Uploaded by Paing Khant

HCIP-WLAN Lab Guide: Wireless Network Certification Training

advertisement
HUAWEI WLAN Certification Training
HCIP-WLAN
Lab Guide
ISSUE: 2.0
HUAWEI TECHNOLOGIES CO., LTD
1
Copyright © HUAWEI Technologies Co., Ltd. 2025. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any
means without prior written consent of HUAWEI Technologies Co., Ltd.
Trademarks and Permissions
and other HUAWEI trademarks are trademarks of HUAWEI Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of
their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made
between HUAWEI and the customer. All or part of the products, services and features
described in this document may not be within the purchase scope or the usage scope.
Unless otherwise specified in the contract, all statements, information, and
recommendations in this document are provided "AS IS" without warranties,
guarantees or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has
been made in the preparation of this document to ensure accuracy of the contents, but
all statements, information, and recommendations in this document do not constitute
a warranty of any kind, express or implied.
HUAWEI Technologies Co., Ltd.
Address:
HUAWEI Industrial Base Bantian, Longgang Shenzhen 518129 People's
Republic of China
Website:
https://e.huawei.com
HUAWEI Proprietary and Confidential
Copyright © HUAWEI Technologies Co.,Ltd
HCIP-WLAN V2.0 Lab Guide
Page 1
HUAWEI Certification System
Huawei Certification is an integral part of the company's Platform + Ecosystem
strategy. It supports the development of ICT infrastructure that features Cloud-PipeDevice synergy. Our certification is always evolving to reflect the latest trends in ICT
development. Huawei Certification consists of three categories: ICT Infrastructure
Certification, Basic Software & Hardware Certification, and Cloud Platform & Services
Certification, making it the most extensive technical certification program in the
industry.
HUAWEI offers three levels of certification: HUAWEI Certified ICT Associate (HCIA),
HUAWEI Certified ICT Professional (HCIP), and HUAWEI Certified ICT Expert (HCIE).
HUAWEI Certification covers all ICT fields and adapts to the industry trend of ICT
convergence. With its leading talent development system and certification standards, it
is committed to fostering new ICT talent in the digital era, and building a sound ICT
talent ecosystem.
HCIP-WLAN (HUAWEI Certified ICT Professional-Wireless Local Area Network,
HUAWEI Certified Senior Network Communications Engineer WLAN direction) is
intended for frontline engineers of HUAWEI local offices and representative offices, and
other technical personnel who want to learn about HUAWEI WLAN products. The HCIPWLAN certification covers HUAWEI WLAN networking architecture, WLAN roaming,
radio resource management, access authentication, WLAN network planning, WLAN
network optimization, and troubleshooting.
HUAWEI certification helps you open the window of the industry, open the door to
change, and stand on the top of the tide in the WLAN network world.
HCIP-WLAN V2.0 Lab Guide
Page 2
HCIP-WLAN V2.0 Lab Guide
Page 3
About This Document
Overview
This document is applicable to the candidates who are preparing for the HCIA-WLAN
exam and the readers who want to understand the WLAN networking architecture,
WLAN roaming, RRM, access authentication, WLAN planning and optimization, and
WLAN fault troubleshooting.
Description
This lab guide consists of 12 labs, covering basic configurations, and configurations and
implementation of WLAN networking, reliability, cloud management, access
authentication, roaming, network planning, O&M, and troubleshooting.
⚫
Lab 1: WAC + Fit AP networking. Through basic operations and configurations, this
lab helps readers further understand the WAC + Fit AP networking and understand
basic AP onboarding configurations.
⚫
Lab 2: Leader AP networking. Through basic networking configurations, this lab helps
readers further understand the WAC + Fit AP networking and understand basic AP
onboarding configurations.
⚫
Lab 3: VRRP HSB. This lab focuses on the VRRP HSB networking in the WAC
reliability networking, helping you understand the WLAN reliability networking
architecture and construction method.
⚫
Lab 4: Cloud management networking. This lab helps you get familiar with the
architecture of HUAWEI cloud management solution and master the methods of
managing WACs and APs on the cloud management platform.
⚫
Lab 5: 802.1X authentication. This lab describes 802.1X authentication security
features and instructs you to deploy 802.1X authentication.
⚫
Lab 6: Portal authentication. This lab describes Portal authentication security features
and instructs you to deploy Portal authentication.
⚫
Lab 7: WLAN roaming. This lab focuses on inter-WAC Layer 3 roaming and its
deployment, helping you get familiar with the WLAN roaming solutions.
⚫
Lab 8: radio resource management. This lab focuses on WLAN radio calibration, band
steering, load balancing, and user CAC, helping you get familiar with network
optimization methods and implementation methods.
⚫
Lab 9: Indoor WLAN planning. This lab provides instructions on designing an indoor
WLAN so that you can understand how to use the network planning tool and learn
network planning details.
⚫
Lab 10: Outdoor WLAN planning. This lab provides instructions on designing an
outdoor WLAN so that you can understand how to use the network planning tool
and learn network planning details.
HCIP-WLAN V2.0 Lab Guide
Page 4
⚫
Lab 11: CampusInsight intelligent O&M. This lab uses CampusInsight to perform
O&M management, helping you get familiar with CampusInsight functions.
⚫
Lab 12: Comprehensive troubleshooting. This lab focuses on troubleshooting faults in
Portal authentication scenarios, helping you rectify faults on a WLAN.
Background Knowledge Required
This course is for HUAWEI Certification HCIP training course. To fully understand this
course, you need to:
⚫
Have a good grasp of advanced WLAN knowledge and basic datacom knowledge.
⚫
Be familiar with HUAWEI software and hardware configurations, including switches,
WACs, APs, iMaster NCE-Campus, and iMaster NCE-CampusInsight.
⚫
Be familiar with the WLAN project planning process and understand the basic usage
of the network planning tool WLAN Planner.
Common Icons
Lab Environment Description
Networking Description
This lab environment is prepared for WLAN engineers who are preparing for the HCIPWLAN exam. Each lab environment consists of three WACs, five APs, one core switch, one
access switch, one iMaster NCE-Campus server, and one iMaster NCE-CampusInsight
server. Each set of lab environment is applicable to one trainee at a time.
HCIP-WLAN V2.0 Lab Guide
Page 5
Device Introduction
To meet the HCIP-WLAN lab requirements, it is recommended that each lab environment
adopt the following configurations.
The following table lists the devices, models, and versions.
Device Name
Device Model
Software Version
Core switch
CloudEngine S5732-H24UM2CC
V200R022C00SPC500
Access switch
CloudEngine S5732-H24UM2CC
V200R022C00SPC500
WAC
AirEngine 9700-M1
V200R022C00SPC100
AP
AirEngine8760-X1-PRO
V200R022C00SPC100
iMaster NCE-CampusInsight
V100R022C00SPC1b0
iMaster NCE-Campus
V300R022C00SPC201
Server
Note: To ensure that devices can be purchased properly, the AP model in the device list
may be different from that provided in the lab. This does not affect the lab operation.
The AP model displayed when the AP goes online is different. Trainees can perform the
lab normally.
Lab Environment Preparation
Checking Devices
Before carrying out labs, make sure that all required devices are ready and allow for
proper logins. The following table lists the devices.
Device Name
Quantity
Remarks
iMaster NCE-Campus
1
Shared by all groups
iMaster NCE-CampusInsight
1
Shared by all groups
Core switch
One for each group
Access switch
One for each group
AirEngine 9700-M1
Three for each group
AirEngine8760-X1-PRO
Five for each group
Laptop
Two for each group
PoE power supply
Used to test the WLAN.
HCIP-WLAN V2.0 Lab Guide
Page 6
Lab Topology
The lab topology is described as follows:
AP1 through AP5 are connected to the access switch SW-Access. SW-Access provides PoE
power for APs.
The access switch SW-Access is connected to the core switch SW-Core through the
MultiGE0/0/9 interface.
WAC1 through WAC3 are connected to the core switch SW-Core in off-path mode.
The core switch SW-Core is connected to the iMaster NCE-Campus and iMaster NCECampusInsight servers. The interconnection network segment is 172.18.0.0/17 (which can
be adjusted based on the site requirements).
