/0/1 and GE0/0/2.
<HUAWEI> system-view
[HUAWEI] sysname Switch
[Switch] vlan batch 100 101
[Switch] interface gigabitethernet 0/0/1
[Switch-GigabitEthernet0/0/1] port link-type trunk
[Switch-GigabitEthernet0/0/1] port trunk pvid vlan 100
[Switch-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 101
[Switch-GigabitEthernet0/0/1] port-isolate enable
[Switch-GigabitEthernet0/0/1] quit
[Switch] interface gigabitethernet 0/0/2
[Switch-GigabitEthernet0/0/2] port link-type trunk
[Switch-GigabitEthernet0/0/2] port trunk pvid vlan 100
[Switch-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 to 101
[Switch-GigabitEthernet0/0/2] port-isolate enable
[Switch-GigabitEthernet0/0/2] quit
[Switch] interface gigabitethernet 0/0/3
[Switch-GigabitEthernet0/0/3] port link-type trunk
[Switch-GigabitEthernet0/0/3] port trunk allow-pass vlan 100
[Switch-GigabitEthernet0/0/3] quit
# Add GE1/0/0 on Router to VLAN 101. Create VLANIF 101 and set its IP address
to 10.23.101.2/24.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 101
[Router] interface gigabitethernet 1/0/0
[Router-GigabitEthernet1/0/0] port link-type trunk
[Router-GigabitEthernet1/0/0] port trunk allow-pass vlan 101
[Router-GigabitEthernet1/0/0] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.23.101.2 24
[Router-Vlanif101] quit
Step 2 Configure the DHCP servers to assign IP addresses to APs and STAs.
# On Switch, configure VLANIF 100 to assign IP addresses to APs.
[Switch] dhcp enable
[Switch] interface vlanif 100
[Switch-Vlanif100] ip address 10.1.1.1 255.255.255.0
[Switch-Vlanif100] dhcp select interface
[Switch-Vlanif100] dhcp server excluded-ip-address 10.1.1.2
[Switch-Vlanif100] quit
NOTE
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
[Switch] interface vlanif 101
[Switch-Vlanif101] ip address 10.1.2.1 255.255.255.0
[Switch-Vlanif101] dhcp select interface
[Switch-Vlanif101] quit
# Choose Configuration > Config Wizard > AC. The Basic AC Configuration
page is displayed.
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 5 Configure WLAN services.
# Click Create. The Basic Information page is displayed.
# Set the SSID name, forwarding mode, and service VLAN.
The following example configures a 2G radio profile. The configuration of the 5G radio profile is
similar.
# Click Create. On the Create 2G Radio Profile page that is displayed, enter the
profile name wlan-radio2g and click OK. The 2G radio profile configuration page
is displayed.
# On the Advanced Configuration tab, enable channel switching announcement
and configure the AP to continue transmitting data on the current channel when
the channel is switched.
----End
Networking Requirements
● AC networking mode: Layer 2 bypass mode
● DHCP deployment mode:
– The AC functions as a DHCP server to assign IP addresses to APs.
– The aggregation switch (SwitchB) functions as a DHCP server to assign IP
addresses to STAs.
● Service data forwarding mode: direct forwarding
Data Planning
Item Data
IP address 10.23.100.2-10.23.100.254/24
pool for
APs
IP address 10.23.101.3-10.23.101.254/24
pool for
STAs
Item Data
Configuration Roadmap
1. Configure network interworking of the AC, APs, and other network devices.
2. Select Config Wizard to configure AC system parameters.
3. Select Config Wizard to configure the APs to go online on the AC.
4. Select Config Wizard to configure WLAN services on the AC.
5. Adjust network parameters for e-schoolbag.
6. Deliver the WLAN services to the APs and verify the configuration.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on SwitchA to VLAN 100 and VLAN 101. The default
VLAN of GE0/0/1 is VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
[SwitchA] vlan batch 100 101
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk pvid vlan 100
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[SwitchA-GigabitEthernet0/0/1] port-isolate enable
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[SwitchA-GigabitEthernet0/0/2] quit
# Add GE0/0/1 on SwitchB (aggregation switch) to VLAN 100 and VLAN 101,
GE0/0/2 to VLAN 100, and GE0/0/3 to VLAN 101.
<HUAWEI> system-view
[HUAWEI] sysname SwitchB
[SwitchB] vlan batch 100 101
[SwitchB] interface gigabitethernet 0/0/1
# Add GE1/0/0 on Router to VLAN 101. Create VLANIF 101 and set its IP address
to 10.23.101.2/24.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 101
[Router] interface gigabitethernet 1/0/0
[Router-GigabitEthernet1/0/0] port link-type trunk
[Router-GigabitEthernet1/0/0] port trunk allow-pass vlan 101
[Router-GigabitEthernet1/0/0] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.23.101.2 24
[Router-Vlanif101] quit
Step 2 Configure a DHCP server to assign IP addresses to STAs and specify the gateway
for the STAs.
# On SwitchB, configure VLANIF 101 to assign IP addresses to STAs and set the
default gateway address of STAs to 10.23.101.2.
NOTE
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
[SwitchB] dhcp enable
[SwitchB] interface vlanif 101
[SwitchB-Vlanif101] ip address 10.23.101.1 24
[SwitchB-Vlanif101] dhcp select interface
[SwitchB-Vlanif101] dhcp server gateway-list 10.23.101.2
[SwitchB-Vlanif101] quit
2. Configure interfaces.
# Select GigabitEthernet0/0/1 and expand Batch Modify. Set Interface type
to Trunk and add GigabitEthernet0/0/1 to VLAN 100 (management VLAN)
and VLAN 101 (service VLAN).
NOTE
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List. Select Interface address
pool and select VLANIF 100.
# Click OK.
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Click Create. On the Create 5G Radio Profile page that is displayed, enter
the profile name wlan-radio5g and click OK. The 5G radio profile
configuration page is displayed.
# On the Advanced Configuration tab, perform the following configurations:
– Set the RTS-CTS mode to rts-cts.
– Set the interval for sending Beacon frames to 160 TUs.
– Set the GI mode to short.
– Set the multicast rate to 6 Mbit/s.
# Click Radio1 and Radio2 to set the channel to 20-MHz channel 149 and 20-
MHz channel 153 respectively and transmit power to 127 dBm. The configuration
is similar to that of Radio0.
# Click Apply. In the dialog box that is displayed, click OK.
4. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
----End
Networking Requirements
● AC networking mode: Layer 2 bypass mode
● DHCP deployment mode:
– The AC functions as a DHCP server to assign IP addresses to APs.
– The aggregation switch (SwitchB) functions as a DHCP server to assign IP
addresses to STAs.
● Service data forwarding mode: direct forwarding
Data Planning
Item Data
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure network interworking of the AC, APs, and other network devices.
2. Configure a VLAN pool for service VLANs.
3. Select Config Wizard to configure system parameters for the AC.
4. Select Config Wizard to configure the APs to go online on the AC.
5. Select Config Wizard to configure WLAN services on the AC.
6. Adjust WLAN high-density parameters.
You are advised to adjust WLAN high-density parameters according to Table
3-53.
Set the To prevent hidden STAs. Set the RTS-CTS operation mode to
RTS-CTS rts-cts and the RTS threshold to 1400
threshol bytes.
d
Adjust To improve the overall Set the interval for sending Beacon
the data traffic of APs. frames to 160 TUs.
interval
at which
Beacon
frames
are sent
Configur To improve the overall Delete low rates from the basic rate
e the AP throughput. set.
basic
rate set
7. Deliver the WLAN services to the APs and verify the configuration.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on SwitchA to VLANs 10, 101, and 102. The default
VLAN of GE0/0/1 and GE0/0/3 is VLAN 10.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
[SwitchA] vlan batch 10 101 102
# On SwitchB (aggregation switch), add GE0/0/1 to VLAN 10, VLAN 101, and
VLAN 102, GE0/0/2 to VLAN 100, and GE0/0/3 to VLAN 101 and VLAN 102. Create
VLANIF 100 and set its IP address to 10.23.100.2/24.
<HUAWEI> system-view
[HUAWEI] sysname SwitchB
[SwitchB] vlan batch 10 100 101 102
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] port link-type trunk
[SwitchB-GigabitEthernet0/0/1] port trunk allow-pass vlan 10 101 102
[SwitchB-GigabitEthernet0/0/1] quit
[SwitchB] interface gigabitethernet 0/0/2
[SwitchB-GigabitEthernet0/0/2] port link-type trunk
[SwitchB-GigabitEthernet0/0/2] port trunk allow-pass vlan 100
[SwitchB-GigabitEthernet0/0/2] quit
[SwitchB] interface gigabitethernet 0/0/3
[SwitchB-GigabitEthernet0/0/3] port link-type trunk
[SwitchB-GigabitEthernet0/0/3] port trunk allow-pass vlan 101 102
[SwitchB-GigabitEthernet0/0/3] quit
[SwitchB] interface vlanif 100
[SwitchB-Vlanif100] ip address 10.23.100.2 24
[SwitchB-Vlanif100] quit
# On Router, add GE1/0/0 to VLAN 101 and VLAN 102. Create VLANIF 101 and
VLANIF 102, and set the IP address of VLANIF 101 to 10.23.101.2/24 and the IP
address of VLANIF 102 to 10.23.102.2/24.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 101 102
[Router] interface gigabitethernet 1/0/0
[Router-GigabitEthernet1/0/0] port link-type trunk
[Router-GigabitEthernet1/0/0] port trunk allow-pass vlan 101 102
[Router-GigabitEthernet1/0/0] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.23.101.2 24
[Router-Vlanif101] quit
[Router] interface vlanif 102
[Router-Vlanif102] ip address 10.23.102.2 24
[Router-Vlanif102] quit
Step 2 Configure the DHCP services to assign IP addresses to APs and STAs.
# On SwitchB, configure DHCP relay to assign IP addresses on behalf of the AC.
[SwitchB] dhcp enable
[SwitchB] interface vlanif 10
[SwitchB-Vlanif10] ip address 10.23.10.1 24
[SwitchB-Vlanif10] dhcp select relay
[SwitchB-Vlanif10] dhcp relay server-ip 10.23.100.1
[SwitchB-Vlanif10] quit
NOTE
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
[SwitchB] interface vlanif 101
[SwitchB-Vlanif101] ip address 10.23.101.1 24
[SwitchB-Vlanif101] dhcp select interface
[SwitchB-Vlanif101] dhcp server gateway-list 10.23.101.2
[SwitchB-Vlanif101] quit
[SwitchB] interface vlanif 102
[SwitchB-Vlanif102] ip address 10.23.102.1 24
[SwitchB-Vlanif102] dhcp select interface
[SwitchB-Vlanif102] dhcp server gateway-list 10.23.102.2
[SwitchB-Vlanif102] quit
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click OK.
# Click Create under DHCPv4 Address Pool List and configure a global
address pool named huawei.
– IP address pool subnet: 10.23.10.0
– Option 43: ASCII, IP address of 10.23.100.1
– Gateway IP address: 10.23.10.1
# Click OK.
# Under Static Route Table, click Create. The Create Static Route Table
page is displayed.
# Set Destination IP to 10.23.10.0, Subnet Mask to 24(255.255.255.0), and
Next hop address to 10.23.100.2.
# Click OK.
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 5 Configure WLAN services.
# Click Create. The Basic Information page is displayed.
# Set the SSID name, forwarding mode, and service VLAN. Set Service VLAN to
VLAN Pool. Click Create next to VLAN Pool. The Create VLAN Pool page is
displayed.
# Set VLAN pool name to sta-pool and VLAN assignment mode to Hash. Add
VLANs 101 and 102.
# Click OK. In the dialog box that is displayed, click OK.
# In the AP group list, click the AP group ap-group1 and click next to
Radio Management. The profiles in Radio Management are displayed.