HCIP-WLAN V2.0 Lab Guide
Page 7
Contents
About This Document .......................................................................................................................... 3
Overview ............................................................................................................................................................................................. 3
Description ......................................................................................................................................................................................... 3
Background Knowledge Required ............................................................................................................................................. 4
Common Icons .................................................................................................................................................................................. 4
Lab Environment Description ...................................................................................................................................................... 4
Lab Environment Preparation ..................................................................................................................................................... 5
1 WAC + Fit AP Networking Lab ..................................................................................................... 13
1.1 Introduction ..............................................................................................................................................................................13
1.1.1 About This Lab .....................................................................................................................................................................13
1.1.2 Objectives ..............................................................................................................................................................................13
1.1.3 Networking Topology ........................................................................................................................................................13
1.1.4 Lab Planning .........................................................................................................................................................................14
1.2 Lab Configuration ..................................................................................................................................................................15
1.2.1 Configuration Roadmap ...................................................................................................................................................15
1.2.2 Configuration Procedure ..................................................................................................................................................15
1.3 Verification ................................................................................................................................................................................21
1.3.1 Checking the AP Onboarding Status and SSID Information ...............................................................................21
1.3.2 Associating a STA with the WLAN and Testing Network Connectivity ...........................................................21
1.4 Reference Configuration ......................................................................................................................................................22
1.4.1 WAC1 Configuration ..........................................................................................................................................................22
1.4.2 SW-Core Configuration .....................................................................................................................................................23
1.4.3 SW-Access Configuration .................................................................................................................................................24
1.5 Quiz .............................................................................................................................................................................................24
2 Leader AP Networking Lab ........................................................................................................... 25
2.1 Introduction ..............................................................................................................................................................................25
2.1.1 About This Lab .....................................................................................................................................................................25
2.1.2 Objectives ..............................................................................................................................................................................25
2.1.3 Networking Topology ........................................................................................................................................................25
2.1.4 Lab Planning .........................................................................................................................................................................26
2.2 Lab Configuration ..................................................................................................................................................................27
2.2.1 Configuration Roadmap ...................................................................................................................................................27
2.2.2 Configuration Procedure ..................................................................................................................................................27
2.3 Verification ................................................................................................................................................................................35
HCIP-WLAN V2.0 Lab Guide
Page 8
2.3.1 Checking the AP Onboarding Status and SSID Information ...............................................................................35
2.3.2 Checking the Radio Status ...............................................................................................................................................37
2.3.3 Checking VLAN Information ...........................................................................................................................................37
2.3.4 Associating a STA with the WLAN and Testing Network Connectivity ...........................................................38
2.4 Reference Configuration ......................................................................................................................................................38
2.4.1 SW-Core Configuration .....................................................................................................................................................38
2.4.2 SW-Access Configuration .................................................................................................................................................39
2.4.3 Leader AP Configuration ..................................................................................................................................................39
2.5 Quiz .............................................................................................................................................................................................41
3 VRRP HSB Lab ................................................................................................................................... 42
3.1 Introduction ..............................................................................................................................................................................42
3.1.1 About This Lab .....................................................................................................................................................................42
3.1.2 Objectives ..............................................................................................................................................................................42
3.1.3 Networking Topology ........................................................................................................................................................42
3.1.4 Lab Planning .........................................................................................................................................................................43
3.2 Lab Configuration ..................................................................................................................................................................44
3.2.1 Configuration Roadmap ...................................................................................................................................................44
3.2.2 Configuration Procedure ..................................................................................................................................................44
3.3 Verification ................................................................................................................................................................................53
3.3.1 Checking the AP Onboarding Status ...........................................................................................................................53
3.3.2 Checking VAP Information ..............................................................................................................................................53
3.3.3 Checking the VRRP Status ...............................................................................................................................................54
3.3.4 Checking the HSB Service Status ..................................................................................................................................55
3.3.5 Checking the HSB Group Status ....................................................................................................................................56
3.3.6 Checking the Wireless Configuration Synchronization Status ...........................................................................56
3.3.7 Associating a STA with the WLAN and Testing Network Connectivity ...........................................................57
3.4 Reference Configuration ......................................................................................................................................................58
3.4.1 WAC1 Configuration ..........................................................................................................................................................58
3.4.2 WAC2 Configuration ..........................................................................................................................................................60
3.4.3 SW-Core Configuration .....................................................................................................................................................61
3.4.4 SW-Access Configuration .................................................................................................................................................62
3.5 Quiz .............................................................................................................................................................................................62
4 Cloud Management Networking Lab ......................................................................................... 63
4.1 Introduction ..............................................................................................................................................................................63
4.1.1 About This Lab .....................................................................................................................................................................63
4.1.2 Objectives ..............................................................................................................................................................................63
4.1.3 Networking Topology ........................................................................................................................................................63
4.1.4 Lab Planning .........................................................................................................................................................................64
4.2 Lab Configuration ..................................................................................................................................................................66
HCIP-WLAN V2.0 Lab Guide
Page 9
4.2.1 Configuration Roadmap ...................................................................................................................................................66
4.2.2 Configuration Procedure ..................................................................................................................................................66
4.3 Verification ................................................................................................................................................................................82
4.3.1 Checking Cloud Management Information on WAC3 ...........................................................................................82
4.3.2 Associating a STA with the WLAN and Testing Network Connectivity ...........................................................82
4.3.3 Checking the Device Running Status on NCE ...........................................................................................................83
4.3.4 Checking the STA Access Status on NCE ....................................................................................................................84
4.4 Reference Configuration ......................................................................................................................................................85
4.4.1 WAC3 Configuration ..........................................................................................................................................................85
4.4.2 AP5 Configuration ..............................................................................................................................................................86
4.4.3 SW-Core Configuration .....................................................................................................................................................89
4.4.4 SW-Access Configuration .................................................................................................................................................90
4.5 Quiz .............................................................................................................................................................................................91
5 802.1X Authentication Lab ............................................................................................................ 92
5.1 Introduction ..............................................................................................................................................................................92
5.1.1 About This Lab .....................................................................................................................................................................92
5.1.2 Objectives ..............................................................................................................................................................................92
5.1.3 Networking Topology ........................................................................................................................................................92
5.1.4 Lab Planning .........................................................................................................................................................................93
5.2 Lab Configuration ..................................................................................................................................................................94
5.2.1 Configuration Roadmap ...................................................................................................................................................94
5.2.2 Configuration Procedure ..................................................................................................................................................95
5.3 Verification ............................................................................................................................................................................. 107
5.3.1 Checking the AP Onboarding Status ........................................................................................................................ 107
5.3.2 Checking VAP Information ........................................................................................................................................... 108
5.3.3 Associating a STA with the WLAN and Verifying Authentication .................................................................. 108
5.3.4 Checking Terminal Authentication Logs on NCE ................................................................................................. 113
5.3.5 Checking Terminal Authentication on WAC1 ........................................................................................................ 115
5.4 Reference Configuration ................................................................................................................................................... 115
5.4.1 WAC1 Configuration ....................................................................................................................................................... 115
5.4.2 SW-Core Configuration .................................................................................................................................................. 117
5.4.3 SW-Access Configuration .............................................................................................................................................. 118
5.5 Quiz .......................................................................................................................................................................................... 119
6 Portal Authentication Lab .......................................................................................................... 120
6.1 Introduction ........................................................................................................................................................................... 120
6.1.1 About This Lab .................................................................................................................................................................. 120
6.1.2 Objectives ........................................................................................................................................................................... 120
6.1.3 Networking Topology ..................................................................................................................................................... 120
6.1.4 Lab Planning ...................................................................................................................................................................... 121
HCIP-WLAN V2.0 Lab Guide
Page 10
6.2 Lab Configuration ............................................................................................................................................................... 123
6.2.1 Configuration Roadmap ................................................................................................................................................ 123
6.2.2 Configuration Procedure ............................................................................................................................................... 123
6.3 Verification ............................................................................................................................................................................. 134
6.3.1 Checking the AP Onboarding Status ........................................................................................................................ 134
6.3.2 Checking VAP Information ........................................................................................................................................... 135
6.3.3 Verifying STA Access to a WLAN in Portal Authentication Mode .................................................................. 135
6.3.4 Checking Terminal Authentication Logs on NCE ................................................................................................. 137
6.3.5 Checking Terminal Authentication on WAC1 ........................................................................................................ 138
6.4 Reference Configuration ................................................................................................................................................... 139
6.4.1 WAC1 Configuration ....................................................................................................................................................... 139
6.4.2 SW-Core Configuration .................................................................................................................................................. 141
6.4.3 SW-Access Configuration .............................................................................................................................................. 142
6.5 Quiz .......................................................................................................................................................................................... 142
7 WLAN Roaming Lab ..................................................................................................................... 144
7.1 Introduction ........................................................................................................................................................................... 144
7.1.1 About This Lab .................................................................................................................................................................. 144
7.1.2 Objectives ........................................................................................................................................................................... 144
7.1.3 Networking Topology ..................................................................................................................................................... 144
7.1.4 Lab Planning ...................................................................................................................................................................... 145
7.2 Lab Configuration ............................................................................................................................................................... 147
7.2.1 Configuration Roadmap ................................................................................................................................................ 147
7.2.2 Configuration Procedure ............................................................................................................................................... 147
7.3 Verification ............................................................................................................................................................................. 155
7.3.1 Checking the AP Onboarding Status ........................................................................................................................ 155
7.3.2 Checking the VAP Status ............................................................................................................................................... 156
7.3.3 Checking the Mobility Group Status ......................................................................................................................... 156
7.3.4 Observing the STA Roaming Status .......................................................................................................................... 157
7.4 Reference Configuration ................................................................................................................................................... 158
7.4.1 WAC1 Configuration ....................................................................................................................................................... 158
7.4.2 WAC2 Configuration ....................................................................................................................................................... 160
7.4.3 SW-Core Configuration .................................................................................................................................................. 161
7.4.4 SW-Access Configuration .............................................................................................................................................. 162
7.5 Quiz .......................................................................................................................................................................................... 163
8 RRM Lab .......................................................................................................................................... 164
8.1 Introduction ........................................................................................................................................................................... 164
8.1.1 About This Lab .................................................................................................................................................................. 164
8.1.2 Objectives ........................................................................................................................................................................... 164
8.1.3 Networking Topology ..................................................................................................................................................... 164
HCIP-WLAN V2.0 Lab Guide
Page 11
8.1.4 Lab Planning ...................................................................................................................................................................... 165
8.2 Lab Configuration ............................................................................................................................................................... 166
8.2.1 Configuration Roadmap ................................................................................................................................................ 166
8.2.2 Configuration Procedure ............................................................................................................................................... 166
8.3 Verification ............................................................................................................................................................................. 168
8.3.1 Checking RRM Profile Information ............................................................................................................................ 168
8.3.2 Checking the 2.4 GHz Radio Profile Configuration ............................................................................................. 170
8.3.3 Checking the 5 GHz Radio Profile Configuration ................................................................................................. 171
8.3.4 Checking the Radio Status ............................................................................................................................................ 172
8.4 Reference Configuration ................................................................................................................................................... 173
8.4.1 WAC1 Configuration ....................................................................................................................................................... 173
8.4.2 SW-Core Configuration .................................................................................................................................................. 175
8.4.3 SW-Access Configuration .............................................................................................................................................. 175
8.5 Quiz .......................................................................................................................................................................................... 176
9 Indoor WLAN Planning Lab ....................................................................................................... 177
9.1 Introduction ........................................................................................................................................................................... 177
9.1.1 About This Lab .................................................................................................................................................................. 177
9.1.2 Objectives ........................................................................................................................................................................... 177
9.1.3 Lab Scenarios..................................................................................................................................................................... 177
9.1.4 Preparations ....................................................................................................................................................................... 178
9.2 Lab Configuration ............................................................................................................................................................... 180
9.2.1 Configuration Roadmap ................................................................................................................................................ 180
9.2.2 Configuration Procedure ............................................................................................................................................... 181
9.3 Quiz .......................................................................................................................................................................................... 201
10 Outdoor WLAN Planning Lab ................................................................................................. 203
10.1 Introduction ........................................................................................................................................................................ 203
10.1.1 About This Lab ............................................................................................................................................................... 203
10.1.2 Objectives ......................................................................................................................................................................... 203
10.1.3 Lab Scenarios .................................................................................................................................................................. 203
10.1.4 Preparations .................................................................................................................................................................... 204
10.2 Lab Configuration ............................................................................................................................................................. 205
10.2.1 Configuration Roadmap .............................................................................................................................................. 205
10.2.2 Configuration Procedure ............................................................................................................................................. 205
10.3 Quiz ........................................................................................................................................................................................ 219
11 CampusInsight O&M Lab ......................................................................................................... 221
11.1 Introduction ........................................................................................................................................................................ 221
11.1.1 About This Lab ............................................................................................................................................................... 221
11.1.2 Objectives ......................................................................................................................................................................... 221
HCIP-WLAN V2.0 Lab Guide
Page 12
11.1.3 Networking Topology .................................................................................................................................................. 221
11.1.4 Lab Planning ................................................................................................................................................................... 222
11.2 Lab Configuration ............................................................................................................................................................. 223
11.2.1 Configuration Roadmap .............................................................................................................................................. 223
11.2.2 Configuration Procedure ............................................................................................................................................. 223
11.3 Verification .......................................................................................................................................................................... 234
11.3.1 Checking the SNMP Configuration on WAC1 ..................................................................................................... 234
11.3.2 Checking VAP information on WAC1 ..................................................................................................................... 234
11.4 Reference Configuration................................................................................................................................................. 235
11.4.1 WAC1 Configuration .................................................................................................................................................... 235
11.4.2 SW-Core Configuration ............................................................................................................................................... 237
11.4.3 SW-Access Configuration............................................................................................................................................ 238
11.5 Quiz ........................................................................................................................................................................................ 238
12 WLAN Troubleshooting Lab .................................................................................................... 240
12.1 Introduction ........................................................................................................................................................................ 240
12.1.1 About This Lab ............................................................................................................................................................... 240
12.1.2 Objectives ......................................................................................................................................................................... 240
12.1.3 Networking Topology .................................................................................................................................................. 240
12.1.4 Lab Planning ................................................................................................................................................................... 241
12.2 Lab Configuration ............................................................................................................................................................. 243
12.2.1 Configuration Roadmap .............................................................................................................................................. 243
12.2.2 Configuration Procedure ............................................................................................................................................. 243
12.3 Verification .......................................................................................................................................................................... 251
12.3.1 Checking VAP Information ......................................................................................................................................... 251
12.3.2 Associating a STA with the WLAN and Verifying Authentication ............................................................... 252
12.4 Reference Configuration................................................................................................................................................. 253
12.4.1 WAC1 Configuration .................................................................................................................................................... 253
12.4.2 SW-Core Configuration ............................................................................................................................................... 255
12.4.3 SW-Access Configuration............................................................................................................................................ 256
12.5 Quiz ........................................................................................................................................................................................ 256
HCIP-WLAN V2.0 Lab Guide
1
Page 13
WAC + Fit AP Networking Lab
1.1 Introduction
1.1.1 About This Lab
This lab instructs you to configure WAC + Fit AP networking to enable APs and STAs to
go online on the WLAN.