# Click Radio 0. The Radio 0 Settings(2.4G) page is displayed. Enable the
dual-5G mode. In the dialog box that is displayed, click OK.
4. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
5. When a large number of users connect to the network in the stadium, the
users still have good Internet experience.
----End
Networking Requirements
After a spectrum server is deployed on the network, the AP reports the spectrum
scanning data and sampling data to the spectrum server through the AC. Ensure
that the AC and the spectrum server can communicate with each other.
Data Planning
Configuration Roadmap
Configure spectrum analysis so that the APs can detect non-Wi-Fi devices and
send alarms to the AC.
Configuration Notes
● If a radio works in normal mode and has air scan functions (such as WIDS,
spectrum analysis, and terminal location) enabled, the radio transmits
common WLAN services and also provides the monitoring function. A
transient increase in the WLAN service latency may occur, which does not
affect network access. However, if any latency-sensitive service (such as
videoconferencing) is running, it is recommended that a separate radio be
used for air scan.
● When spectrum analysis is used, the air scan interval range of 2s to 10s and
the air scan period of 100 ms are recommended. This helps you obtain
sufficient sampled data without compromising normal services.
● The channels to be scanned for spectrum analysis are fixed as all channels
supported by the corresponding country code of an AP and are irrelevant to
the configuration in an air scan profile.
Procedure
Step 1 Configure spectrum analysis.
1. Set spectrum analysis parameters.
# Choose Configuration > AP Config > AP Group > AP Group.
# In the AP group list, click ap-group1. Choose AP > AP System Profile. The
AP System Profile page is displayed.
# Click Create. The Create AP System Profile page is displayed. Enter the
profile name wlan-spectrum and click OK. On the ap system profile
configuration page that is displayed.
# On the Advanced Configuration tab, set related parameters.
# In the AP group list, click ap-group1. Choose Radio Management > Radio
0 > 2G Radio Profile. The 2G Radio Profile page is displayed.
# Click Create. On the Create 2G Radio Profile page that is displayed, enter
the profile name wlan-radio2g and click OK. The 2G radio profile
configuration page is displayed.
# Choose 2G Radio Profile > Air Scan Profile. The Air Scan Profile page is
displayed. Click Create. On the Create Air Scan Profile page that is displayed,
enter the profile name wlan-airscan and click OK. The air scan profile
configuration page is displayed.
# Enable scanning, and configure the scan channel set, scan interval, and scan
duration.
# Click Apply. In the dialog box that is displayed, click OK. The 5G radio
configuration is similar and not mentioned here.
d. Select your desired spectrum chart from the drop-down list box in the
upper left corner. You can select Lower or Upper on the spectrum charts
of a 5G radio to view spectrum charts of different frequencies.
e. The Real-Time FFT chart shows that the signal strength of interference is
mostly within the range of -80 dBm to -40 dBm. On the Swept
Spectrogram chart, click Modify, set the signal strength scope at both
ends of the color bar, and click Apply. The Swept Spectrogram chart
shows that channel 149 has the most severe interference.
----End
Related Topics
● 3.1.1 Example for Configuring Layer 2 Direct Forwarding in Inline Mode
● 3.1.2 Example for Configuring Layer 2 Tunnel Forwarding in Inline Mode
● 3.1.3 Example for Configuring Layer 2 Direct Forwarding in Bypass Mode
● 3.1.4 Example for Configuring Layer 2 Tunnel Forwarding in Bypass Mode
● 3.1.5 Example for Configuring Layer 3 Direct Forwarding in Inline Mode
● 3.1.6 Example for Configuring Layer 3 Tunnel Forwarding in Inline Mode
● 3.1.7 Example for Configuring Layer 3 Direct Forwarding in Bypass Mode
● 3.1.8 Example for Configuring Layer 3 Tunnel Forwarding in Bypass Mode
Service Requirements
An enterprise branch needs to deploy WLAN services for mobile office so that
branch users can access the enterprise network from anywhere at any time.
Furthermore, users' services are not affected during roaming in the coverage area.
The branch is located in an open place, making the WLAN vulnerable to attacks.
For example, an attacker deploys a rogue AP (area_2) with SSID wlan-net on the
WLAN to establish connections with STAs to intercept enterprise information,
posing great threats to the enterprise network. To prevent such attack, the
detection and containment function can be configured for authorized APs. In this
way, the AC can detect rogue AP area_2 (neither managed by the AC nor in the
authorized AP list), preventing STAs from associating with the rogue AP.
Networking Requirements
● AC networking mode: Layer 2 networking in bypass mode
● DHCP deployment mode:
– The AC functions as a DHCP server to assign IP addresses to APs.
– The aggregation switch (SwitchB) functions as a DHCP server to assign IP
addresses to STAs.
● Service data forwarding mode: tunnel forwarding
Figure 3-53 Networking for configuring rogue device detection and containment
Data Planning
Item Data
Item Data
IP address 10.23.100.2-10.23.100.254/24
pool for
APs
IP address 10.23.101.3-10.23.101.254/24
pool for
STAs
Configuration Roadmap
1. Configure basic WLAN services to enable STAs to connect to the WLAN.
2. Configure rogue device detection and containment so that APs can detect
wireless device information and report it to the AC. In addition, APs can
contain detected rogue devices, enabling STAs to disassociate from them.
NOTE
In this example, the authorized APs work in normal mode and have the detection function
enabled. In addition to transmitting WLAN service data, AP radios need to perform the
monitoring function. A transient increase in the WLAN service latency may occur, which does
not affect network access. However, if any latency-sensitive service (such as videoconferencing)
is running, it is recommended that a separate radio be used for air scan.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on SwitchA to VLAN 100. The default VLAN of
GE0/0/1 is VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
[SwitchA] vlan batch 100
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk pvid vlan 100
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[SwitchA-GigabitEthernet0/0/1] port-isolate enable
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 100
[SwitchA-GigabitEthernet0/0/2] quit
# Add GE0/0/1 and GE0/0/2 on SwitchB (aggregation switch) to VLAN 100, and
GE0/0/2 and GE0/0/3 to VLAN 101.
<HUAWEI> system-view
[HUAWEI] sysname SwitchB
[SwitchB] vlan batch 100 101
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] port link-type trunk
[SwitchB-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[SwitchB-GigabitEthernet0/0/1] quit
[SwitchB] interface gigabitethernet 0/0/2
[SwitchB-GigabitEthernet0/0/2] port link-type trunk
[SwitchB-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[SwitchB-GigabitEthernet0/0/2] quit
[SwitchB] interface gigabitethernet 0/0/3
[SwitchB-GigabitEthernet0/0/3] port link-type trunk
[SwitchB-GigabitEthernet0/0/3] port trunk allow-pass vlan 101
[SwitchB-GigabitEthernet0/0/3] quit
# Add GE1/0/0 on Router to VLAN 101. Create VLANIF 101 and set its IP address
to 10.23.101.2/24.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 101
[Router] interface gigabitethernet 1/0/0
[Router-GigabitEthernet1/0/0] port link-type trunk
[Router-GigabitEthernet1/0/0] port trunk allow-pass vlan 101
[Router-GigabitEthernet1/0/0] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.23.101.2 24
[Router-Vlanif101] quit
Step 2 Configure a DHCP server to assign IP addresses to STAs and specify the gateway
for the STAs.
# On SwitchB, configure VLANIF 101 to assign IP addresses to STAs and set the
default gateway address of STAs to 10.23.101.2.
NOTE
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
[SwitchB] dhcp enable
[SwitchB] interface vlanif 101
# Choose Configuration > Config Wizard > AC. The Basic AC Configuration
page is displayed.
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List. Select Interface address
pool and select VLANIF 100.
# Click OK.
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 5 Configure WLAN services.
# Click Create. The Basic Information page is displayed.
# Set the SSID name, forwarding mode, and service VLAN.
# Click Finish.
Automatic channel and power calibration functions are enabled by default. The manual
channel and power configurations take effect only when these two functions are disabled.
# Choose Configuration > AP Config > AP Config > AP Info. The AP List
page is displayed.
# Click the ID of the AP whose channel and power need to be configured. The
AP customized settings page is displayed.
# Click Apply. In the Info dialog box that is displayed, click OK.
# Configure radio 1 to work in normal mode, and enable rogue device
detection and containment in the same way.
2. Configure the containment mode against rogue APs using spoofing SSIDs.
# Click in front of WIDS. Under it, click WIDS Profile. The WIDS Profile
page is displayed.
# Configure the containment mode against rogue APs using spoofing SSIDs.
# Click Apply. In the Info dialog box that is displayed, click OK.
Step 8 Verify the configuration.
Choose Monitoring > WIDS. In the Device Detection area, view the detection
result.
● Click a number in the detection result list. The detected device information is
displayed in Device Detection Information.
● Select a device in the detected device list and click View Discovered APs.
Information about the APs that detect the device is displayed.
● In the list of APs that detect the device, select an AP and click View Whitelist
to view the whitelist of the AP.
----End
Networking Requirements
● AC networking mode: Layer 2 networking in bypass mode
● DHCP deployment mode:
– The AC functions as a DHCP server to assign IP addresses to APs.
– The aggregation switch (SwitchB) functions as a DHCP server to assign IP
addresses to STAs.
● Service data forwarding mode: tunnel forwarding
Data Planning
Managem VLAN100
ent VLAN
for APs
Service VLAN101
VLAN for
STAs
IP address 10.23.100.2-10.23.100.254/24
pool for
APs
IP address 10.23.101.3-10.23.101.254/24
pool for
STAs
Item Data
Configuration Roadmap
1. Configure basic WLAN services to ensure that users can access the WLAN.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on SwitchA to VLAN 100. The default VLAN of
GE0/0/1 is VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
[SwitchA] vlan batch 100
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk pvid vlan 100
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[SwitchA-GigabitEthernet0/0/1] port-isolate enable
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 100
[SwitchA-GigabitEthernet0/0/2] quit
# Add GE0/0/1 and GE0/0/2 on SwitchB (aggregation switch) to VLAN 100, and
GE0/0/2 and GE0/0/3 to VLAN 101.
<HUAWEI> system-view
[HUAWEI] sysname SwitchB
[SwitchB] vlan batch 100 101
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] port link-type trunk
[SwitchB-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[SwitchB-GigabitEthernet0/0/1] quit
[SwitchB] interface gigabitethernet 0/0/2
[SwitchB-GigabitEthernet0/0/2] port link-type trunk
[SwitchB-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[SwitchB-GigabitEthernet0/0/2] quit
[SwitchB] interface gigabitethernet 0/0/3
[SwitchB-GigabitEthernet0/0/3] port link-type trunk
[SwitchB-GigabitEthernet0/0/3] port trunk allow-pass vlan 101
[SwitchB-GigabitEthernet0/0/3] quit
# Add GE1/0/0 on Router to VLAN 101. Create VLANIF 101 and set its IP address
to 10.23.101.2/24.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 101
[Router] interface gigabitethernet 1/0/0
[Router-GigabitEthernet1/0/0] port link-type trunk
[Router-GigabitEthernet1/0/0] port trunk allow-pass vlan 101
[Router-GigabitEthernet1/0/0] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.23.101.2 24
[Router-Vlanif101] quit
Step 2 Configure a DHCP server to assign IP addresses to STAs and specify the gateway
for the STAs.
# On SwitchB, configure VLANIF 101 to assign IP addresses to STAs and set the
default gateway address of STAs to 10.23.101.2.
NOTE
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
[SwitchB] dhcp enable
[SwitchB] interface vlanif 101
[SwitchB-Vlanif101] ip address 10.23.101.1 24
[SwitchB-Vlanif101] dhcp select interface
[SwitchB-Vlanif101] dhcp server gateway-list 10.23.101.2
[SwitchB-Vlanif101] quit
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List. Select Interface address
pool and select VLANIF 100.
# Click OK.
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 5 Configure WLAN services.
# Click Create. The Basic Information page is displayed.
# Set the SSID name, forwarding mode, and service VLAN.
# Click Finish.
Automatic channel and power calibration functions are enabled by default. The manual
channel and power configurations take effect only when these two functions are disabled.
# Choose Configuration > AP Config > AP Config > AP Info. The AP List
page is displayed.
# Click the ID of the AP whose channel and power need to be configured. The
AP customized settings page is displayed.
# Choose Configuration > AP Config > AP Group > AP Group. The AP Group
page is displayed.
# Click Apply. In the Info dialog box that is displayed, click OK.
# Click in front of WIDS. Under it, click WIDS Profile. The WIDS Profile
page is displayed.
# Click Advanced Configuration and set parameters for the brute force PSK
cracking attack detection for WPA2-PSK authentication and flood attack
detection WPA2-PSK. Enable the dynamic blacklist function.
# Click Apply. In the Info dialog box that is displayed, click OK.
3. Create AP system profile wlan-system, and set the aging time of the dynamic
blacklist.
# Click Apply. In the Info dialog box that is displayed, click OK.
# Click Apply. In the Info dialog box that is displayed, click OK.
Choose Monitoring > WIDS and view attack detection result in the Attack
Detection area.
----End
Networking Requirements
PPSK authentication has no specific requirements on the networking. After setting
the security policy of an SSID to PPSK on the AC, the network administrator needs
to configure a lobby administrator account for hotel receptionists. The hotel
receptionists can use this account to log in to the AC's web platform to assign
passwords to guests for accessing the Internet.
Data Planning
Item Data
Configuration Roadmap
1. The network administrator configures the AC, APs, and other network devices
based on the wireless network plan to ensure network connectivity.
2. The network administrator logs in to the AC's web platform and configures
WLAN services using the configuration wizard. PPSK authentication cannot be
configured using the configuration wizard. The network administrator can
configure key authentication and then change the security policy to PPSK.
3. The network administrator creates a lobby administrator account for hotel
receptionists.
4. A hotel receptionist logs in to the AC's web platform to configure and
manage guest passwords for accessing the Internet.
For details about network interworking and WLAN service deployment, see
the WLAN basic networking configuration examples. This example focuses on
the PPSK authentication configuration.
Configuration Notes
● PPSK users are counted as local users managed by the AC. Configure a proper
number of PPSK users based on the actual user specifications of the AC
model, and delete expired and unused user accounts periodically.
● After a receptionist assigns passwords to guests, a user password list is
automatically generated. The receptionist should save this list properly. If this
list is not saved, the passwords will be displayed in ciphertext when this list is
manually exported later.
Procedure
Step 1 Set the security policy to PPSK as the network administrator.
# Choose Configuration > AP Config > AP Group. Click the AP group name. The
AP group configuration page is displayed.
# Expand the profile tree of the AP group and find Security Profile. Set
Authentication policy to PPSK and click Apply.
Step 2 Create a lobby administrator account for hotel receptionists as the network
administrator.
# Choose Maintenance > Administrator. The administrator configuration page is
displayed.
# Click Create. Create a lobby administrator account and click OK.
# Use the lobby administrator account to log in to the AC's web platform and click
PPSK Management.
# Create users and randomly generate a group of user passwords. In this example,
user names and passwords are generated by room. Alternatively, different
passwords can be generated for each guest or STA.
# Click Confirm and Export. A QR code is generated for user login. The
receptionist needs to print the QR code information (including the QR code, user
name, SSID, and expiration time) and provide the information for guests in each
room to access the Internet.
# Check the passwords randomly generated for each user in the automatically
exported table, and keep the passwords secure.
Figure 3-60 PPSK user list and automatically exported PPSK table
# Create a single user, and set the user name and password.
# When a guest checks in, a receptionist searches for the QR code information
based on the room number and provides the information to the guest. The guest
then can scan the QR code to access the Internet.
# The user is displayed in online state in the user list of on the AC's web platform.
----End
Networking Requirements
WPA3-SAE authentication has no special requirements for networking. Before
configuring this security policy, ensure that the network is connected and APs can
go online.
Data Planning
Configuration Roadmap
1. Configure basic WLAN services using the WLAN configuration wizard so that
STAs can access the WLAN. For details about how to configure basic WLAN
services, see WLAN Basic Networking Configuration Examples.
2. Configure WPA3-SAE authentication in a security profile.
Procedure
Step 1 Set the security policy to WPA3-SAE.
# Choose Configuration > AP Config > AP Group. Click the AP group name. The
AP group configuration page is displayed.
# Expand the profile tree of the AP group and find Security Profile. Set Security
policy to WPA3, Authentication policy to SAE, and Key to YsHsjx_202206, and
click Apply.
----End
Service Requirements
Because the WLAN is open to users, there are potential security risks to service
data if no security policy is configured for the WLAN. If STAs support OWE
authentication, you can configure an OWE security policy to ensure network
openness as well as data transmission security. The OWE transition mode provides
backward compatibility with STAs that do not support OWE authentication. That
is, these STAs access the network in open-system authentication mode, while
OWE-capable STAs access the network in OWE authentication mode.
Networking Requirements
The OWE transition mode has no special requirements for networking. Before
configuring this security policy, ensure that the network is connected and APs can
go online.
Data Planning
Item Data
Item Data
● Name: wlan-security-owe
● Security policy: Authentication in
OWE transition mode
● Name: wlan-vap-owe
● Forwarding mode: tunnel
forwarding
● Service VLAN: VLAN 101
● Referenced profiles: SSID profile
wlan-ssid and security profile
wlan-security-owe
Configuration Roadmap
1. Configure basic WLAN services using the WLAN configuration wizard so that
STAs can access the WLAN. For details about how to configure basic WLAN
services, see WLAN Basic Networking Configuration Examples.
2. Configure open system authentication in the VAP profile wlan-vap-open and
security profile wlan-security-open so that STAs that do not support OWE
authentication can access the network in open system authentication mode.
3. Configure OWE transition authentication in the VAP profile wlan-vap-owe
and security profile wlan-security-owe so that OWE-capable STAs can access
the network in OWE authentication mode.
NOTE
In OWE transition mode, you need to configure two VAP profiles on the same radio and set
their authentication modes to OWE and open-system, respectively. The transition SSID must
be the same as the SSID in the VAP profile using the open-system authentication mode. If
no other VAP profile uses the open-system authentication mode and has the same SSID as
the VAP profile using the OWE authentication mode on the same radio, the OWE transition
mode does not take effect. In this case, the device uses OWE authentication.
Procedure
Step 1 Configure open-system authentication.
# Choose Configuration > AP Config > AP Group. Click the AP group name. The
AP group configuration page is displayed.
# Expand the profile tree of the AP group, choose VAP Profile > wlan-vap-open,
and choose Security Profile > wlan-security-open. On the security profile page
that is displayed, set Security policy to OPEN and click Apply.
# Expand the profile tree of the AP group, choose VAP Profile > wlan-vap-owe,
and choose Security Profile > wlan-security-owe. On the security profile page
that is displayed, set Security policy to OWE, set Transition SSID to wlan-net,
and click Apply.
----End
Service Requirements
An enterprise needs to provide WLAN services for management personnel so that
they can connect to the enterprise network from anywhere at any time.
Furthermore, users' services are not affected during roaming in the coverage area.
Networking Requirements
● AC networking mode: Layer 2 networking in bypass mode
● DHCP deployment mode:
– The AC functions as a DHCP server to assign IP addresses to APs.
– The aggregation switch (SwitchB) functions as a DHCP server to assign IP
addresses to STAs.
● Service data forwarding mode: tunnel forwarding
Figure 3-66 Networking for configuring the STA blacklist and whitelist
Data Planning
Item Data
Item Data
IP address 10.23.100.2-10.23.100.254/24
pool for
APs
IP address 10.23.101.3-10.23.101.254/24
pool for
STAs
Configuration Roadmap
1. Configure basic WLAN services to ensure that users can access the WLAN.
2. Configure a STA whitelist. Add MAC addresses of management personnel's
wireless terminals to the whitelist. To prevent configuration impacts on other
VAPs, configure the STA whitelist for a VAP, instead of an AP.
3. Configure a STA blacklist for an AP. Add MAC addresses of some STAs to the
blacklist to prevent the STAs from associating with the AP, ensuing WLAN
network security.
NOTE
The STA whitelist and blacklist cannot be configured simultaneously for a VAP or an AP, that is,
the STA whitelist and blacklist cannot take effect at the same time in a VAP profile or an AP
system profile.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on SwitchA to VLAN 100. The default VLAN of
GE0/0/1 is VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
[SwitchA] vlan batch 100
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk pvid vlan 100
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[SwitchA-GigabitEthernet0/0/1] port-isolate enable
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 100
[SwitchA-GigabitEthernet0/0/2] quit
# Add GE0/0/1 and GE0/0/2 on SwitchB (aggregation switch) to VLAN 100, and
GE0/0/2 and GE0/0/3 to VLAN 101.
<HUAWEI> system-view
[HUAWEI] sysname SwitchB
[SwitchB] vlan batch 100 101
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] port link-type trunk
[SwitchB-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[SwitchB-GigabitEthernet0/0/1] quit
[SwitchB] interface gigabitethernet 0/0/2
[SwitchB-GigabitEthernet0/0/2] port link-type trunk
[SwitchB-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[SwitchB-GigabitEthernet0/0/2] quit
[SwitchB] interface gigabitethernet 0/0/3
[SwitchB-GigabitEthernet0/0/3] port link-type trunk
[SwitchB-GigabitEthernet0/0/3] port trunk allow-pass vlan 101
[SwitchB-GigabitEthernet0/0/3] quit
# Add GE1/0/0 on Router to VLAN 101. Create VLANIF 101 and set its IP address
to 10.23.101.2/24.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 101
[Router] interface gigabitethernet 1/0/0
[Router-GigabitEthernet1/0/0] port link-type trunk
[Router-GigabitEthernet1/0/0] port trunk allow-pass vlan 101
[Router-GigabitEthernet1/0/0] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.23.101.2 24
[Router-Vlanif101] quit
Step 2 Configure a DHCP server to assign IP addresses to STAs and specify the gateway
for the STAs.
# On SwitchB, configure VLANIF 101 to assign IP addresses to STAs and set the
default gateway address of STAs to 10.23.101.2.
NOTE
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
[SwitchB] dhcp enable
[SwitchB] interface vlanif 101
[SwitchB-Vlanif101] ip address 10.23.101.1 24
[SwitchB-Vlanif101] dhcp select interface
[SwitchB-Vlanif101] dhcp server gateway-list 10.23.101.2
[SwitchB-Vlanif101] quit
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List. Select Interface address
pool and select VLANIF 100.
# Click OK.
# Click Next.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
Automatic channel and power calibration functions are enabled by default. The manual
channel and power configurations take effect only when these two functions are disabled.
# Choose Configuration > AP Config > AP Config > AP Info. The AP List
page is displayed.
# Click the ID of the AP whose channel and power need to be configured. The
AP customized settings page is displayed.
# Click OK.
Step 8 Configure a global STA blacklist.
1. Create AP system profile wlan-system.
# Click in front of AP. Under it, click AP System Profile. The AP System
Profile page is displayed.
# Click Create. On the Create AP System Profile page that is displayed, enter
the profile name wlan-system and click OK. The AP System Profile
configuration page is displayed.
# Click Apply. In the Info dialog box that is displayed, click OK.
2. Configure STA blacklist profile sta-blacklist and add MAC addresses of STA3
and STA4 to the blacklist.
# Click in front of AP System Profile. Under it, click STA Blacklist Profile.
On the STA Blacklist Profile page, select Blacklist.