1.1.2 Objectives
⚫
Understand the basic configuration process of the WLAN service.
⚫
Configure APs and STAs to go online.
⚫
Describe the WAC + Fit AP networking architecture.
1.1.3 Networking Topology
Figure 1-1 WAC + Fit AP networking topology
HCIP-WLAN V2.0 Lab Guide
Page 14
1.1.4 Lab Planning
Table 1-1 VLAN planning
Device
Port
Port Type
MultiGE0/0/1
Trunk
MultiGE0/0/9
Trunk
MultiGE0/0/9
Trunk
MultiGE0/0/1
Trunk
MultiGE0/0/2
Trunk
MultiGE0/0/3
Trunk
GE0/0/1
Trunk
PVID: 1
Allow-pass: VLANs 100 and 101
SW-Core
PVID: 1
Allow-pass: VLANs 100 and 101
PVID: 1
Allow-pass: VLANs 100 and 101
PVID: 100
Allow-pass: VLANs 100 and 101
SW-Access
WAC1
VLAN Settings
PVID: 100
Allow-pass: VLANs 100 and 101
PVID: 100
Allow-pass: VLANs 100 and 101
PVID: 1
Allow-pass: VLANs 100 and 101
Table 1-2 IP address planning
Device
Port
SW-Core
WAC1
IP Address
VLANIF 100
10.23.100.254/24
VLANIF 101
10.23.101.254/24
VLANIF 100
10.23.100.1/24
Table 1-3 WLAN service parameter planning
WLAN Service
Parameter
Forwarding mode
Direct forwarding
Management VLAN
100
Service VLAN
101
AP group
ap-group1
VAP profile
wlan-net
Security profile
wlan-net
HCIP-WLAN V2.0 Lab Guide
WLAN Service
Page 15
Parameter
Security policy
WPA/WPA2+PSK+AES
Password
a12345678
SSID profile
wlan-net
SSID
wlan-net
1.2 Lab Configuration
1.2.1 Configuration Roadmap
1.
Configure VLAN information for SW-Core, SW-Access, and WAC1.
2.
Configure IP addresses for network devices to ensure network connectivity.
3.
Configure the DHCP server on SW-Core to ensure that APs can obtain management
IP addresses.
4.
On WAC1, configure the CAPWAP source interface or source address and the AP
authentication mode.
5.
Configure WLAN service parameters to implement STA access.
1.2.2 Configuration Procedure
Step 1
Configure VLAN information.
# Configure the access switch SW-Access. Create VLANs 100 and 101. Configure the
downlink interface to allow packets from VLANs 100 and 101 to pass through, and set
the PVID to 100. Configure the uplink interface to allow packets from VLANs 100 and 101
to pass through and set the PVID to 1.
# Create VLANs 100 and 101 on SW-Access.
<HUAWEI> system-view
[HUAWEI] sysname SW-Access
[SW-Access] vlan batch 100 101
# Configure the type of the downlink interface on SW-Access and the VLAN to which the
interface belongs.
[SW-Access] interface MultiGE 0/0/1
[SW-Access-MultiGE0/0/1] port link-type trunk
[SW-Access-MultiGE0/0/1] port trunk allow-pass vlan 100 101
[SW-Access-MultiGE0/0/1] port trunk pvid vlan 100
[SW-Access-MultiGE0/0/1] quit
[SW-Access] interface MultiGE 0/0/2
[SW-Access-MultiGE0/0/2] port link-type trunk
[SW-Access-MultiGE0/0/2] port trunk allow-pass vlan 100 101
[SW-Access-MultiGE0/0/2] port trunk pvid vlan 100
HCIP-WLAN V2.0 Lab Guide
Page 16
[SW-Access-MultiGE0/0/2] quit
[SW-Access] interface MultiGE 0/0/3
[SW-Access-MultiGE0/0/3] port link-type trunk
[SW-Access-MultiGE0/0/3] port trunk allow-pass vlan 100 101
[SW-Access-MultiGE0/0/3] port trunk pvid vlan 100
[SW-Access-MultiGE0/0/3] quit
# Configure the type of the uplink interface on SW-Access and the allowed VLANs for the
interface.
[SW-Access] interface MultiGE 0/0/9
[SW-Access-MultiGE0/0/9] port link-type trunk
[SW-Access-MultiGE0/0/9] port trunk allow-pass vlan 100 101
[SW-Access-MultiGE0/0/9] quit
# Configure the core switch SW-Core. Create VLANs 100 and 101. Configure the downlink
interface and MultiGE0/0/1 connected to WAC1 to allow packets from VLANs 100 and
101 to pass through.
# Create VLANs 100 and 101 on SW-Core.
<HUAWEI> system-view
[HUAWEI] sysname SW-Core
[SW-Core] vlan batch 100 101
# Configure the type of the downlink interface on SW-Core and the allowed VLANs for
the interface.
[SW-Core] interface MultiGE 0/0/9
[SW-Core-MultiGE 0/0/9] port link-type trunk
[SW-Core-MultiGE 0/0/9] port trunk allow-pass vlan 100 101
[SW-Core-MultiGE 0/0/9] quit
# Configure the type of the interface connecting SW-Core to WAC1 and the allowed
VLANs for the interface.
[SW-Core] interface MultiGE 0/0/1
[SW-Core-MultiGE 0/0/1] port link-type trunk
[SW-Core-MultiGE 0/0/1] port trunk allow-pass vlan 100 101
[SW-Core-MultiGE 0/0/1] quit
# Configure WAC1. Create VLANs 100 and 101. Change the type of GE0/0/1 to trunk and
configure the interface to allow packets from VLANs 100 and 101 to pass through.
# Create VLANs 100 and 101 on WAC1.
<AirEngine9700-M1> system-view
[AirEngine9700-M1] sysname WAC1
[WAC1] vlan batch 100 101
# Configure the type of GE0/0/1 on WAC1 and the allowed VLANs for the interface.
[WAC1] interface GigabitEthernet 0/0/1
HCIP-WLAN V2.0 Lab Guide
Page 17
[WAC1-GigabitEthernet /0/1] port link-type trunk
[WAC1-GigabitEthernet /0/1] port trunk allow-pass vlan 100 101
[WAC1-GigabitEthernet /0/1] quit
Step 2
Configure IP addresses for devices.
# Configure IP addresses for SW-Core.
[SW-Core] interface vlanif 100
[SW-Core-Vlanif100] ip address 10.23.100.254 24
[SW-Core-Vlanif100] quit
[SW-Core] interface vlanif 101
[SW-Core-Vlanif101] ip address 10.23.101.254 24
[SW-Core-Vlanif101] quit
# Configure an IP address for WAC1.
[WAC1] interface vlan 100
[WAC1-Vlanif100] ip address 10.23.100.1 24
[WAC1-Vlanif100] quit
Step 3
Configure a DHCP server.
# Enable the DHCP service and configure VLANIF 100 on SW-Core to assign IP addresses
to APs.
[SW-Core] dhcp enable
[SW-Core] interface vlanif 100
[SW-Core-Vlanif100] dhcp select interface
[SW-Core-Vlanif100] quit
# Configure VLANIF 101 on SW-Core to assign IP addresses to STAs.
[SW-Core] interface vlanif 101
[SW-Core-Vlanif101] dhcp select interface
[SW-Core-Vlanif101] quit
Step 4
Configure AP onboarding.
# Enable the function of establishing CAPWAP DTLS sessions in none authentication
mode. (V200R021C00 and later versions)
[WAC1] capwap dtls no-auth enable
Warning: This operation allows for device access in non-DTLS encryption mode even when DTLS is
enabled and brings security risks. After the device goes online for the first time, disable this function
to prevent security risks. Continue? [Y/N]: y
# Configure the CAPWAP source interface on WAC1. Ensure that the following
parameters have been configured in advance:
DTLS PSK: a1234567
Inter-WAC DTLS PSK: a1234567
HCIP-WLAN V2.0 Lab Guide
Page 18
Fit AP management parameters (user name/password): admin/HUAWEI@123
Global login password of the offline management VAP: a1234567
[WAC1] capwap dtls psk a1234567
[WAC1] capwap dtls inter-controller psk a1234567
[WAC1] capwap source interface vlanif 100
Set the user name for FIT APs(The value is a string of 4 to 31 characters, which can contain letters,
underscores, and digits, and must start with a letter): admin
Set the password for FIT APs(plain-text password of 8-128 characters or cipher-text password of 48188 characters that must be a combination of at least three of the following: lowercase letters a to z,
uppercase letters A to Z, digits, and special characters): HUAWEI@123
Confirm password: HUAWEI@123
Set the global temporary-management psk(contains 8-63 plain-text characters, or 48-108 cipher-text
characters that must be a combination of at least two of the following: lowercase letters a to z,
uppercase letters A to Z, digits, and special characters): a1234567
Confirm PSK: a1234567
Warning: Ensure that the management VLAN and service VLAN are different. Otherwise, services may
be interrupted.
Warning: Before an added device goes online for the first time, enable DTLS no-auth if it runs a
version earlier than V200R021C00 or enable DTLS certificate-mandatory-match if it runs
V200R021C00 or later.
# Create an AP group.
[WAC1] wlan
[WAC1-wlan-view] ap-group name ap-group1
[WAC1-wlan-ap-group-ap-group1] quit
[WAC1-wlan-view] quit
# On WAC1, set the AP authentication mode to MAC address authentication.
[WAC1] wlan
[WAC1-wlan-view] ap auth-mode mac-auth
[WAC1-wlan-view] quit
# Add APs on WAC1. (The APs' MAC addresses here are for reference only. Replace them
as required.)
[WAC1] wlan
[WAC1-wlan-view] ap-id 0 ap-mac 6ce8-748d-7540
[WAC1-wlan-ap-0] ap-group ap-group1
Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power
and antenna gain configurations of the radio, Whether to continue? [Y/N]: y
Info: This operation may take a few seconds. Please wait for a moment.. done.
[WAC1-wlan-ap-0] ap-name AP1
Warning: The AP name cannot be the MAC address of another AP. Otherwise, the AP name may be
lost after the device restarts.
Warning: The AP name of more than 31 characters does not take effect for APs in versions earlier
than V200R009C00.
Warning: This operation may cause AP reset. Continue? [Y/N]: y
[WAC1-wlan-ap-0] quit
[WAC1-wlan-view] ap-id 1 ap-mac 6ce8-748d-6d20
[WAC1-wlan-ap-1] ap-group ap-group1
HCIP-WLAN V2.0 Lab Guide
Page 19
Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power
and antenna gain configurations of the radio, Whether to continue? [Y/N]: y
Info: This operation may take a few seconds. Please wait for a moment.. done.
[WAC1-wlan-ap-1] ap-name AP2
Warning: The AP name cannot be the MAC address of another AP. Otherwise, the AP name may be
lost after the device restarts.