# Click Create. The Create STA Blacklist Profile page is displayed.
# Enter the name of the new STA blacklist profile sta-blacklist in Profile
name, and click OK. The parameter setting page of the new STA blacklist
profile is displayed.
# Click Add. The Add MAC Address page is displayed.
# Add MAC addresses of STA3 and STA4 to the blacklist.
# Click OK.
Step 9 Verify the configuration.
The WLAN with SSID wlan-net is available for STAs connected to the AP.
STA1 and STA2 can connect to the WLAN. STA3 and STA4 cannot connect to the
WLAN.
----End
Service Requirements
An enterprise deploys WLAN area to provide WLAN services for users. The
enterprise requires that STAs not obtain incorrect IP addresses or fail to
communicate even if a bogus DHCP server is deployed on the user side to improve
WLAN security.
Networking Requirements
● AC networking mode: Layer 2 bypass mode
● DHCP deployment mode: The AC functions as a DHCP server to assign IP
addresses to APs and STAs.
● Service data forwarding mode: tunnel forwarding
Data planning
Item Data
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure WLAN services.
2. Configure an AP to protect STAs from obtaining bogus IP addresses to
improve network security.
Procedure
Step 1 Configure the switches and router.
# Add GE0/0/1 and GE0/0/2 on the switch to VLAN 100 (default VLAN of
GE0/0/1).
Step 2 Configure system parameters for the AC.
1. Perform basic AC configurations.
# Choose Configuration > Config Wizard > AC. The Basic AC Configuration
page is displayed.
# Set Country/Region based on actual situations. For example, set Country/
Region to China. Set System time to Manual and Date and time to PC.
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List, select Interface address
pool and select VLANIF 100.
# Click OK.
# Set the IP address of VLANIF 101 to 10.23.101.1/24 and configure the
interface address pool on VLANIF 101 in the same way. The IP address
10.23.101.2 cannot be assigned.
NOTE
# Under Static Route Table, click Create. The Create Static Route Table
page is displayed.
# Set Destination IP to 0.0.0.0, Subnet Mask to 0(0.0.0.0), and Next hop
address to 10.23.101.2.
# Click OK.
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Click Finish.
# Choose Wireless Service > VAP Profile in Profile Management. The VAP
Profile List page is displayed.
# Click the VAP profile wlan-net. The VAP profile configuration page is displayed.
Click Advanced Configuration. On IP Services, set IP learning to IPv4, Strict IP
learning to ON, and Dynamic blacklist of static IPv4 addresses to ON.
# Click Apply.
Step 6 Verify the configuration.
If a bogus DHCP server is deployed on the user side, APs discard the DHCP OFFER,
ACK, and NAK packets sent by the bogus server and report to the AC about the IP
address of the bogus DHCP server.
----End
Data Planning
Configuration Roadmap
1. Configure the WMM function so that network bandwidth is preferentially
allocated to voice and video services at the wireless side.
2. Configure priority mapping to ensure a higher priority of voice and video
services so that network bandwidth is preferentially allocated to these
services.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure the WMM function.
2. Enable the dynamic EDCA function in the RRM profile. This function can
detect the number of users to flexibly adjust parameters for physical channel
contention, reducing the collision probability, greatly increasing the overall
throughput, and improving user experiences.
# Choose Configuration > AP Config > AP Group > AP Group.
# In the AP group list, click ap-group1. Choose Radio Management > Radio
0 > 2G Radio Profile. Click in front of 2G Radio Profile. Profiles in the 2G
radio profile are displayed.
# Click RRM Profile. The RRM Profile page is displayed.
# Click Create. The Create RRM Profile page is displayed.
# Enter the profile name wlan-rrm in Profile name and click OK. The new
RRM profile configuration page is displayed.
# On the Advanced Configuration tab page of the RRM profile, enable
dynamic EDCA.
# In the RRM profile, select wlan-rrm and click Apply. In the dialog box that
is displayed, click OK.
This example requires that voice and video packets have the highest priority so
that these packets are preferentially transmitted. By default, the uplink and
downlink mapping modes on the air interface are 802.11e and DSCP, respectively.
The uplink and downlink priority mapping on the air interface can ensure that
voice and video packets have the highest tunnel DSCP priority. Therefore, you do
not need to modify default priority mapping.
To change the default priority mapping, for example, to enable video packets with
a higher priority than voice packets, you can refer to this step.
# Enter the traffic profile name wlan-traffic in Profile name and click OK. The
parameter setting page of the new traffic profile is displayed.
# On the Advanced Configuration tab, configure priority mapping and set the
mapped priority of video packets higher than that of the voice packets.
NOTE
By default, the user priority of voice packets is set to 6 or 7, and that of the video packets is set
to 4 or 5.
In the following figure, the DSCP priorities of video packets are 48 and 56, and those of the
voice packets are 32 and 40. Based on the settings, video packets will be preferentially
transmitted.
# Click Apply. In the Info dialog box that is displayed, click OK.
Related Topics
● 3.1.1 Example for Configuring Layer 2 Direct Forwarding in Inline Mode
● 3.1.2 Example for Configuring Layer 2 Tunnel Forwarding in Inline Mode
● 3.1.3 Example for Configuring Layer 2 Direct Forwarding in Bypass Mode
● 3.1.4 Example for Configuring Layer 2 Tunnel Forwarding in Bypass Mode
● 3.1.5 Example for Configuring Layer 3 Direct Forwarding in Inline Mode
● 3.1.6 Example for Configuring Layer 3 Tunnel Forwarding in Inline Mode
● 3.1.7 Example for Configuring Layer 3 Direct Forwarding in Bypass Mode
● 3.1.8 Example for Configuring Layer 3 Tunnel Forwarding in Bypass Mode
Data Planning
Item Data
Configuration Roadmap
1. Configure the uplink rate limits of a single STA and all STAs on a VAP in a
traffic profile to achieve traffic policing.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
Procedure
Step 1 Configure traffic policing.
Create traffic profile wlan-traffic. Set the uplink rate limit of a single AP to 2
Mbit/s and the total uplink rate limit of all STAs on the VAP to 30 Mbit/s.
# Enter the traffic profile name wlan-traffic in Profile name and click OK. The
parameter setting page of the new traffic profile is displayed.
# On the Advanced Configuration tab, set the uplink rate limit to 2 Mbit/s for
STAs and to 30 Mbit/s for VAPs.
# Click Apply. In the Info dialog box that is displayed, click OK.
----End
Related Topics
● 3.1.1 Example for Configuring Layer 2 Direct Forwarding in Inline Mode
Data Planning
Item Data
Configuration Roadmap
1. Enable airtime fair scheduling to ensure that multiple users on a radio can
fairly use network bandwidth to improve overall user experience.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
Procedure
Step 1 Configure airtime fair scheduling.
# Click in front of 2G Radio Profile, and click RRM Profile. Click Create. On
the page that is displayed, set Profile name to wlan-rrm and click OK. The RRM
Profile configuration page is displayed.
----End
Related Topics
● 3.1.1 Example for Configuring Layer 2 Direct Forwarding in Inline Mode
Data Planning
Item Data
Configuration Roadmap
1. Configure ACL-based packet filtering in a traffic profile.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure ACL-based packet filtering.
1. Create ACL 3001 and forbid packets with source IP address 10.23.101.10 and
destination IPv4 address 10.23.101.11 to pass.
# Choose Configuration > Security > ACL > Advanced ACL Settings. The
Advanced ACL Settings page is displayed.
# Click Create. In the Create Advanced ACL dialog box that is displayed, set
the ACL name to ACL3001 and ACL number to 3001. Click OK.
# Click Add Rule in the new ACL.
# Click OK.
2. Create traffic profile wlan-traffic and apply the ACL to it.
# Choose Configuration > AP Config > AP Group > AP Group.
# Click Apply. In the Info dialog box that is displayed, click OK.
----End
Related Topics
● 3.1.1 Example for Configuring Layer 2 Direct Forwarding in Inline Mode
● 3.1.2 Example for Configuring Layer 2 Tunnel Forwarding in Inline Mode
● 3.1.3 Example for Configuring Layer 2 Direct Forwarding in Bypass Mode
● 3.1.4 Example for Configuring Layer 2 Tunnel Forwarding in Bypass Mode
● 3.1.5 Example for Configuring Layer 3 Direct Forwarding in Inline Mode
● 3.1.6 Example for Configuring Layer 3 Tunnel Forwarding in Inline Mode
● 3.1.7 Example for Configuring Layer 3 Direct Forwarding in Bypass Mode
● 3.1.8 Example for Configuring Layer 3 Tunnel Forwarding in Bypass Mode
Networking Requirements
Enterprise users can access the network through WLANs, which is the basic
requirement of mobile office. Furthermore, users' services are not affected during
roaming in the coverage area.
Voice, video, and data services are transmitted on the WLAN. The administrator
requires that voice and video services of QQ and WeChat have a higher priority to
ensure good user experience in these services.
Data Planning
Item Data
Configuration Roadmap
1. Enable the SAC function.
2. Configure optimization for voice and video services so that the QQ and
WeChat services have a higher priority than data services.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
Procedure
Step 1 Enable the security engine.
NOTE
After the security engine is enabled, the system automatically loads the default signature
database.
# Choose Configuration > Security > Attack Defense. The Attack Defense page
is displayed.
Step 2 # Create an SAC profile and bind it to the VAP profile mapping the AP group ap-
group1.
# In the AP group list, click the AP group name ap-group1. Click next to VAP
Configuration and next to wlan-net, and select SAC Profile.
# Click SAC Profile and enter wlan-sac in Profile name. Click OK. The SAC
Profile page is displayed.
# Click Apply. In the dialog box that is displayed, click OK.
Step 3 Enable optimization for voice and video services on QQ and WeChat.
# Choose Configuration > QoS > App Identification & Optimization >
Voice&Video Optimization. The Voice & Video Optimization page is displayed.
# Set Voice optimization and Video optimization to ON.
# Set the applications' Voice optimization and Video optimization to OFF except
qq and weixin.
NOTE
By default, dynamic optimization for voice and video services is enabled for all applications in
Application Detection Optimization List. To modify the status of the function for an
application, select the application and set Voice Detection Optimization and Video Detection
Optimization to ON or OFF.
# In the AP group list, click the AP group name ap-group1. Click next to Radio
Management and next to Radio 0.
# Click next to 2G Radio Profile and select RRM Profile. Click Create, enter
wlan-rrm in Profile name, and then click OK. The RRM Profile configuration
page is displayed.
# On the Advanced Configuration tab, disable Dynamic EDCA and enable
Multimedia air interface optimization.
----End
Related Topics
● 3.1.2 Example for Configuring Layer 2 Tunnel Forwarding in Inline Mode
● 3.1.4 Example for Configuring Layer 2 Tunnel Forwarding in Bypass Mode
● 3.1.6 Example for Configuring Layer 3 Tunnel Forwarding in Inline Mode
● 3.1.8 Example for Configuring Layer 3 Tunnel Forwarding in Bypass Mode
Data Planning
Item Data
Skype4B 9000
server port
number
Configuration Roadmap
1. Configure priorities for Skype4B packets to set higher priorities for voice and
video packets than those of desktop sharing and file transfer packets.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
Procedure
Step 1 Configure priorities for Skype4B packets.
# Choose Configuration > AP Config > AP Group > AP Group.
NOTE
● The port number of the HTTP service specified on the AC must be consistent with the port
number on the Skype4B server.
● You need to specify the IP address of the AC for the Skype4B server and the port number of
the Skype4B server.