Warning: The AP name of more than 31 characters does not take effect for APs in versions earlier
than V200R009C00.
Warning: This operation may cause AP reset. Continue? [Y/N]: y
[WAC1-wlan-ap-1] quit
[WAC1-wlan-view] ap-id 2 ap-mac 6ce8-748d-6f00
[WAC1-wlan-ap-2] ap-group ap-group1
Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power
and antenna gain configurations of the radio, Whether to continue? [Y/N]: y
Info: This operation may take a few seconds. Please wait for a moment.. done.
[WAC1-wlan-ap-2] ap-name AP3
Warning: The AP name cannot be the MAC address of another AP. Otherwise, the AP name may be
lost after the device restarts.
Warning: The AP name of more than 31 characters does not take effect for APs in versions earlier
than V200R009C00.
Warning: This operation may cause AP reset. Continue? [Y/N]: y
[WAC1-wlan-ap-2] quit
[WAC1-wlan-view] quit
# Run the display ap all command to verify that the three APs are online and in normal
state.
[WAC1] display ap all
Total AP information:
nor : normal
[3]
ExtraInfo : Extra information
----------------------------------------------------------------------------------------------------------ID
MAC
Name Group
IP
Type
State STA Uptime
ExtraInfo
----------------------------------------------------------------------------------------------------------0
6ce8-748d-7540 AP1 ap-group1 10.23.100.134 AirEngine8760-X1-PRO nor
0
5M:36S 1
6ce8-748d-6d20 AP2 ap-group1 10.23.100.105 AirEngine8760-X1-PRO nor
0
17S
2
6ce8-748d-6f00 AP3 ap-group1 10.23.100.71 AirEngine8760-X1-PRO nor
0
48S
----------------------------------------------------------------------------------------------------------Total: 3
Step 5
Configure WLAN services.
# Configure the country code in a regulatory domain profile. The default country code is
CN. (If the device is located outside China, change the country code accordingly.)
[WAC1] wlan
[WAC1-wlan-view] regulatory-domain-profile name domain1
[WAC1-wlan-regulate-domain-domain1] country-code CN
[WAC1-wlan-regulate-domain-domain1] quit
# Bind the regulatory domain profile to the AP group.
[WAC1-wlan-view] ap-group name ap-group1
HCIP-WLAN V2.0 Lab Guide
Page 20
[WAC1-wlan-ap-group-ap-group1] regulatory-domain-profile domain1
Warning: This configuration change will clear the channel and power configurations of radios, and
may restart APs. Continue?[Y/N]: y
[WAC1-wlan-ap-group-ap-group1] quit
# Create the security profile wlan-net and configure a security policy in the profile.
[WAC1-wlan-view] security-profile name wlan-net
[WAC1-wlan-sec-prof-wlan-net] security wpa-wpa2 psk pass-phrase a12345678 aes
[WAC1-wlan-sec-prof-wlan-net] quit
# Create the SSID profile wlan-net and set the SSID name to wlan-net.
[WAC1-wlan-view] ssid-profile name wlan-net
[WAC1-wlan-ssid-prof-wlan-net] ssid wlan-net
[WAC1-wlan-ssid-prof-wlan-net] quit
# Create the VAP profile wlan-net, set the data forwarding mode and service VLAN, and
bind the security profile and SSID profile to the VAP profile.
[WAC1-wlan-view] vap-profile name wlan-net
[WAC1-wlan-vap-prof-wlan-net] forward-mode direct-forward
[WAC1-wlan-vap-prof-wlan-net] service-vlan vlan-id 101
[WAC1-wlan-vap-prof-wlan-net] security-profile wlan-net
[WAC1-wlan-vap-prof-wlan-net] ssid-profile wlan-net
[WAC1-wlan-vap-prof-wlan-net] quit
# Bind the VAP profile to the AP group and apply configurations in the VAP profile wlannet to radios 0 and 1 on APs in the AP group.
[WAC1-wlan-view] ap-group name ap-group1
[WAC1-wlan-ap-group-ap-group1] vap-profile wlan-net wlan 1 radio 0
[WAC1-wlan-ap-group-ap-group1] vap-profile wlan-net wlan 1 radio 1
[WAC1-wlan-ap-group-ap-group1] quit
[WAC1-wlan-view] quit
# Check the VAP status.
[WAC1] display vap all
Info: This operation may take a few seconds, please wait.
WID : WLAN ID
-----------------------------------------------------------------------------AP ID AP name RfID WID BSSID
Status Auth type
STA
SSID
-----------------------------------------------------------------------------0
AP1
0
1
6CE8-748D-7540 ON
WPA/WPA2-PSK 0
wlan-net
0
AP1
1
1
6CE8-748D-7550 ON
WPA/WPA2-PSK 0
wlan-net
1
AP2
0
1
6CE8-748D-6D20 ON
WPA/WPA2-PSK 0
wlan-net
1
AP2
1
1
6CE8-748D-6D30 ON
WPA/WPA2-PSK 0
wlan-net
2
AP3
0
1
6CE8-748D-6F00 ON
WPA/WPA2-PSK 0
wlan-net
2
AP3
1
1
6CE8-748D-6F10 ON
WPA/WPA2-PSK 0
wlan-net
-----------------------------------------------------------------------------Total: 6
HCIP-WLAN V2.0 Lab Guide
Page 21
1.3 Verification
1.3.1 Checking the AP Onboarding Status and SSID Information
# Run the display ap all command on WAC1 to check the AP onboarding result.
[WAC1] display ap all
Total AP information:
nor : normal
[3]
ExtraInfo : Extra information
----------------------------------------------------------------------------------------------------------ID
MAC
Name Group
IP
Type
State STA Uptime
ExtraInfo
----------------------------------------------------------------------------------------------------------0
6ce8-748d-7540 AP1 ap-group1 10.23.100.134 AirEngine8760-X1-PRO nor
0
9M:55S 1
6ce8-748d-6d20 AP2 ap-group1 10.23.100.105 AirEngine8760-X1-PRO nor
0
4M:36S 2
6ce8-748d-6f00 AP3 ap-group1 10.23.100.71 AirEngine8760-X1-PRO nor
0
5M:7S ----------------------------------------------------------------------------------------------------------Total: 3
# The preceding command output shows AP information, including the MAC address, AP
group, dynamically obtained IP address, model, and onboarding status of each AP on
WAC1.
# Run the display vap all command on WAC1 to check VAP information.
[WAC1] display vap all
Info: This operation may take a few seconds, please wait.
WID : WLAN ID
-----------------------------------------------------------------------------AP ID AP name RfID WID BSSID
Status Auth type
STA
SSID
-----------------------------------------------------------------------------0
AP1
0
1
6CE8-748D-7540 ON
WPA/WPA2-PSK 0
wlan-net
0
AP1
1
1
6CE8-748D-7550 ON
WPA/WPA2-PSK 0
wlan-net
1
AP2
0
1
6CE8-748D-6D20 ON
WPA/WPA2-PSK 0
wlan-net
1
AP2
1
1
6CE8-748D-6D30 ON
WPA/WPA2-PSK 1
wlan-net
2
AP3
0
1
6CE8-748D-6F00 ON
WPA/WPA2-PSK 0
wlan-net
2
AP3
1
1
6CE8-748D-6F10 ON
WPA/WPA2-PSK 0
wlan-net
-----------------------------------------------------------------------------Total: 6
# The preceding command output shows VAP information, including the AP name, BSSID
name, SSID name, and authentication mode of a VAP.
1.3.2 Associating a STA with the WLAN and Testing Network
Connectivity
# Enable a STA to scan and connect to the WLAN wlan-net.
HCIP-WLAN V2.0 Lab Guide
Page 22
# Test the network connectivity between the STA and the service gateway.
1.4 Reference Configuration
1.4.1 WAC1 Configuration
Software Version V200R022C00SPC100
#
sysname WAC1
#
vlan batch 100 to 101
#
interface Vlanif100
ip address 10.23.100.1 255.255.255.0
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
capwap source interface vlanif100
capwap dtls psk %^%#j';2Q@^/vCxm!*M2itl4_TPX-r{LkKUwRi~>}Bv/%^%#
capwap dtls inter-controller psk %^%#=%m!*#C-:C)PpbFNaztMD%Bk,.<E.!-BW4LuK0<A%^%#
capwap dtls no-auth enable
#
wlan
temporary-management psk %^%#z(~nG]v0DEvE%7$[n=~(S-keCUJ5oU{Nt'GRR*\=%^%#
ap username admin password cipher %^%#JD{AQA6LMS`>8S4vv,T3YTjC$_|8^-(cYC!5.ta&%^%#
security-profile name wlan-net
security wpa-wpa2 psk pass-phrase %^%#+"mT(X&\y(bS|$R-<L5A}y*8Xh^m"=Gm)P3jx|qH%^%#
aes
HCIP-WLAN V2.0 Lab Guide
ssid-profile name wlan-net
ssid wlan-net
vap-profile name wlan-net
service-vlan vlan-id 101
ssid-profile wlan-net
security-profile wlan-net
regulatory-domain-profile name domain1
ap-group name ap-group1
regulatory-domain-profile domain1
radio 0
vap-profile wlan-net wlan 1
radio 1
vap-profile wlan-net wlan 1
ap-id 0 type-id 125 ap-mac 6ce8-748d-7540 ap-sn 2102353GSG10N7100245
ap-name AP1
ap-group ap-group1
ap-id 1 type-id 125 ap-mac 6ce8-748d-6d20 ap-sn 2102353GSG10N7100219
ap-name AP2
ap-group ap-group1
ap-id 2 type-id 125 ap-mac 6ce8-748d-6f00 ap-sn 2102353GSG10N7100225
ap-name AP3
ap-group ap-group1
provision-ap
#
return
1.4.2 SW-Core Configuration
!Software Version V200R022C00SPC500
#
sysname SW-Core
#
vlan batch 18 100 to 101
#
dhcp enable
#
interface Vlanif100
ip address 10.23.100.254 255.255.255.0
dhcp select interface
#
interface Vlanif101
ip address 10.23.101.254 255.255.255.0
dhcp select interface
#
interface MEth0/0/1
ip address 192.168.1.253 255.255.255.0
#
interface MultiGE0/0/1
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/9
port link-type trunk
port trunk allow-pass vlan 100 to 101
Page 23
HCIP-WLAN V2.0 Lab Guide
Page 24
#
return
1.4.3 SW-Access Configuration
!Software Version V200R022C00SPC500
#
sysname SW-Access
#
vlan batch 100 to 101
#
interface MultiGE0/0/1
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/2
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/3
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/9
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
return
1.5 Quiz
During the WLAN service configuration on a WAC, engineers usually group APs and
configure services based on AP groups. Why is it not recommended that WLAN services
be configured based on a single AP?
Answer:
To configure WLAN services on a single AP, the administrator needs to configure WLAN
service parameters on each AP. When there are a large number of APs, the configuration
workload increases. Additionally, when the configuration changes, the administrator
needs to modify the configuration of each AP one by one, which is inconvenient for O&M
and management. This problem can be easily resolved by performing configurations
based on AP groups.
HCIP-WLAN V2.0 Lab Guide
2
Page 25
Leader AP Networking Lab
2.1 Introduction
2.1.1 About This Lab
This lab instructs you to configure and verify the leader AP networking to enable APs and
STAs to go online.