----End
Related Topics
● 3.1.1 Example for Configuring Layer 2 Direct Forwarding in Inline Mode
● 3.1.2 Example for Configuring Layer 2 Tunnel Forwarding in Inline Mode
● 3.1.3 Example for Configuring Layer 2 Direct Forwarding in Bypass Mode
● 3.1.4 Example for Configuring Layer 2 Tunnel Forwarding in Bypass Mode
● 3.1.5 Example for Configuring Layer 3 Direct Forwarding in Inline Mode
● 3.1.6 Example for Configuring Layer 3 Tunnel Forwarding in Inline Mode
● 3.1.7 Example for Configuring Layer 3 Direct Forwarding in Bypass Mode
● 3.1.8 Example for Configuring Layer 3 Tunnel Forwarding in Bypass Mode
Networking Requirements
As shown in the following figure, an enterprise has deployed a WLAN with the
direct data forwarding mode. To regulate online behavior of employees on the
network, the administrator needs to configure QoS policies based on application
protocols.
Voice, video, and data services are involved on the WLAN, including FaceTime,
SkypeForBusiness, QQ_VoIP. The administrator wants to learn the application
traffic usage to plan the network capacity and locate faults. For example, discard
FaceTime packets, specify the SkypeForBusiness priority, and limit the rate of
QQ_VoIP traffic.
For configurations of the WLAN access function, see Related Topics.
Configuration Roadmap
The configuration roadmap is as follows:
1. Enable the security engine and update the signature database.
2. Configure application visualization, including specifying the priority for Skype
for Business packets, discarding FaceTime packets, and limiting the rate of QQ
VoIP packets.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
Procedure
Step 1 Enable the security engine.
NOTE
In this example, the direct data forwarding mode is used. Therefore, you need to enable the
security engine on both the AC and the AP. If tunnel forwarding is used, you only need to
enable the security engine on the AC.
# Choose Configuration > QoS > App Identification & Optimization > SAC >
SAC Configuration.
# Disable Loading the SAC signature database on the AP. In Loading the SAC
Signature Database for APs by AP Group, enable SAC for a specified AP group.
# Click Apply.
# After the update is successful, a dialog box is displayed, where you can click OK.
# The method for updating AP SAC Signature Database is similar to that for
updating the AC SAC signature database, and is not mentioned here.
Step 3 Create an SAC profile and bind it to the VAP profile corresponding to the AP group
ap-group1.
# In the AP group list, click the AP group ap-group1, click next to VAP
Configuration, click next to wlan-net, and select SAC Profile.
# Click Create, set Profile name to wlan-sac. Click OK. The page for configuring
SAC Profile is displayed.
Step 4 After the configuration is complete, the FaceTime service cannot be used, the
DSCP priority of the Skype for Business packets is 40, and the rate of QQ VoIP
packets is limited to 1000 kbit/s.
----End
Related Topics
● 3.1.1 Example for Configuring Layer 2 Direct Forwarding in Inline Mode
Networking Requirements
An enterprise wants to enable users to access the Internet through a WLAN,
meeting the basic mobile office requirements. Furthermore, users' services are not
affected during roaming in the coverage area.
You can use iMaster NCE-CampusInsight to monitor network traffic in real time to
quickly detect abnormal traffic and demarcate faults.
For details about how to configure wireless network access, see Related Topics.
Data Planning
Configura Data
tion Item
Configura Data
tion Item
Configuration Roadmap
1. Define an iPCA 2.0 measurement flow.
2. On the AC, configure the in-point in the VAP profile view, and specify the AC
as the mid-point and the AC's uplink physical interface GE0/0/1 as the out-
point.
3. Configure the function of periodically reporting wireless traffic measurement
information to iMaster NCE-CampusInsight.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Before configuring iPCA 2.0 to implement packet loss measurement, ensure that
the following configurations have been completed on network devices:
● NTP has been configured to implement time synchronization between devices.
● The AC and AP have been connected to iMaster NCE-CampusInsight.
Step 2 Create an iPCA 2.0 measurement flow.
# Choose Configuration > QoS > App Identification & Optimization > iPCA2.0.
# On the iPCA2.0 page, click Create.
# Create an iPCA 2.0 measurement flow.
# Click OK.
Step 3 Enable iPCA 2.0 in the VAP profile wlan-net.
# Choose Configuration > AP Config > AP Group > AP Group.
# Select an interface, click Advanced, and set iPCA 2.0 parameters as required.
# By default, ACs and APs are enabled to report iPCA 2.0 measurement
information to a WMI server. To modify the configuration, see 3.12.2 Example for
Configuring an AC and APs to Report KPI Information.
----End
Related Topics
● 3.1.1 Example for Configuring Layer 2 Direct Forwarding in Inline Mode
● 3.1.2 Example for Configuring Layer 2 Tunnel Forwarding in Inline Mode
● 3.1.3 Example for Configuring Layer 2 Direct Forwarding in Bypass Mode
● 3.1.4 Example for Configuring Layer 2 Tunnel Forwarding in Bypass Mode
● 3.1.5 Example for Configuring Layer 3 Direct Forwarding in Inline Mode
● 3.1.6 Example for Configuring Layer 3 Tunnel Forwarding in Inline Mode
● 3.1.7 Example for Configuring Layer 3 Direct Forwarding in Bypass Mode
● 3.1.8 Example for Configuring Layer 3 Tunnel Forwarding in Bypass Mode
Data Planning
Configura Data
tion Item
Configuration Roadmap
1. Configure the SAC function for application identification.
2. On the AC, configure the in-point in the VAP profile view and specify the AC's
uplink physical interface GE0/0/1 as the out-point.
3. Configure the function of periodically reporting wireless traffic measurement
information to iMaster NCE-CampusInsight.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Before configuring iPCA 2.0 to implement packet loss measurement, ensure that
the following configurations have been completed on network devices:
● NTP has been configured to implement time synchronization between devices.
● The AC and AP have been connected to iMaster NCE-CampusInsight.
Step 2 Configure SAC to identify applications.
# Choose Configuration > QoS > App Identification & Optimization > SAC >
SAC Configuration.
# Enable Loading the SAC signature database on the AC.
# Disable Loading the SAC signature database on the AP. In Loading the SAC
Signature Database for APs by AP Group, enable SAC for a specified AP group.
# Click Apply.
Step 3 Specify an application for which iPCA 2.0 measurement is performed in the VAP
profile view wlan-net.
# Choose Configuration > AP Config > AP Group > AP Group.
----End
Related Topics
● 3.1.1 Example for Configuring Layer 2 Direct Forwarding in Inline Mode
● 3.1.2 Example for Configuring Layer 2 Tunnel Forwarding in Inline Mode
● 3.1.3 Example for Configuring Layer 2 Direct Forwarding in Bypass Mode
● 3.1.4 Example for Configuring Layer 2 Tunnel Forwarding in Bypass Mode
● 3.1.5 Example for Configuring Layer 3 Direct Forwarding in Inline Mode
● 3.1.6 Example for Configuring Layer 3 Tunnel Forwarding in Inline Mode
● 3.1.7 Example for Configuring Layer 3 Direct Forwarding in Bypass Mode
● 3.1.8 Example for Configuring Layer 3 Tunnel Forwarding in Bypass Mode
Networking Requirements
● AC networking mode: Layer 2 networking in inline mode
● DHCP deployment mode: The AC functions as a DHCP server to assign IP
addresses to APs and STAs.
● Service data forwarding mode: tunnel forwarding
Figure 3-77 Networking for configuring CAC based on the number of multicast
group memberships
Data Planning
IP address 10.23.100.2-10.23.100.254/24
pool for
APs
IP address 10.23.101.3-10.23.101.254/24
pool for
STAs
Item Data
Configuration Roadmap
1. Configure basic WLAN services to ensure that users can access the WLAN.
2. Configure multicast-to-unicast conversion to convert multicast packets into
unicast packets to improve the efficiency of multicast data transmission.
3. Configure CAC based on the number of multicast group memberships to
control the access of multicast users.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on the access switch to VLAN 100. The default VLAN
of GE0/0/1 is VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname Switch
[Switch] vlan batch 100
[Switch] interface gigabitethernet 0/0/1
[Switch-GigabitEthernet0/0/1] port link-type trunk
[Switch-GigabitEthernet0/0/1] port trunk pvid vlan 100
[Switch-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[Switch-GigabitEthernet0/0/1] port-isolate enable
[Switch-GigabitEthernet0/0/1] quit
[Switch] interface gigabitethernet 0/0/2
[Switch-GigabitEthernet0/0/2] port link-type trunk
[Switch-GigabitEthernet0/0/2] port trunk allow-pass vlan 100
[Switch-GigabitEthernet0/0/2] quit
# Add GE1/0/0 on Router to VLAN 101. Create VLANIF 101 and set its IP address
to 10.23.101.2/24.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 101
[Router] interface gigabitethernet 1/0/0
[Router-GigabitEthernet1/0/0] port link-type trunk
[Router-GigabitEthernet1/0/0] port trunk allow-pass vlan 101
[Router-GigabitEthernet1/0/0] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.23.101.2 24
[Router-Vlanif101] quit
# Choose Configuration > Config Wizard > AC. The Basic AC Configuration
page is displayed.
NOTE
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List, select Interface address
pool and select VLANIF 100.
# Click OK.
NOTE
# Under Static Route Table, click Create. The Create Static Route Table
page is displayed.
# Click OK.
# Click Next.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 4 Configure WLAN services.
# Click Create. The Basic Information page is displayed.
# Set the SSID name, forwarding mode, and service VLAN.
# Click Finish.
Automatic channel and power calibration functions are enabled by default. The manual
channel and power configurations take effect only when these two functions are disabled.
# Choose Configuration > AP Config > AP Config > AP Info. The AP List
page is displayed.
# Click the ID of the AP whose channel and power need to be configured. The
AP customized settings page is displayed.
# Enter the profile name wlan-traffic in Profile name and click OK. The new
traffic profile configuration page is displayed.
# Click Apply. In the Info dialog box that is displayed, click OK.
3. The STA can associate with the WLAN and obtain an IP address
10.23.101.x/24, and its gateway address is 10.23.101.1.
4. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
Networking Requirements
● AC networking mode: Layer 2 networking in bypass mode
● DHCP deployment mode:
– The AC functions as a DHCP server to assign IP addresses to APs.
– The aggregation switch (SwitchB) functions as a DHCP server to assign IP
addresses to STAs.
● Service data forwarding mode: direct forwarding
Data Planning
Item Data
Configuration Roadmap
1. Select Config Wizard to configure the APs to go online on the AC.
2. Select Config Wizard to configure WLAN services on the AC. When
configuring the security policy, select 802.1X and RADIUS authentication, and
set the RADIUS server parameters.
3. In Profile Management, change the security policy to WPA2, and complete
the Hotspot2.0 service configuration based on the data planning.
4. Complete service verification.
Procedure
Step 1 Configure the network devices.
# Add GE0/0/1 and GE0/0/2 on SwitchA to VLAN 100 and VLAN 101, and set the
PVID of GE0/0/1 to VLAN 100.
<HUAWEI> system-view
[HUAWEI] sysname SwitchA
[SwitchA] vlan batch 100 101
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk pvid vlan 100
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[SwitchA-GigabitEthernet0/0/1] port-isolate enable
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[SwitchA-GigabitEthernet0/0/2] quit
# Add GE0/0/1 on SwitchB (aggregation switch) to VLAN 100 and VLAN 101,
GE0/0/2 to VLAN100 and GE0/0/3 to VLAN 101.
<HUAWEI> system-view
[HUAWEI] sysname SwitchB
[SwitchB] vlan batch 100 101
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] port link-type trunk
[SwitchB-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[SwitchB-GigabitEthernet0/0/1] quit
[SwitchB] interface gigabitethernet 0/0/2
[SwitchB-GigabitEthernet0/0/2] port link-type trunk
[SwitchB-GigabitEthernet0/0/2] port trunk allow-pass vlan 100
[SwitchB-GigabitEthernet0/0/2] quit
[SwitchB] interface gigabitethernet 0/0/3
[SwitchB-GigabitEthernet0/0/3] port link-type trunk
[SwitchB-GigabitEthernet0/0/3] port trunk allow-pass vlan 101
[SwitchB-GigabitEthernet0/0/3] quit
# Add GE1/0/0 on Router to VLAN 101. Create VLANIF 101 and set its IP address
to 10.23.101.2/24.