2.1.2 Objectives
⚫
Describe the leader AP networking architecture.
⚫
Understand the WLAN service configuration method in the leader AP networking.
⚫
Understand the service check method of the leader AP.
2.1.3 Networking Topology
Figure 2-1 Leader AP networking topology
In the leader AP networking topology, AP1, AP2, and AP3 are Fit APs, and AP4 is the
leader AP. The leader AP manages the WLAN in a unified manner.
SW-Core is a core switch and also functions as a DHCP server to assign IP addresses to
APs and STAs. SW-Access is an access switch that provides PoE power supply for APs.
HCIP-WLAN V2.0 Lab Guide
Page 26
2.1.4 Lab Planning
Table 2-1 VLAN planning
Device
SW-Core
SW-Access
Port
Port Type
MultiGE0/0/9
Trunk
MultiGE0/0/9
Trunk
MultiGE0/0/1
Trunk
MultiGE0/0/2
Trunk
MultiGE0/0/3
Trunk
MultiGE0/0/4
Trunk
VLAN Settings
PVID: 1
Allow-pass: VLANs 100 and 101
PVID: 1
Allow-pass: VLANs 100 and 101
PVID: 100
Allow-pass: VLANs 100 and 101
PVID: 100
Allow-pass: VLANs 100 and 101
PVID: 100
Allow-pass: VLANs 100 and 101
PVID: 100
Allow-pass: VLANs 100 and 101
Table 2-2 IP address planning
Device
Port
SW-Core
Leader AP
IP Address
VLANIF 100
10.23.100.254/24
VLANIF 101
10.23.101.254/24
VLANIF 100
Dynamically obtained through DHCP
Table 2-3 WLAN service parameter planning
WLAN Service
Parameter
Forwarding mode
Direct forwarding
Management VLAN
100
Service VLAN
101
AP group
default
VAP profile
Automatically generated
Security profile
Automatically generated
Security policy
WPA/WPA2+PSK+AES
Password
HUAWEI@123
HCIP-WLAN V2.0 Lab Guide
WLAN Service
Page 27
Parameter
SSID profile
Automatically generated
SSID
HCIP-WLAN
AP Zone
default
2.2 Lab Configuration
2.2.1 Configuration Roadmap
1.
Configure VLAN information and interface modes for SW-Core and SW-Access.
2.
Configure SW-Core as a DHCP server to ensure that APs can obtain IP addresses.
3.
Set the working mode of AP4 to Fat.
4.
Configure the name and system time of AP4 and check the AP onboarding status.
5.
Configure WLAN service parameters to implement STA access.
2.2.2 Configuration Procedure
Step 1
Configure VLAN information.
# Configure the access switch SW-Access. Create VLANs 100 and 101. Configure the
downlink interface to allow packets from VLANs 100 and 101 to pass through, and set
the PVID to 100. Configure the uplink interface to allow packets from VLANs 100 and 101
to pass through and set the PVID to 1.
# Create VLANs 100 and 101 on SW-Access.
<HUAWEI> system-view
[HUAWEI] sysname SW-Access
[SW-Access] vlan batch 100 101
# Configure the type of the downlink interface on SW-Access and the VLAN to which the
interface belongs.
[SW-Access] interface MultiGE 0/0/1
[SW-Access-MultiGE0/0/1] port link-type trunk
[SW-Access-MultiGE0/0/1] port trunk allow-pass vlan 100 101
[SW-Access-MultiGE0/0/1] port trunk pvid vlan 100
[SW-Access-MultiGE0/0/1] quit
[SW-Access] interface MultiGE 0/0/2
[SW-Access-MultiGE0/0/2] port link-type trunk
[SW-Access-MultiGE0/0/2] port trunk allow-pass vlan 100 101
[SW-Access-MultiGE0/0/2] port trunk pvid vlan 100
[SW-Access-MultiGE0/0/2] quit
[SW-Access] interface MultiGE 0/0/3
[SW-Access-MultiGE0/0/3] port link-type trunk
[SW-Access-MultiGE0/0/3] port trunk allow-pass vlan 100 101
HCIP-WLAN V2.0 Lab Guide
Page 28
[SW-Access-MultiGE0/0/3] port trunk pvid vlan 100
[SW-Access-MultiGE0/0/3] quit
[SW-Access] interface MultiGE 0/0/4
[SW-Access-MultiGE0/0/4] port link-type trunk
[SW-Access-MultiGE0/0/4] port trunk allow-pass vlan 100 101
[SW-Access-MultiGE0/0/4] port trunk pvid vlan 100
[SW-Access-MultiGE0/0/4] quit
# Configure the type of the uplink interface on SW-Access and the allowed VLANs for the
interface.
[[SW-Access] interface MultiGE 0/0/9
[SW-Access-MultiGE0/0/9] port link-type trunk
[SW-Access-MultiGE0/0/9] port trunk allow-pass vlan 100 101
[SW-Access-MultiGE0/0/9] quit
# Configure the core switch SW-Core. Create VLANs 100 and 101, and configure the
downlink interface to allow packets from VLANs 100 and 101 to pass through.
# Create VLANs 100 and 101 on SW-Core.
<HUAWEI> system-view
[HUAWEI] sysname SW-Core
[SW-Core] vlan batch 100 101
# Configure the type of the downlink interface on SW-Core and the VLAN to which the
interface belongs.
[SW-Core] interface MultiGE 0/0/9
[SW-Core-MultiGE 0/0/9] port link-type trunk
[SW-Core-MultiGE 0/0/9] port trunk allow-pass vlan 100 101
[SW-Core-MultiGE 0/0/9] quit
Step 2
Configure a DHCP server.
# Configure SW-Core as a DHCP server to assign IP addresses to STAs and APs.
# Enable the DHCP service and configure VLANIF 100 on SW-Core to assign IP addresses
to APs.
[SW-Core] dhcp enable
[SW-Core] interface vlanif 100
[SW-Core-Vlanif100] ip address 10.23.100.254 24
[SW-Core-Vlanif100] dhcp select interface
[SW-Core-Vlanif100] quit
# Configure VLANIF 101 on SW-Core to assign IP addresses to STAs.
[SW-Core] interface vlanif 101
[SW-Core-Vlanif101] ip address 10.23.101.254 24
[SW-Core-Vlanif101] dhcp select interface
[SW-Core-Vlanif101] quit
# On SW-Core, check the IP addresses obtained by AP1, AP2, AP3, and AP4.
HCIP-WLAN V2.0 Lab Guide
[SW-Core] display ip pool interface Vlanif100 used
Pool-name
: Vlanif100
Pool-No
:0
Lease
: 1 Days 0 Hours 0 Minutes
Domain-name
:DNS-server0
:NBNS-server0
:Netbios-type
:Position
: Interface
Status
: Unlocked
Gateway-0
:Network
: 10.23.100.0
Mask
: 255.255.255.0
VPN instance
: -Logging
: Disable
Conflicted address recycle interval: Address Statistic: Total
:254
Used
Idle
:250
Expired
Conflict
:0
Disabled
Page 29
:4
:0
:0
------------------------------------------------------------------------------------Network section
Start
End
Total
Used Idle(Expired) Conflict Disabled
------------------------------------------------------------------------------------10.23.100.1 10.23.100.254
254
4
250(0)
0
0
------------------------------------------------------------------------------------Client-ID format as follows:
DHCP : mac-address
PPPoE : mac-address
IPSec : user-id/portnumber/vrf
PPP
: interface index
L2TP : cpu-slot/session-id
SSL-VPN : user-id/session-id
------------------------------------------------------------------------------------Index
IP
Client-ID
Type
Left Status
------------------------------------------------------------------------------------12
10.23.100.13
6ce8-748d-7540
DHCP
86363 Used
131 10.23.100.132
6ce8-748d-6f00
DHCP
86333 Used
147 10.23.100.148
6ce8-748d-6690
DHCP
86375 Used
200 10.23.100.201
6ce8-748d-6d20
DHCP
86381 Used
-------------------------------------------------------------------------------------
# The command output shows that AP1 through AP4 have obtained IP addresses.
Step 3
Switch the AP4's working mode.
# By default, an AP works in Fit AP mode. You need to switch AP4 to the Fat AP mode
first.
# This lab assumes the MAC address of AP4 as 6ce8-748d-6690 and the default IP
address of the leader AP as 169.254.2.1/24.
# Enable the management PC to search for the WLAN with the SSID hw_manage_6690
and connect the PC to the WLAN. The wireless network adapter of the management PC
automatically obtains an IP address on the 169.254.2.0/24 network segment. If the IP
address cannot be automatically obtained, manually set the IP address of the
management PC, for example, to 169.254.2.100/24.
HCIP-WLAN V2.0 Lab Guide
Page 30
# Visit https://169.254.2.1 on a browser to manage AP4. Upon your first login to AP4, you
need to configure the user name and password. In this lab, the user name is admin and
the password is HUAWEI@123.
HCIP-WLAN V2.0 Lab Guide
Page 31
# Change the working mode of AP4 to Fat, set the service Wireless network name and
Key to HCIP-WLAN and HUAWEI@123, and click Apply. Then AP4 automatically restarts.
# After AP4 restarts, enable the PC to search for the SSID HCIP-WLAN and the login page
is automatically displayed. If the login page is not automatically displayed, visit
https://192.168.254.254.
HCIP-WLAN V2.0 Lab Guide
Page 32
# Login to the leader AP, and enter user name and password. In this lab, set the
username and password to admin/HUAWEI@123.
# On the home page of the leader AP, click the IP address of the AP to access the
management plane. In this lab, the leader AP address is 10.23.100.148.
# After the management page is displayed, enter the user name and password again. In
this lab, the password is admin/HUAWEI@123.
HCIP-WLAN V2.0 Lab Guide
Step 4
Page 33
Check the AP onboarding status.
# The default AP authentication mode of the leader AP is non-authentication. Therefore,
AP1, AP2, and AP3 automatically go online on the leader AP after obtaining IP addresses.
# Choose Configuration > AP Configuration. On the AP Configuration tab page, you can
find that all APs are online. The AP with the ID of 0 is the leader AP itself. By default, all
APs are in the default AP zone.
# On the AP Configuration page, click the modify icon in the Operation column to
change the AP name. The following figure shows AP names after the modification.
Step 5
Configure WLAN service parameters.
# Set Internet access mode to Bridging. In this lab, SW-Core serves as both the AP
gateway and service gateway, the management VLAN of the AP is VLAN 100, and the
service VLAN is VLAN 101.
HCIP-WLAN V2.0 Lab Guide
Page 34
# # Configure WLAN service parameters. Choose Configuration > WLAN Configuration,
and click the SSID HCIP-WLAN. Then configure Wi-Fi signals. Set Wireless network name
to HCIP-WLAN, Service VLAN ID to 101, Encryption mode to Password authentication,
and Key to HUAWEI@123. Then click Finish.
HCIP-WLAN V2.0 Lab Guide
Page 35
2.3 Verification
2.3.1 Checking the AP Onboarding Status and SSID Information
# On the web page, choose Monitoring > Summary. The onboarding status, SSID, and
device status of each AP on the leader AP are displayed.
HCIP-WLAN V2.0 Lab Guide
Page 36
HCIP-WLAN V2.0 Lab Guide
Page 37
2.3.2 Checking the Radio Status
# Choose Advanced > Radio Config > Radio Planning to check the radio status.
2.3.3 Checking VLAN Information
# During the leader AP configuration, the management VLAN and service VLAN are
automatically created and do not need to be configured separately.
# Choose Advanced > Interface > VLAN to view VLAN information.
HCIP-WLAN V2.0 Lab Guide
Page 38
2.3.4 Associating a STA with the WLAN and Testing Network
Connectivity
# Enable a STA to scan and connect to the WLAN HCIP-WLAN, and Key to
HUAWEI@123.
# Test the network connectivity between the STA and the service gateway.
2.4 Reference Configuration
2.4.1 SW-Core Configuration
!Software Version V200R022C00SPC500
#
sysname SW-Core
#
vlan batch 100 to 101
#
dhcp enable
#
interface Vlanif100
ip address 10.23.100.254 255.255.255.0
dhcp select interface
#
interface Vlanif101
ip address 10.23.101.254 255.255.255.0
dhcp select interface
#
interface MultiGE0/0/9
port link-type trunk
port trunk allow-pass vlan 100 to 101
HCIP-WLAN V2.0 Lab Guide
return
2.4.2 SW-Access Configuration
!Software Version V200R022C00SPC500
#
sysname SW-Access
#
vlan batch 100 to 101
#
interface MultiGE0/0/1
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/2
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/3
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/4
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/9
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
return
2.4.3 Leader AP Configuration
Software Version V200R022C00SPC100
#
vlan batch 100 to 101
#
dhcp enable
#
interface Vlanif100
ip address 169.254.2.1 255.255.255.0
dhcp select interface
dhcp server dns-list 169.254.2.1
#
interface Vlanif101
#
interface Ethernet0/0/47
ip address 169.254.3.1 255.255.255.0
Page 39
HCIP-WLAN V2.0 Lab Guide
Page 40
#
interface LoopBack1023
ip address 192.168.254.254 255.255.255.255
#
capwap dtls control-link encrypt off
#
wlan
temporary-management psk %^%#UOXe!_-TT"rNC0+NkX@F';'_S-7hp0u*]7SEVR"R%^%#
ap username admin password cipher %^%#9^\&Hw:@-Xv%kT4<]uKTCesB@Z^cL44&5OUIm"95%^%#
traffic-profile name default
traffic-profile name huawei-leaderap
traffic-profile name huawei-leaderap-business
security-profile name default
security-profile name huawei-leaderap
security open
security-profile name huawei-leaderap-business
security wpa-wpa2 psk pass-phrase %^%#s07uS\P_u.e)e+KG^#1T^XLTXI87I0okp>U~LKN)%^%# aes
ssid-profile name default
ssid-profile name huawei-leaderap
ssid HUAWEI-LeaderAP-6690
ssid-hide enable
ssid-profile name huawei-leaderap-business
ssid HCIP-WLAN
vap-profile name huawei-leaderap
service-vlan vlan-id 100
ssid-profile huawei-leaderap
security-profile huawei-leaderap
traffic-profile huawei-leaderap
type leaderap-management
radio 0 1 2
vap-profile name huawei-leaderap-business
service-vlan vlan-id 101
ssid-profile huawei-leaderap-business
security-profile huawei-leaderap-business
traffic-profile huawei-leaderap-business
ap-zone default
radio 0 1 2
regulatory-domain-profile name default
dca-channel 5g bandwidth 80mhz
dca-channel 6g bandwidth 80mhz
air-scan-profile name default
rrm-profile name default
smart-roam roam-threshold snr 30
radio-2g-profile name default
radio-5g-profile name default
wids-spoof-profile name default
wids-whitelist-profile name default
wids-profile name default
ap-system-profile name default
port-link-profile name default
wired-port-profile name default
ap-group name default
radio 0
calibrate auto-txpower-select disable
radio 1
HCIP-WLAN V2.0 Lab Guide
Page 41
channel 160mhz 36
calibrate auto-channel-select disable
calibrate auto-txpower-select disable
radio 2
calibrate auto-txpower-select disable
ap-id 0 type-id 125 ap-mac 6ce8-748d-6690 ap-sn 2102353GSG10N7100198
ap-name AP4
ap-id 1 type-id 125 ap-mac 6ce8-748d-6d20 ap-sn 2102353GSG10N7100219
ap-id 2 type-id 125 ap-mac 6ce8-748d-6f00 ap-sn 2102353GSG10N7100225
ap-name AP3
ap-id 3 type-id 125 ap-mac 6ce8-748d-7540 ap-sn 2102353GSG10N7100245
provision-ap
uplink multige 1
#
return
2.5 Quiz
What are the differences between the bridge mode and gateway mode in the leader AP
networking?
Answer:
A leader AP in bridge mode functions as a network bridge and works with an
independent gateway in the uplink direction. The leader AP and Fit APs communicate
with each other on a Layer 2 network. The independent gateway has the DHCP service
enabled to assign IP addresses to STAs and APs. The direct forwarding mode is used,
which reduces the load on the leader AP.
A leader AP in gateway mode functions as a gateway, and no independent gateway is
required. The leader AP and Fit APs communicate with each other on a Layer 2 network.
In the uplink direction, the leader AP has NAT enabled and connects to the Internet. In
the downlink direction, the leader AP connects to a switch and communicates with Fit
APs. The leader AP has the DHCP service enabled and allocates IP addresses to Fit APs
and STAs. The networking is more simplified than that in bridge mode. The tunnel
forwarding is used, and all service traffic is forwarded to the leader AP through a tunnel
for processing.
HCIP-WLAN V2.0 Lab Guide
3
Page 42
VRRP HSB Lab
3.1 Introduction
3.1.1 About This Lab
This lab provides instructions on configuring and commissioning WLAN reliability
networking so that you can understand how to deploy HUAWEI WLAN reliability
networking solutions.
3.1.2 Objectives
⚫
Describe WLAN reliability networking modes.
⚫
Understand how to configure VRRP HSB networking.
3.1.3 Networking Topology
Figure 3-1 VRRP HSB networking topology
HCIP-WLAN V2.0 Lab Guide
Page 43
3.1.4 Lab Planning
Table 3-1 VLAN planning
Device
Port
Port Type
MultiGE0/0/1
Trunk
MultiGE0/0/2
Trunk
MultiGE0/0/9
Trunk
MultiGE0/0/9
Trunk
MultiGE0/0/1
Trunk
MultiGE0/0/2
Trunk
MultiGE0/0/3
Trunk
WAC1
GE0/0/1
Trunk
WAC2
GE0/0/1
Trunk
SW-Core
VLAN Settings
PVID: 1
Allow-pass: VLANs 100 and 101
PVID: 1
Allow-pass: VLANs 100 and 101
PVID: 1
Allow-pass: VLANs 100 and 101
PVID: 1
Allow-pass: VLANs 100 and 101
PVID: 100
Allow-pass: VLANs 100 and 101
SW-Access
PVID: 100
Allow-pass: VLANs 100 and 101
PVID: 100
Allow-pass: VLANs 100 and 101
PVID: 1
Allow-pass: VLANs 100 and 101
PVID: 1
Allow-pass: VLANs 100 and 101
Table 3-2 IP address planning
Device
Port
IP Address
Remarks
WAC1
VLANIF 100
10.23.100.1/24
Used for wireless
configuration synchronization
WAC2
VLANIF 100
10.23.100.2/24
Used for wireless
configuration synchronization
VLANIF 100
10.23.100.254/24
Management VLAN, with
DHCP enabled
VLANIF 101
10.23.101.254/24
Service VLAN, with DHCP
enabled
/
10.23.100.33
Used for establishing
SW-Core
VRRP virtual
HCIP-WLAN V2.0 Lab Guide
Device
Port
Page 44
IP Address
Remarks
address
CAPWAP tunnels with APs
Table 3-3 WLAN service parameter planning
WLAN Service
Parameter
Forwarding mode
Direct forwarding
Management VLAN
100
Service VLAN
101
HSB channel VLAN
100
AP group
ap-group1
VAP profile
wlan-net
Security profile
wlan-net
Security policy
WPA/WPA2+PSK+AES
Password
a12345678
SSID profile
wlan-net
SSID
wlan-net
PSK for wireless configuration synchronization
HUAWEI@123
3.2 Lab Configuration
3.2.1 Configuration Roadmap
1.
Configure network connectivity among WAC1, WAC2, APs, SW-Core, and SW-Access.
2.
Configure a DHCP server.
3.
Configure VRRP HSB.
4.
Configure the wireless configuration synchronization function.
5.
Configure WLAN services.
3.2.2 Configuration Procedure
Step 1
Configure network connectivity.
# Configure the core switch SW-Core. Create VLANs 100 and 101, configure the modes of
interfaces, and configure the interfaces to allow packets from VLANs 100 and 101 to pass
through.
# Create VLANs 100 and 101 on SW-Core.
HCIP-WLAN V2.0 Lab Guide
Page 45
<HUAWEI> system-view
[HUAWEI] sysname SW-Core
[SW-Core] vlan batch 100 101
# Configure the type of the downlink interface on SW-Core and the allowed VLANs for
the interface.
[SW-Core] interface MultiGE 0/0/9
[SW-Core-MultiGE 0/0/9] port link-type trunk
[SW-Core-MultiGE 0/0/9] port trunk allow-pass vlan 100 101
[SW-Core-MultiGE 0/0/9] quit
# Configure the types of the interfaces connecting SW-Core to WAC1 and WAC2, and the
allowed VLANs for the interface.
[SW-Core] interface MultiGE 0/0/1
[SW-Core-MultiGE 0/0/1] port link-type trunk
[SW-Core-MultiGE 0/0/1] port trunk allow-pass vlan 100 101
[SW-Core-MultiGE 0/0/1] quit
[SW-Core] interface MultiGE 0/0/2
[SW-Core-MultiGE 0/0/2] port link-type trunk
[SW-Core-MultiGE 0/0/2] port trunk allow-pass vlan 100 101
[SW-Core-MultiGE 0/0/2] quit
# Configure the access switch SW-Access. Create VLANs 100 and 101. Configure the
downlink interface to allow packets from VLANs 100 and 101 to pass through, and set
the PVID to 100. Configure the uplink interface to allow packets from VLANs 100 and 101
to pass through and set the PVID to 1.
# Create VLANs 100 and 101 on SW-Access.
<HUAWEI> system-view
[HUAWEI] sysname SW-Access
[SW-Access] vlan batch 100 101
# Configure the types, PVIDs, and allowed VLANs for the downlink interfaces on SWAccess.
[SW-Access] interface MultiGE 0/0/1
[SW-Access-MultiGE0/0/1] port link-type trunk
[SW-Access-MultiGE0/0/1] port trunk allow-pass vlan 100 101
[SW-Access-MultiGE0/0/1] port trunk pvid vlan 100
[SW-Access-MultiGE0/0/1] quit
[SW-Access] interface MultiGE 0/0/2
[SW-Access-MultiGE0/0/2] port link-type trunk
[SW-Access-MultiGE0/0/2] port trunk allow-pass vlan 100 101
[SW-Access-MultiGE0/0/2] port trunk pvid vlan 100
[SW-Access-MultiGE0/0/2] quit
[SW-Access] interface MultiGE 0/0/3
[SW-Access-MultiGE0/0/3] port link-type trunk
[SW-Access-MultiGE0/0/3] port trunk allow-pass vlan 100 101
[SW-Access-MultiGE0/0/3] port trunk pvid vlan 100
[SW-Access-MultiGE0/0/3] quit
HCIP-WLAN V2.0 Lab Guide
Page 46
# Configure the type of the uplink interface on SW-Access and the allowed VLANs for the
interface.