<Huawei> system-view
[Huawei] sysname Router
[Router] vlan batch 101
[Router] interface gigabitethernet 1/0/0
[Router-GigabitEthernet1/0/0] port link-type trunk
[Router-GigabitEthernet1/0/0] port trunk allow-pass vlan 101
[Router-GigabitEthernet1/0/0] quit
[Router] interface vlanif 101
[Router-Vlanif101] ip address 10.23.101.2 24
[Router-Vlanif101] quit
Step 2 Configure the DHCP servers to assign IP addresses to APs and STAs.
# On SwitchB, configure VLANIF 101 to assign IP addresses to STAs and set the
default gateway address of STAs to 10.23.101.2.
NOTE
Configure the DNS server as required. The common methods are as follows:
● In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8>
command in the VLANIF interface view.
● In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP
address pool view.
[SwitchB] dhcp enable
[SwitchB] interface vlanif 101
[SwitchB-Vlanif101] ip address 10.23.101.1 24
[SwitchB-Vlanif101] dhcp select interface
[SwitchB-Vlanif101] dhcp server gateway-list 10.23.101.2
[SwitchB-Vlanif101] quit
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List. Select Interface address
pool and select VLANIF 100.
# Click OK.
# Click Next.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 5 Configure WLAN services.
# Click Create. The Basic Information page is displayed.
# Configure the SSID name, forwarding mode, and service VLAN ID.
Automatic channel and power calibration functions are enabled by default. The manual
channel and power configurations take effect only when these two functions are disabled.
# Choose Configuration > AP Config > AP Config > AP Info. The AP List
page is displayed.
# Click the ID of the AP whose channel and power need to be configured. The
AP customized settings page is displayed.
3. Choose VAP Configuration > wlan-net > Hotspot2.0 Profile. The Hotspot2.0
profile page is displayed. Click Create. On the Create Hotspot2.0 Profile
page that is displayed, set Profile name to wlan-net and click OK. Configure
parameters and click Apply. In the dialog box that is displayed, click OK.
6. Select NAI Realm Profile. The NAI Realm Profile page is displayed. Click
Create. The Create NAI Realm Profile page is displayed. Set Profile name to
wlan-net, and click OK. Set Realm name, and click Apply. In the dialog box
that is displayed, click OK.
9. Select Carrier Name Profile. The Carrier Name Profile page is displayed.
Click Create. The Create Carrier Name Profile page is displayed. Set Profile
name to wlan-net, and click OK. Set Operator name, and click Apply. In the
dialog box that is displayed, click OK.
10. Select Venue Name Profile. The Venue Name Profile page is displayed. Click
Create. The Create Venue Name Profile page is displayed. Set Profile name
to wlan-net, and click OK. Set Venue name, and click Apply. In the dialog
box that is displayed, click OK.
11. Select Operating Class Profile. The Operating Class Profile page is
displayed. Click Create. The Create Operating Class Profile page is displayed.
Set Profile name to wlan-net, and click OK. Set Frequency band indication
No., and click Apply. In the dialog box that is displayed, click OK.
4. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
----End
Service Requirements
A supermarket wants to deploy a network to expand IoT applications while
providing the wireless network access service to display and manage commodity
prices using ESLs.
Networking Requirements
● AC networking mode: Layer 2 networking in bypass mode
● DHCP deployment mode: The AC functions as a DHCP server to assign IP
addresses to APs and STAs.
● Service data forwarding mode: direct forwarding
Data Planning
Managem VLAN100
ent VLAN
Service VLAN101
VLAN
Item Data
Interworki VLAN102
ng VLAN
of the ESL
managem
ent system
and ESLs
AC's VLANIF100
source
interface
Item Data
Configuration Roadmap
1. Configure network interworking of the AC, AP, and switch.
2. Configure the AP to go online.
3. Configure WLAN service parameters.
4. Configure interworking between the ERP system and ESL management
system.
5. Configure interworking between the ESL management system and ESLs.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure the network devices.
# Configure the access switch. Add GE0/0/1 and GE0/0/2 to VLAN 100
(management VLAN) and VLAN 101 (service VLAN).
<HUAWEI> system-view
[HUAWEI] sysname Switch
[Switch] vlan batch 100 101
[Switch] interface gigabitethernet 0/0/1
[Switch-GigabitEthernet0/0/1] port link-type trunk
[Switch-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[Switch-GigabitEthernet0/0/1] quit
[Switch] interface gigabitethernet 0/0/2
[Switch-GigabitEthernet0/0/2] port link-type trunk
[Switch-GigabitEthernet0/0/2] port trunk pvid vlan 100
[Switch-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[Switch-GigabitEthernet0/0/2] quit
# Choose Configuration > Config Wizard > AC. The Basic AC Configuration
page is displayed.
NOTE
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List. Select Interface address
pool and select VLANIF 100.
# Click OK.
# Set the IP address of VLANIF 101 to 10.23.101.1/24 and configure the
interface address pool on VLANIF 101 in the same way.
NOTE
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 4 Configure WLAN services.
# Click Create. The Basic Information page is displayed.
# Configure the SSID name, forwarding mode, and service VLAN.
# Click Finish.
# Choose Configuration > AP Config > AP Group. In the AP group list, click ap-
group1. Choose Radio Management > Radio 0 > 2G Radio Profile. Click Create
to create a 2G radio profile named wlan-radio2g.
# Enable the scheduled radio disabling function and set the time range in which
radio 0 is to be automatically disabled. Click Apply.
Step 5 Configure interworking between the ERP system and ESL management system.
The detailed operations are not described here.
Step 6 Configure Layer 2 interworking between ESL cards and the ESL management
system.
1. Configure Switch.
# Add GE0/0/3 on the switch connected to the ESL management system to
VLAN 102.
[Switch] vlan batch 102
[Switch] interface gigabitethernet 0/0/3
[Switch-GigabitEthernet0/0/3] port link-type trunk
[Switch-GigabitEthernet0/0/3] port trunk pvid vlan 102
[Switch-GigabitEthernet0/0/3] port trunk allow-pass vlan 102
[Switch-GigabitEthernet0/0/3] quit
# Select Display all profiles and choose IoT > Card 1 > AP Wired Port
Profile. The AP Wired Port Profile page is displayed.
# Click Create to create an AP wired port profile named wired2. Click OK.
# Click Advanced Configuration. Set Port PVID to 102, add the port to VLAN
102 in untagged mode, set Port mode to Endpoint, and click Apply.
Step 7 Initialize the ESL card, register ESLs, associate ESL IDs with commodity codes, and
configure ESL services. For detailed operations, see the operation guides provided
by vendors, which are not described here.
Step 8 Verify the configuration.
1. Choose Monitoring > SSID > VAP. In VAP List, check VAP status. You can see
that the status of the VAP in wlan-net is normal.
2. The WLAN with the SSID wlan-net is available.
3. The STA can associate with the WLAN and obtain an IP address
10.23.101.x/24, and its gateway address is 10.23.101.1.
4. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
----End
Service Requirements
A hospital wants to deploy a network to expand IoT applications while providing
the wireless network access service to prevent infant abductions.
Networking Requirements
● AC networking mode: Layer 2 networking in bypass mode
● DHCP deployment mode: The AC functions as a DHCP server to assign IP
addresses to STAs.
● Service data forwarding mode: direct forwarding
Figure 3-80 Networking diagram for configuring the Healthcare IoT Solution
Data Planning
Managem VLAN100
ent VLAN
Service VLAN101
VLAN
AC's VLANIF100
source
interface
Item Data
Configuration Roadmap
1. Configure network interworking of the APs, switch, AC, and host computer
(on which the infant protection system is deployed).
2. Configure the AC as a DHCP server to assign IP addresses to STAs.
3. Configure the APs to go online and configure WLAN services.
4. Configure parameters for the APs to communicate with RFID cards.
5. Configure parameters for the APs to communicate with the host computer.
6. Add the APs' IP addresses to the host computer and configure the same
shared key as that on the APs.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure the network devices.
# Configure the access switch. Add GE0/0/1 through GE0/0/3 to VLAN 100
(management VLAN) and VLAN 101 (service VLANs).
<HUAWEI> system-view
[HUAWEI] sysname Switch
[Switch] vlan batch 100 101
[Switch] interface gigabitethernet 0/0/1
[Switch-GigabitEthernet0/0/1] port link-type trunk
[Switch-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[Switch-GigabitEthernet0/0/1] quit
[Switch] interface gigabitethernet 0/0/2
[Switch-GigabitEthernet0/0/2] port link-type trunk
[Switch-GigabitEthernet0/0/2] port trunk pvid vlan 100
[Switch-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101
[Switch-GigabitEthernet0/0/2] quit
[Switch] interface gigabitethernet 0/0/3
[Switch-GigabitEthernet0/0/3] port link-type trunk
[Switch-GigabitEthernet0/0/3] port trunk pvid vlan 100
[Switch-GigabitEthernet0/0/3] port trunk allow-pass vlan 100 101
[Switch-GigabitEthernet0/0/3] quit
# Add GE0/0/4 on the switch connected to the host computer to VLAN 100 and
VLAN 101.
[Switch] interface gigabitethernet 0/0/4
[Switch-GigabitEthernet0/0/4] port link-type trunk
[Switch-GigabitEthernet0/0/4] port trunk pvid vlan 100
[Switch-GigabitEthernet0/0/4] port trunk allow-pass vlan 100 101
[Switch-GigabitEthernet0/0/4] quit
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List. Select Interface address
pool and select VLANIF 100.
# Click OK.
# Set the IP address of VLANIF 101 to 10.23.101.1/24 and configure the
interface address pool on VLANIF 101 in the same way.
NOTE
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 4 Configure WLAN services.
# Click Create. The Basic Information page is displayed.
# Configure the SSID name, forwarding mode, and service VLAN.
# Click Finish.
# Choose Configuration > AP Config > AP Group. In the AP group list, click ap-
group1 and select Display all profiles. Choose IoT > Card1 > IoT Profile. Click
Create to create an IoT profile named wlan-iot.
# Click OK. The IoT profile configuration page is displayed. Set parameters as
follows:
● Protocol: UDP
● Port number: 50200
● Communication key: aabb0011@11
● IP address of a trusted host computer: 10.23.102.253
● Mask of a trusted host computer: 255.255.255.0
● Host Computer Address: 10.23.100.254
● Host Computer Port Number: 3000
# Click Apply.
Step 5 Configure static IP addresses for APs.
# Choose Configuration > AP Config > AP Config. Select an AP and click Modify.
The AP modification page is displayed.
# Set AC IP address list to 10.23.100.1, IP Obtaining Mode to Static, IP Address
to 10.23.100.2, Mask to 255.255.255.0, and Gateway to 10.23.100.1.
Step 6 Add the AP's IP address to the host computer and configure the same shared key
as that on the AP.
Step 7 Configure exit monitors to connect to the network in wired mode and interwork
with the infant protection system. The detailed operations are not described here.
Step 8 Use the infant protection function according to operation methods of the infant
protection system. For details, see the operation guides provided by vendors.
Step 9 Verify the configuration.
1. Choose Monitoring > SSID > VAP. In VAP List, check VAP status. You can see
that the status of the VAP in wlan-net is normal.
2. The WLAN with the SSID wlan-net is available.
3. The STA can associate with the WLAN and obtain an IP address
10.23.101.x/24, and its gateway address is 10.23.101.1.
4. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
----End
Service Requirements
A school pays much attention to health and safety of its students, and desires to
use technical methods to monitor and query students' health and safety
information.
To meet these requirements, Huawei provides the Student Health and Safety IoT
Solution that reuses the existing WLAN.
Networking Requirements
● AC networking mode: Layer 2 in bypass mode
● DHCP deployment mode: Configure an AC as a DHCP server to assign IP
addresses to APs and STAs.
● Service data forwarding mode: direct forwarding
Figure 3-81 Networking for configuring the Student Health and Safety IoT
Solution
Data Planning
Managem VLAN100
ent VLAN
Service VLAN101
VLAN
AC's VLANIF100
source
interface
Item Data
Configuration Roadmap
1. Configure network interworking of the APs, switch, AC, and host computer.
2. Configure the AC as a DHCP server to assign IP addresses to APs and STAs.
3. Configure the APs to go online.
4. Configure WLAN services.
5. Configure communication parameters between the APs and host computer.
6. Add IP addresses of the APs to the host computer and configure the same
shared key as that on the APs.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure the network devices.
# Configure the access switch. Add GE0/0/1 through GE0/0/4 to VLAN 100
(management VLAN) and VLAN 101 (service VLANs).
<HUAWEI> system-view
[HUAWEI] sysname Switch
[Switch] vlan batch 100 to 101
[Switch] interface gigabitethernet 0/0/1
[Switch-GigabitEthernet0/0/1] port link-type trunk
[Switch-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 101
[Switch-GigabitEthernet0/0/1] quit
[Switch] interface gigabitethernet 0/0/2
[Switch-GigabitEthernet0/0/2] port link-type trunk
[Switch-GigabitEthernet0/0/2] port trunk pvid vlan 100
[Switch-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 to 101
[Switch-GigabitEthernet0/0/2] quit
[Switch] interface gigabitethernet 0/0/3
[Switch-GigabitEthernet0/0/3] port link-type trunk
[Switch-GigabitEthernet0/0/3] port trunk pvid vlan 100
[Switch-GigabitEthernet0/0/3] port trunk allow-pass vlan 100 to 101
[Switch-GigabitEthernet0/0/3] quit
# Choose Configuration > Config Wizard > AC. The Basic AC Configuration
page is displayed.
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List. Select Interface address
pool and select VLANIF 100.
# Click OK.
# Set the IP address of VLANIF 101 to 10.23.101.1/24 and configure the
interface address pool on VLANIF 101 in the same way.
NOTE
# Click Next.
# Click Next. The AC Source Address page is displayed.
4. Configure the source address for AC.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
NOTE
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# Click Next. The Group APs page is displayed.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Confirm the configuration and click Continue With Wireless Service
Configuration.
Step 4 Configure WLAN services.
# Click Create. The Basic Information page is displayed.
# Configure the SSID name, forwarding mode, and service VLAN.
# Click Finish.
# Choose Configuration > AP Config > AP Group. In the AP group list, click ap-
group1 and select Display all profiles. Choose IoT > Card1 > IoT Profile. Click
Create to create an IoT profile named wlan-iot.
# Click OK. The IoT profile configuration page is displayed.
# Set parameters as follows:
● Protocol: TCP
● Port number: 50200
● Communication key: aabb0011@11
● IP address of a trusted host computer: 10.23.102.253
● Mask of a trusted host computer: 255.255.255.0
● Host Computer Address: 10.23.200.1
● Host Computer Port Number: 3000
# Click Apply.
Step 5 Configure network interworking between the APs and server.
Configure routes based on the actual networking situation to ensure network
interworking between the APs and host computer.
Step 6 Add IP addresses of the APs to the host computer and configure the same shared
key as that on the APs.
Step 7 Verify the configuration.
1. Choose Monitoring > SSID > VAP. In VAP List, check VAP status. You can see
that the status of the VAP in wlan-net is normal.
2. The WLAN with the SSID wlan-net is available.
3. The STA can associate with the WLAN and obtain an IP address
10.23.101.x/24, and its gateway address is 10.23.101.1.
4. Choose Monitoring > User > User List. All online users are displayed in User
List. You can use the filtering function to filter the display results. For
example, click next to SSID. Set the filtering condition, enter wlan-net,
and click OK. Users connected to the SSID wlan-net are displayed. Multi-
column filtering is supported to accurately query online users.
----End
Service Requirements
To improve sales and increase profits, a shopping mall wants to promote
consumption by pushing customized advertisements to customers.
To meet these requirements, Huawei provides the hotspot service and customer
flow analysis solution. This solution provides secure and easy Wi-Fi access for
customers and improves user experience. Additionally, the shopping mall can
analyze data to find shops that customers are interested in and then push
customized advertisements to their mobile phones, promoting consumption.
Networking Requirements
● AC networking mode: Layer 2 in bypass mode
● DHCP deployment mode: Configure an AC as a DHCP server to assign IP
addresses to APs and STAs.
● Service data forwarding mode: direct forwarding
Figure 3-82 Network for configuring the hotspot service and customer flow
analysis
Data Planning
Managem VLAN100
ent VLAN
Item Data
Configuration Roadmap
1. Configure the AC to communicate with servers.
2. Configure the AC as a DHCP server to assign IP addresses to APs and STAs.
3. Configure the APs to go online.
4. Configure Portal authentication.
5. Configure WLAN services.
6. Configure communication parameters between APs and the host computer.
7. Configure APs' IP addresses on the host computer.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure the AC to communicate with servers.
Configure routes based on the actual networking to ensure network interworking
between the AC and servers.
Step 2 Configure the network devices.
# Configure the access switch. Add GE0/0/1 through GE0/0/4 to VLAN 100 and
VLAN 101.
<HUAWEI> system-view
[HUAWEI] sysname Switch
[Switch] vlan batch 100 to 101
[Switch] interface gigabitethernet 0/0/1
[Switch-GigabitEthernet0/0/1] port link-type trunk
[Switch-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 101
[Switch-GigabitEthernet0/0/1] quit
[Switch] interface gigabitethernet 0/0/2
[Switch-GigabitEthernet0/0/2] port link-type trunk
[Switch-GigabitEthernet0/0/2] port trunk pvid vlan 100
[Switch-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 to 101
[Switch-GigabitEthernet0/0/2] quit
[Switch] interface gigabitethernet 0/0/3
[Switch-GigabitEthernet0/0/3] port link-type trunk
[Switch-GigabitEthernet0/0/3] port trunk pvid vlan 100
[Switch-GigabitEthernet0/0/3] port trunk allow-pass vlan 100 to 101
[Switch-GigabitEthernet0/0/3] quit
[Switch] interface gigabitethernet 0/0/4
[Switch-GigabitEthernet0/0/4] port link-type trunk
[Switch-GigabitEthernet0/0/4] port trunk pvid vlan 100
[Switch-GigabitEthernet0/0/4] port trunk allow-pass vlan 100 to 101
[Switch-GigabitEthernet0/0/4] quit
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List. Select Interface address
pool and select VLANIF 100.
# Click OK.
NOTE
# Click Next.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
NOTE
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Click Finish.
# Choose Configuration > Security > AAA > Portal Server Global
Configuration > External Portal. The External Portal page is displayed.
# Click wlan-net under Portal Authentication Server List. Set Protocol type
to HTTP/HTTPS, and deselect all parameter settings under URL Option
Settings. Click OK.
# Choose Configuration > AP Config > AP Group. In the AP group list, click
ap-group1. Then, choose VAP Configuration > wlan-net > Authentication
Profile > External Portal Authentication. The Portal configuration page is
displayed.
# Set Interoperation protocol to HTTP and Primary Portal server group to
wlan-net.
# Click Set next to External Portal server global parameters. Select HTTP
protocol, set SSL policy to huawei, and click OK.
# Click Apply.
2. Configure an accounting scheme.
# Choose VAP Configuration > wlan-net > Authentication Profile >
RADIUS server. The RADIUS server configuration page is displayed.
# Enable Real-time accounting and click Apply.
# Click OK.
# Select authentication-free rule 1 and click Apply. In the dialog box that is
displayed, click OK.
Step 7 Configure the air scan function.
# Choose Configuration > AP Config > AP Group. In the AP group list, click ap-
group1. Then, choose Radio Management > Radio 0 > 2G Radio Profile. The 2G
Radio Profile page is displayed.
# Click Create to create a 2G radio profile named wlan-radio-2g. Click OK.
# Click Apply.
# Expand 2G Radio Profile. Click Air Scan Profile. The Air Scan Profile page is
displayed.
# Click Create to create an air scan profile named wlan-air-scan. Click OK.
# Set Probe channel set to Country code channels and click Apply.
# Create a 5G radio profile named wlan-radio-5g in the same way, and bind the
air scan profile wlan-air-scan to this 5G radio profile.
Step 8 Configure the Wi-Fi terminal location function.
# Select Display all profiles. Choose WLAN Location > WLAN Location Profile.
Click Create to create a location profile named wlan-location.
# Click OK. The location profile configuration page is displayed.
# Enable STA location, and set Data report mode to Through AC, Server
connection to IP, the IP address to 10.23.201.1/32180, and AC port number to
10001. Click Apply.
Step 9 Add IP addresses of the APs to the host computer and configure the same shared
key as that on the APs.
Step 10 Verify the configuration.
STAs can search for the WLAN with the SSID wlan-net and connect to the WLAN
through Portal authentication.
----End
Service Requirements
In a shopping mall with large areas and complex environment, it is difficult for
customers to find parked cars and shops. To help customers to easily find shops or
parked cars, improve customer satisfaction, and promote customers' buying
intention, the shopping mall expects to provide navigation services.
To meet these requirements of the shopping mall, Huawei provides the indoor
navigation solution. This solution provides customers with easy and secure Wi-Fi
network access and improves customers' network experience. Additionally, an
indoor navigation app is provided for customers to find shops or parked cars,
improving customer satisfaction.
Networking Requirements
● AC networking mode: Layer 2 in bypass mode
● DHCP deployment mode: Configure an AC as the DHCP server to assign IP
addresses to APs and STAs.
Data Planning
Managem VLAN100
ent VLAN
Service VLAN101
VLAN
AC's VLANIF100
source
interface
Item Data
Configuration Roadmap
1. Configure network interworking between the AC and location server, and
between the location server and app server.
2. Configure the AC as a DHCP server to assign IP addresses to APs and STAs.
3. Configure the APs to go online.
4. Configure WLAN services.
5. Configure the Bluetooth terminal location function.
6. Configure the location server.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure network interworking between the AC and location server, and between
the location server and app server.
Configure routes based on the actual networking to ensure network interworking.
Step 2 Configure the network devices.
# Configure the access switch. Add GE0/0/1 through GE0/0/4 to VLAN 100 and
VLAN 101.
<HUAWEI> system-view
[HUAWEI] sysname Switch
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List. Select Interface address
pool and select VLANIF 100.
# Click OK.
NOTE
# Click Next.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
NOTE
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Click Finish.
# Choose Configuration > AP Config > AP Group. In the AP group list, click ap-
group1 and select Display all profiles. Choose Bluetooth Service > BLE Profile.
Click Create to create a BLE profile named wlan-ble.
# Choose Configuration > Other Services > BLE. Click Create and add MAC
addresses of BLE base stations within the AP's coverage area to the monitoring
list.
navigation app and obtaining location information from the app server, you can
use the car seeking and shop seeking functions.
----End
Service Requirements
A shopping mall often suffers from asset losses or fails to find assets. To reduce
property loss and facilitate asset management, the shopping mall wants to
monitor the locations and moving paths of assets.
To meet these requirements, Huawei offers the personnel and asset management
IoT solution.
Networking Requirements
● AC networking mode: Layer 2 in bypass mode
● DHCP deployment mode: Configure an AC as a DHCP server to assign IP
addresses to APs and STAs.