[SW-Access] interface MultiGE 0/0/9
[SW-Access-MultiGE0/0/9] port link-type trunk
[SW-Access-MultiGE0/0/9] port trunk allow-pass vlan 100 101
[SW-Access-MultiGE0/0/9] quit
# Configure WAC1. Create VLANs 100 and 101. Change the type of GE0/0/1 to trunk and
configure the interface to allow packets from VLANs 100 and 101 to pass through.
# Create VLANs 100 and 101 on WAC1.
<AirEngine9700-M1> system-view
[AirEngine9700-M1] sysname WAC1
[WAC1] vlan batch 100 101
# Configure the type of GE0/0/1 on WAC1 and the allowed VLANs for the interface.
[WAC1] interface GigabitEthernet 0/0/1
[WAC1-GigabitEthernet /0/1] port link-type trunk
[WAC1-GigabitEthernet /0/1] port trunk allow-pass vlan 100 101
[WAC1-GigabitEthernet /0/1] quit
# Configure WAC2. Create VLANs 100 and 101. Change the type of GE0/0/1 to trunk and
configure the interface to allow packets from VLANs 100 and 101 to pass through.
# Create VLANs 100 and 101 on WAC2.
<AirEngine9700-M1> system-view
[AirEngine9700-M1] sysname WAC2
[WAC2] vlan batch 100 101
# Configure the type of GE0/0/1 on WAC2 and the allowed VLANs for the interface.
[WAC2] interface GigabitEthernet 0/0/1
[WAC2-GigabitEthernet /0/1] port link-type trunk
[WAC2-GigabitEthernet /0/1] port trunk allow-pass vlan 100 101
[WAC2-GigabitEthernet /0/1] quit
# Configure IP addresses for SW-Core, WAC1, and WAC2.
# Configure IP addresses for SW-Core.
[SW-Core] interface vlan 100
[SW-Core-Vlanif100] ip address 10.23.100.254 24
[SW-Core-Vlanif100] quit
[SW-Core] interface vlan 101
[SW-Core-Vlanif101] ip address 10.23.101.254 24
[SW-Core-Vlanif101] quit
# Configure an IP address for WAC1.
[WAC1] interface vlan 100
HCIP-WLAN V2.0 Lab Guide
Page 47
[WAC1-Vlanif100] ip address 10.23.100.1 24
[WAC1-Vlanif100] quit
# Configure an IP address for WAC2.
[WAC2] interface vlan 100
[WAC2-Vlanif100] ip address 10.23.100.2 24
[WAC2-Vlanif100] quit
Step 2
Configure a DHCP server.
# Configure SW-Core as a DHCP server to assign IP addresses to STAs and APs. Enable
the DHCP service on SW-Core, configure VLANIF 100 to assign IP addresses (excluding
some IP addresses reserved for VRRP) to APs.
[SW-Core] dhcp enable
[SW-Core] interface vlanif 100
[SW-Core-Vlanif100] dhcp select interface
[SW-Core-Vlanif100] dhcp server excluded-ip-address 10.23.100.1 10.23.100.9
[SW-Core-Vlanif100] quit
# Configure VLANIF 101 on SW-Core to assign IP addresses to STAs.
[SW-Core] interface vlanif 101
[SW-Core-Vlanif101] dhcp select interface
[SW-Core-Vlanif101] quit
Step 3
Configure VRRP HSB on WAC1.
# Set the recovery delay of the VRRP group to 60 seconds.
[WAC1] vrrp recover-delay 60
# Create a management VRRP group on WAC 1. Set the priority of WAC 1 in the
management VRRP group to 120 and the preemption delay to 1800 seconds.
[WAC1] interface vlanif 100
[WAC1-Vlanif100] ip address 10.23.100.1 255.255.255.0
[WAC1-Vlanif100] vrrp vrid 1 virtual-ip 10.23.100.33
[WAC1 Vlanif100] vrrp vrid 1 priority 120
[WAC1-Vlanif100] vrrp vrid 1 preempt-mode timer delay 1800
[WAC1-Vlanif100] admin-vrrp vrid 1
[WAC1-Vlanif100] quit
# Create an HSB service on WAC1 and configure the IP addresses and port numbers for
the active and standby channels. Set the retransmission time and interval of the HSB
service.
[WAC1] hsb-service 0
[WAC1-hsb-service-0] service-ip-port local-ip 10.23.100.1 peer-ip 10.23.100.2 local-data-port 10241
peer-data-port 10241
[WAC1-hsb-service-0] service-keep-alive detect retransmit 3 interval 6
HCIP-WLAN V2.0 Lab Guide
Page 48
[WAC1-hsb-service-0] quit
# Create an HSB group on WAC1, and bind the HSB service and the management VRRP
group to the HSB group.
[WAC1] hsb-group 0
[WAC1-hsb-group-0] bind-service 0
[WAC1-hsb-group-0] track vrrp vrid 1 interface vlanif 100
[WAC1-hsb-group-0] quit
# Bind the NAC service to the HSB group.
[WAC1] hsb-service-type access-user hsb-group 0
# Bind the WLAN service to the HSB group.
[WAC1] hsb-service-type ap hsb-group 0
# Bind the DHCP service to the HSB group.
[WAC1] hsb-service-type dhcp hsb-group 0
# Enable the HSB function.
[WAC1] hsb-group 0
[WAC1-hsb-group-0] hsb enable
[WAC1-hsb-group-0] quit
Step 4
Configure VRRP HSB on WAC2.
# Set the recovery delay of the VRRP group to 60 seconds.
[WAC2] vrrp recover-delay 60
# Create a management VRRP group on WAC2.
[WAC2] interface vlanif 100
[WAC2-Vlanif100] ip address 10.23.100.2 255.255.255.0
[WAC2-Vlanif100] vrrp vrid 1 virtual-ip 10.23.100.33
[WAC2-Vlanif100] admin-vrrp vrid 1
[WAC2-Vlanif100] quit
# Create an HSB service on WAC2 and configure the IP addresses and port numbers for
the active and standby channels. Set the retransmission time and interval of the HSB
service.
[WAC2] hsb-service 0
[WAC2-hsb-service-0] service-ip-port local-ip 10.23.100.2 peer-ip 10.23.100.1 local-data-port 10241
peer-data-port 10241
[WAC2-hsb-service-0] service-keep-alive detect retransmit 3 interval 6
[WAC2-hsb-service-0] quit
HCIP-WLAN V2.0 Lab Guide
Page 49
# Create an HSB group on WAC2, and bind the HSB service and the management VRRP
group to the HSB group.
[WAC2] hsb-group 0
[WAC2-hsb-group-0] bind-service 0
[WAC2-hsb-group-0] track vrrp vrid 1 interface vlanif 100
[WAC2-hsb-group-0] quit
# Bind the NAC service to the HSB group.
[WAC2] hsb-service-type access-user hsb-group 0
# Bind the WLAN service to the HSB group.
[WAC2] hsb-service-type ap hsb-group 0
# Bind the DHCP service to the HSB group.
[WAC2] hsb-service-type dhcp hsb-group 0
# Enable the HSB function.
[WAC2] hsb-group 0
[WAC2-hsb-group-0] hsb enable
[WAC2-hsb-group-0] quit
Step 5
Configure the wireless configuration synchronization function.
# Configure wireless configuration synchronization on WAC1.
[WAC1] wlan
[WAC1-wlan-view] master controller
[WAC1-master-controller] master-redundancy peer-ip ip-address 10.23.100.2 local-ip ip-address
10.23.100.1 psk HUAWEI@123
[WAC1-master-controller] master-redundancy track-vrrp vrid 1 interface Vlanif 100
[WAC1-master-controller] quit
# Configure wireless configuration synchronization on WAC2.
[WAC2] wlan
[WAC2-wlan-view] master controller
[WAC2-master-controller] master-redundancy peer-ip ip-address 10.23.100.1 local-ip ip-address
10.23.100.2 psk HUAWEI@123
[WAC2-master-controller] master-redundancy track-vrrp vrid 1 interface Vlanif 100
[WAC2-master-controller] quit
Step 6
Configure the CAPWAP source address.
# Configure parameters on WAC1.
# Enable the function of establishing CAPWAP DTLS sessions in none authentication
mode on WAC1. (V200R021C00 and later versions)
HCIP-WLAN V2.0 Lab Guide
Page 50
[WAC1] capwap dtls no-auth enable
Warning: This operation allows for device access in non-DTLS encryption mode even when DTLS is
enabled and brings security risks. After the device goes online for the first time, disable this function
to prevent security risks. Continue? [Y/N]: y
# Configure the CAPWAP source address on WAC1. Ensure that the following parameters
have been configured in advance:
DTLS PSK: a1234567
Inter-WAC DTLS PSK: a1234567
Fit AP management parameters (user name/password): admin/HUAWEI@123
Global login password of the offline management VAP: a1234567
[WAC1] capwap dtls psk a1234567
[WAC1] capwap dtls inter-controller psk a1234567
[WAC1] capwap source ip-address 10.23.100.33
Set the user name for FIT APs(The value is a string of 4 to 31 characters, which can contain letters,
underscores, and digits, and must start with a letter):admin
Set the password for FIT APs(plain-text password of 8-128 characters or cipher-text password of 48188 characters that must be a combination of at least three of the following: lowercase letters a to z,
uppercase letters A to Z, digits, and special characters):HUAWEI@123
Confirm password:HUAWEI@123
Set the global temporary-management psk(contains 8-63 plain-text characters, or 48-108 cipher-text
characters that must be a combination of at least two of the following: lowercase letters a to z,
uppercase letters A to Z, digits, and special characters):a1234567
Confirm PSK:a1234567
Warning: Ensure that the management VLAN and service VLAN are different. Otherwise, services may
be interrupted.
Warning: Before an added device goes online for the first time, enable DTLS no-auth if it runs a
version earlier than V200R021C00 or enable DTLS certificate-mandatory-match if it runs
V200R021C00 or later.
# Configure parameters on WAC2.
# Enable the function of establishing CAPWAP DTLS sessions in none authentication
mode on WAC2. (V200R021C00 and later versions)
[WAC2] capwap dtls no-auth enable
Warning: This operation allows for device access in non-DTLS encryption mode even when DTLS is
enabled and brings security risks. After the device goes online for the first time, disable this function
to prevent security risks. Continue? [Y/N]: y
# Configure the CAPWAP source address on WAC2. Ensure that the following parameters
have been configured in advance:
DTLS PSK: a1234567
Inter-WAC DTLS PSK: a1234567
Fit AP management parameters (user name/password): admin/HUAWEI@123
Global login password of the offline management VAP: a1234567
[WAC2] capwap dtls psk a1234567
[WAC2] capwap dtls inter-controller psk a1234567
HCIP-WLAN V2.0 Lab Guide
Page 51
[WAC2] capwap source ip-address 10.23.100.33
Set the user name for FIT APs(The value is a string of 4 to 31 characters, which can contain letters,
underscores, and digits, and must start with a letter): admin
Set the password for FIT APs(plain-text password of 8-128 characters or cipher-text password of 48188 characters that must be a combination of at least three of the following: lowercase letters a to z,
uppercase letters A to Z, digits, and special characters): HUAWEI@123
Confirm password: HUAWEI@123
Set the global temporary-management psk(contains 8-63 plain-text characters, or 48-108 cipher-text
characters that must be a combination of at least two of the following: lowercase letters a to z,
uppercase letters A to Z, digits, and special characters): a1234567
Confirm PSK: a1234567
Warning: Ensure that the management VLAN and service VLAN are different. Otherwise, services may
be interrupted.