● Service data forwarding mode: direct forwarding
Figure 3-84 Network for configuring the personnel and asset management
solution
Data Planning
Managem VLAN100
ent VLAN
Service VLAN101
VLAN
AC's VLANIF100
source
interface
Configuration Roadmap
1. Configure the AC to communicate with the location server.
2. Configure the AC as a DHCP server to assign IP addresses to APs and STAs.
3. Configure the APs to go online.
4. Configure WLAN services.
5. Configure the Bluetooth tag location function.
6. Configure the location server.
Configuration Notes
● No ACK mechanism is provided for multicast packet transmission on air
interfaces. In addition, wireless links are unstable. To ensure stable
transmission of multicast packets, they are usually sent at low rates. If a large
number of such multicast packets are sent from the network side, the air
interfaces may be congested. You are advised to configure multicast packet
suppression to reduce impact of a large number of low-rate multicast packets
on the wireless network. Exercise caution when configuring the rate limit;
otherwise, the multicast services may be affected.
– In direct forwarding mode, you are advised to configure multicast packet
suppression on switch interfaces connected to APs.
– In tunnel forwarding mode, you are advised to configure multicast packet
suppression in traffic profiles of the AC.
For details on how to configure traffic suppression, see How Do I Configure
Multicast Packet Suppression to Reduce Impact of a Large Number of
Low-Rate Multicast Packets on the Wireless Network?.
● Configure port isolation on the interfaces of the device directly connected to
APs. If port isolation is not configured and direct forwarding is used, a large
number of unnecessary broadcast packets may be generated in the VLAN,
blocking the network and degrading user experience.
● In tunnel forwarding mode, the management VLAN and service VLAN cannot
be the same. Only packets from the management VLAN are transmitted
between the AC and APs. Packets from the service VLAN are not allowed
between the AC and APs.
● From V200R021C00, when the CAPWAP source interface or source address is
configured, the system checks whether security-related configurations exist,
including the PSK for DTLS encryption, PSK for DTLS encryption between ACs,
user name and password for logging in to the AP, and password for logging in
to the global offline management VAP, the configuration can be successful
only when both of them exist. Otherwise, the system prompts you to
complete the configuration first.
● From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels
on the AC by default. After this function is enabled, an AP will fail to go
online when it is added. In this case, you need to enable CAPWAP DTLS non-
authentication (capwap dtls no-auth enable) for the AP so that the AP can
obtain a security credential. After the AP goes online, disable this function
(undo capwap dtls no-auth enable) to prevent unauthorized APs from going
online.
Procedure
Step 1 Configure the AC to communicate with the location server.
Configure routes based on the actual networking to ensure network interworking
between the AC and location server.
Step 2 Configure the network devices.
# Configure the access switch. Add GE0/0/1 through GE0/0/4 to VLAN 100 and
VLAN 101.
<HUAWEI> system-view
[HUAWEI] sysname Switch
[Switch] vlan batch 100 to 101
[Switch] interface gigabitethernet 0/0/1
[Switch-GigabitEthernet0/0/1] port link-type trunk
[Switch-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 101
[Switch-GigabitEthernet0/0/1] quit
[Switch] interface gigabitethernet 0/0/2
[Switch-GigabitEthernet0/0/2] port link-type trunk
[Switch-GigabitEthernet0/0/2] port trunk pvid vlan 100
[Switch-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 to 101
[Switch-GigabitEthernet0/0/2] quit
[Switch] interface gigabitethernet 0/0/3
[Switch-GigabitEthernet0/0/3] port link-type trunk
[Switch-GigabitEthernet0/0/3] port trunk pvid vlan 100
[Switch-GigabitEthernet0/0/3] port trunk allow-pass vlan 100 to 101
[Switch-GigabitEthernet0/0/3] quit
[Switch] interface gigabitethernet 0/0/4
[Switch-GigabitEthernet0/0/4] port link-type trunk
[Switch-GigabitEthernet0/0/4] port trunk pvid vlan 100
[Switch-GigabitEthernet0/0/4] port trunk allow-pass vlan 100 to 101
[Switch-GigabitEthernet0/0/4] quit
If the AC and APs are directly connected, set the default VLAN of the interfaces connected
to the APs to management VLAN 100.
# Click Create under DHCPv4 Address Pool List. Select Interface address
pool and select VLANIF 100.
# Click OK.
NOTE
# Click Next.
# Set AC source address to VLANIF, click the selection icon, select Vlanif100
in the dialog box that is displayed, and click the + icon to add the selected
VLANIF interface to the list.
NOTE
From V200R021C00, you need to configure CAPWAP security parameters, including the
PSK for DTLS encryption, PSK for DTLS encryption of inter-WAC tunnels, user name
and password for logging in to an AP, and password for logging in to the global offline
management VAP.
From V200R021C00, DTLS encryption for CAPWAP control tunnels is enabled by
default, and APs of earlier versions may fail to access the network. In this case, you
can set AC-AP DTLS authentication mode to None authentication to allow APs to
go online first. After the subsequent configurations are complete and the APs go
online normally, disable this function. Specifically, choose Configuration > AC Config
> Basic Config > AC Configuration > Advanced > CAPWAP Tunnel Setup
Configuration, and deselect Allow APs to perform DTLS session with the AC in
non-authentication mode.
NOTE
– If you set AP authentication mode to MAC address authentication, the AP's MAC
address is mandatory and the AP's SN is optional.
– If you set AP authentication mode to SN authentication, the AP's SN is mandatory
and the AP's MAC address is optional.
You are advised to export the radio ID, AP channel, frequency bandwidth, and power
planned on WLAN Planner to a .csv file, and then enter them in the AP template file. Set
the longitude and latitude as required.
# Click next to Import AP File, select the AP template file, and click
Import.
# On the page that displays the template import result, click OK.
# AP group information has been added in the AP template file. Click Next.
The Confirm Configurations page is displayed.
2. Confirm the configuration.
# Click Finish.
# Choose Configuration > AP Config > AP Group. In the AP group list, click ap-
group1 and select Display all profiles. Choose Bluetooth Service > BLE Profile.
Click Create to create a BLE profile named wlan-ble.
# Choose Configuration > Other Services > BLE. Click Create and add MAC
addresses of BLE base stations within the AP's coverage area to the monitoring
list.
STAs can search for the WLAN with the SSID wlan-net and connect to the WLAN
after passing authentication. Location information about personnel and assets can
be queried on the location server.
----End
Networking Requirements
As shown in Figure 3-85, the AC is connected to the aggregation switch in bypass
mode. To test connectivity between the AP and Router, configure AP loopback.
Data Preparation
Item Data
Item Data
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure wireless services on the AP. For details, see Example for
Configuring Layer 2 Tunnel Forwarding in Bypass Mode.
2. Configure AP loopback parameters and start the AP loopback test.
Procedure
Step 1 Configure a route to the AP on the Router.
Step 2 Choose Diagnosis > AP-Ping. The AP-Ping page is displayed.
Step 3 Configure AP ping parameters. After the configuration is complete, click Start to
start the AP loopback test.
----End
Service Requirements
In the cloud managed AC + Fit AP networking, KPI information of an AC and APs
is reported to iMaster NCE-Campus and CampusInsight through the WMI report
mechanism.
Networking Requirements
Some models of APs directly report KPI information, while other models of APs
transparently report KPI information through an AC. Figure 3-86 and Figure 3-87
show the two KPI information report modes.
Data Planning
Item Data
AP group ap-group1
AP system default
profile
Configuration Roadmap
1. Configure basic WLAN services so that APs can go online.
2. Configure parameters for interconnecting the AC with the WMI server.
3. Configure parameters for interconnecting APs with the WMI server using the
WMI profile and bind WMI profile to the AP group using the AP system
profile.
Configuration Notes
● KPI information to be reported by an AP depends on the AP model. For
details, see Licensing Requirements and Limitations for KPI Information
Report in CLI-based Configuration Guide.
– For an AP that directly reports KPI information, if KPI information of the
AC does not need to be reported, you can omit the step of configuring
parameters for interconnecting the AC with the WMI server.
– For an AP that transparently reports KPI information through an AC, you
must configure parameters for interconnecting the AC with the WMI
server.
● If the KPI information needs to be reported to only one WMI server, do not
configure multiple information report channels to avoid resource waste of the
target server.
● To ensure that KPI information can be successfully reported, pre-configure
network connectivity to make the AC and APs properly communicate with the
WMI server.
Procedure
Step 1 Configure basic WLAN services to make APs go online. The AP group name is ap-
group1.
Step 2 Configure parameters for interconnecting the AC with the WMI server.
1. Configure parameters for interconnecting the AC with iMaster NCE-Campus.
Choose Maintenance > AC Maintenance > WMI from the main menu on the
AC web platform, configure parameters for interconnecting the AC with
iMaster NCE-Campus on the Channel 1 tab page, and click Apply.
Typically, the port number of iMaster NCE-Campus is 10032.
Choose Maintenance > AC Maintenance > WMI from the main menu on the
AC web platform, configure parameters for interconnecting the AC with
CampusInsight on the Channel 2 tab page, and click Apply.
Step 3 Configure parameters for interconnecting APs with the WMI server.
1. Configure parameters for interconnecting APs with iMaster NCE-Campus.
# Choose Configuration > AP Config > AP Group from the main menu on
the AC web platform, and click ap-group1 on the AP Group tab page.
# Choose AP > AP System Profile > WMI Profile (Channel 1) and click
Create to create the WMI profile cloudmng.
# Choose Configuration > AP Config > AP Group from the main menu on
the AC web platform, and click ap-group1 on the AP Group tab page.
# Choose AP > AP System Profile > WMI Profile (Channel 2) and click
Create to create the WMI profile campusinsight.
----End
Context
Huawei devices support automatic download and self-service upgrade to help you
learn about the mainstream versions of the devices and quickly perform device
upgrade and repair. After enabling the smart upgrade function on the web
platform of devices, you hereby authorize Huawei Technologies Co., Ltd. to
exchange information with your devices through the Huawei Online Upgrade
Platform (s.houp.huawei.com) to collect information such as device models, basic
software versions and patches, and device ESNs. The information will be used to
match the versions or patches that can be upgraded and return the information
such as the upgrade versions or patches and the download URLs of software
packages to your devices. After you confirm the upgrade, the devices will
automatically download the software packages and implement an upgrade. When
the upgrade is completed, the upgrade result will be uploaded to Huawei online
upgrade platform. You are advised to enter your email and phone number for
emergency contact upon any upgrade error. We will contact you if necessary so
that your network services can work properly after the upgrade.
Prerequisites
An AC is able to access the Huawei Online Upgrade Platform (s.houp.huawei.com).
A DNS server has been configured to resolve the IP address corresponding to
HOUP's domain name.
Precautions
On the smart upgrade page, you can check the connectivity between the AC and
HOUP and obtain the recommended version. If the AC cannot connect to the
HOUP, perform the following operations:
● If a DNS server has been deployed on the intranet, add the DNS server IP
address to the AC's DNS configuration. If no DNS server is deployed on the
intranet, add the IP address of the public DNS server (for example,
114.114.114.114) to the AC's DNS configuration.
● If a security device such as a firewall exists on the network, ensure that the
existing security policy allows the AC to access the HOUP and can download
files.
Procedure
The following example describes how to perform an intelligent upgrade of an
AC6800V.
Step 1 Log in to the web platform and access the Intelligent Upgrade page.
Step 2 After Automatic version upgrade check is enabled, the recommended target
software versions are displayed. Click Immediate Upgrade or Scheduled Upgrade
to perform an upgrade.
----End
Other Functions
Upgrade by segment is supported from V200R020C10. During an upgrade by
segment, the device automatically downloads all the pushed software packages to
the AC (requiring the AC to have sufficient storage memory), and specifies the
startup software package. Then you need to manually restart APs on the AP
Upgrade page. After all the APs are restarted, manually restart the AC on the AC
Maintenance > AC Restart page.