Warning: Before an added device goes online for the first time, enable DTLS no-auth if it runs a
version earlier than V200R021C00 or enable DTLS certificate-mandatory-match if it runs
V200R021C00 or later.
Step 7
Configure AP onboarding on WAC1.
# Create an AP group.
[WAC1] wlan
[WAC1-wlan-view] ap-group name ap-group1
[WAC1-wlan-ap-group-ap-group1] quit
[WAC1-wlan-view] quit
# On WAC1, set the AP authentication mode to MAC address authentication.
[WAC1] wlan
[WAC1-wlan-view] ap auth-mode mac-auth
[WAC1-wlan-view] quit
# Add APs on WAC1. (The APs' MAC addresses here are for reference only. Replace them
as required.)
[WAC1] wlan
[WAC1-wlan-view] ap-id 0 ap-mac 6ce8-748d-7540
[WAC1-wlan-ap-0] ap-group ap-group1
Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power
and antenna gain configurations of the radio, Whether to continue? [Y/N]: y
Info: This operation may take a few seconds. Please wait for a moment.. done.
[WAC1-wlan-ap-0] ap-name AP1
Warning: The AP name cannot be the MAC address of another AP. Otherwise, the AP name may be
lost after the device restarts.
Warning: The AP name of more than 31 characters does not take effect for APs in versions earlier
than V200R009C00.
Warning: This operation may cause AP reset. Continue? [Y/N]: y
[WAC1-wlan-ap-0] quit
[WAC1-wlan-view] ap-id 1 ap-mac 6ce8-748d-6d20
[WAC1-wlan-ap-1] ap-group ap-group1
Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power
and antenna gain configurations of the radio, Whether to continue? [Y/N]: y
Info: This operation may take a few seconds. Please wait for a moment.. done.
[WAC1-wlan-ap-1] ap-name AP2
HCIP-WLAN V2.0 Lab Guide
Page 52
Warning: The AP name cannot be the MAC address of another AP. Otherwise, the AP name may be
lost after the device restarts.
Warning: The AP name of more than 31 characters does not take effect for APs in versions earlier
than V200R009C00.
Warning: This operation may cause AP reset. Continue? [Y/N]: y
[WAC1-wlan-ap-1] quit
[WAC1-wlan-view] ap-id 2 ap-mac 6ce8-748d-6f00
[WAC1-wlan-ap-2] ap-group ap-group1
Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power
and antenna gain configurations of the radio, Whether to continue? [Y/N]: y
Info: This operation may take a few seconds. Please wait for a moment.. done.
[WAC1-wlan-ap-2] ap-name AP3
Warning: The AP name cannot be the MAC address of another AP. Otherwise, the AP name may be
lost after the device restarts.
Warning: The AP name of more than 31 characters does not take effect for APs in versions earlier
than V200R009C00.
Warning: This operation may cause AP reset. Continue? [Y/N]: y
[WAC1-wlan-ap-2] quit
[WAC1-wlan-view] quit
Step 8
Configure WLAN services on WAC1.
# Create the security profile wlan-net and configure a security policy in the profile.
[WAC1] wlan
[WAC1-wlan-view] security-profile name wlan-net
[WAC1-wlan-sec-prof-wlan-net] security wpa-wpa2 psk pass-phrase a12345678 aes
[WAC1-wlan-sec-prof-wlan-net] quit
# Create the SSID profile wlan-net and set the SSID name to wlan-net.
[WAC1-wlan-view] ssid-profile name wlan-net
[WAC1-wlan-ssid-prof-wlan-net] ssid wlan-net
[WAC1-wlan-ssid-prof-wlan-net] quit
# Create the VAP profile wlan-net, set the data forwarding mode and service VLAN, and
bind the security profile and SSID profile to the VAP profile.
[WAC1-wlan-view] vap-profile name wlan-net
[WAC1-wlan-vap-prof-wlan-net] forward-mode direct-forward
[WAC1-wlan-vap-prof-wlan-net] service-vlan vlan-id 101
[WAC1-wlan-vap-prof-wlan-net] security-profile wlan-net
[WAC1-wlan-vap-prof-wlan-net] ssid-profile wlan-net
[WAC1-wlan-vap-prof-wlan-net] quit
# Bind the VAP profile to the AP group and apply configurations in the VAP profile wlannet to radios 0 and 1 on APs in the AP group.
[WAC1-wlan-view] ap-group name ap-group1
[WAC1-wlan-ap-group-ap-group1] vap-profile wlan-net wlan 1 radio 0
[WAC1-wlan-ap-group-ap-group1] vap-profile wlan-net wlan 1 radio 1
[WAC1-wlan-ap-group-ap-group1] quit
[WAC1-wlan-view] quit
HCIP-WLAN V2.0 Lab Guide
Step 9
Page 53
Trigger configuration synchronization.
[WAC1] synchronize-configuration
Warning: This operation may reset the remote AC, synchronize configurations to it, and save all its
configurations. Whether to continue? [Y/N]: y
3.3 Verification
3.3.1 Checking the AP Onboarding Status
# Run the display ap all command on WAC1 to verify that the three APs are online and in
normal state.
[WAC1] display ap all
Total AP information:
nor : normal
[3]
ExtraInfo : Extra information
----------------------------------------------------------------------------------------------------------ID
MAC
Name Group
IP
Type
State STA Uptime
ExtraInfo
----------------------------------------------------------------------------------------------------------0
6ce8-748d-7540 AP1 ap-group1 10.23.100.100 AirEngine8760-X1-PRO nor
0
2M:31S 1
6ce8-748d-6d20 AP2 ap-group1 10.23.100.186 AirEngine8760-X1-PRO nor
0
1M:57S 2
6ce8-748d-6f00 AP3 ap-group1 10.23.100.110 AirEngine8760-X1-PRO nor
0
2M:7S ----------------------------------------------------------------------------------------------------------Total: 3
# Run the display ap all command on WAC2. The three APs are in standby state.
[WAC2] display ap all
Total AP information:
stdby : standby
[3]
ExtraInfo : Extra information
----------------------------------------------------------------------------------------------------------ID
MAC
Name Group
IP
Type
State STA Uptime
ExtraInfo
----------------------------------------------------------------------------------------------------------0
6ce8-748d-7540 AP1 ap-group1 10.23.100.100 AirEngine8760-X1-PRO stdby 0
1
6ce8-748d-6d20 AP2 ap-group1 10.23.100.186 AirEngine8760-X1-PRO stdby 0
2
6ce8-748d-6f00 AP3 ap-group1 10.23.100.110 AirEngine8760-X1-PRO stdby 1
----------------------------------------------------------------------------------------------------------Total: 3
3.3.2 Checking VAP Information
# Check the VAP status on WAC1.
[WAC1] display vap all
Info: This operation may take a few seconds, please wait.
WID : WLAN ID
------------------------------------------------------------------------------
HCIP-WLAN V2.0 Lab Guide
Page 54
AP ID AP name RfID WID BSSID
Status Auth type
STA
SSID
-----------------------------------------------------------------------------0
AP1
0
1
6CE8-748D-7540 ON
WPA/WPA2-PSK 0
wlan-net
0
AP1
1
1
6CE8-748D-7550 ON
WPA/WPA2-PSK 0
wlan-net
1
AP2
0
1
6CE8-748D-6D20 ON
WPA/WPA2-PSK 0
wlan-net
1
AP2
1
1
6CE8-748D-6D30 ON
WPA/WPA2-PSK 0
wlan-net
2
AP3
0
1
6CE8-748D-6F00 ON
WPA/WPA2-PSK 0
wlan-net
2
AP3
1
1
6CE8-748D-6F10 ON
WPA/WPA2-PSK 1
wlan-net
-----------------------------------------------------------------------------Total: 6
# Check the VAP status on WAC2.
[WAC2] display vap all
Info: This operation may take a few seconds, please wait.
WID : WLAN ID
-----------------------------------------------------------------------------AP ID AP name RfID WID BSSID
Status Auth type
STA
SSID
-----------------------------------------------------------------------------0
AP1
0
1
6CE8-748D-7540 ON
WPA/WPA2-PSK 0
wlan-net
0
AP1
1
1
6CE8-748D-7550 ON
WPA/WPA2-PSK 1
wlan-net
1
AP2
0
1
6CE8-748D-6D20 ON
WPA/WPA2-PSK 0
wlan-net
1
AP2
1
1
6CE8-748D-6D30 ON
WPA/WPA2-PSK 0
wlan-net
2
AP3
0
1
6CE8-748D-6F00 ON
WPA/WPA2-PSK 0
wlan-net
2
AP3
1
1
6CE8-748D-6F10 ON
WPA/WPA2-PSK 1
wlan-net
-----------------------------------------------------------------------------Total: 6
3.3.3 Checking the VRRP Status
# Run the display vrrp command on WAC1 and WAC2. The State field displayed on WAC1
is Master and that on WAC2 is Backup.
# The command output on WAC1 is as follows:
[WAC1] display vrrp
Vlanif100 | Virtual Router 1
State : Master
Virtual IP : 10.23.100.33
Master IP : 10.23.100.1
PriorityRun : 120
PriorityConfig : 120
MasterPriority : 120
Preempt : YES
Delay Time : 1800 s
TimerRun : 2 s
TimerConfig : 2 s
Auth type : NONE
Virtual MAC : 0000-5e00-0101
Check TTL : YES
Config type : admin-vrrp
Backup-forward : disabled
Track SysHealth Priority reduced : 254
SysHealth state : UP
# The command output on WAC2 is as follows:
HCIP-WLAN V2.0 Lab Guide
Page 55
[WAC2] display vrrp
Vlanif100 | Virtual Router 1
State : Backup
Virtual IP : 10.23.100.33
Master IP : 10.23.100.1
PriorityRun : 100
PriorityConfig : 100
MasterPriority : 120
Preempt : YES
Delay Time : 0 s
TimerRun : 2 s
TimerConfig : 2 s
Auth type : NONE
Virtual MAC : 0000-5e00-0101
Check TTL : YES
Config type : admin-vrrp
Backup-forward : disabled
Track SysHealth Priority reduced : 254
SysHealth state : UP
3.3.4 Checking the HSB Service Status
# Run the display hsb-service 0 command on WAC1 and WAC2 to check the HSB service
status. The following command output shows that the Service State field displays
Connected, indicating that the HSB channel has been established.
# The command output on WAC1 is as follows:
[WAC1] display hsb-service 0
Hot Standby Service Information:
---------------------------------------------------------Local IP Address
: 10.23.100.1
Peer IP Address
: 10.23.100.2
Source Port
: 10241
Destination Port
: 10241
Keep Alive Times
:3
Keep Alive Interval
:6
Service State
: Connected
Service Batch Modules :
Shared-key
:----------------------------------------------------------
# The command output on WAC2 is as follows:
[WAC2] display hsb-service 0
Hot Standby Service Information:
---------------------------------------------------------Local IP Address
: 10.23.100.2
Peer IP Address
: 10.23.100.1
Source Port
: 10241
Destination Port
: 10241
Keep Alive Times
:3
Keep Alive Interval
:6
Service State
: Connected
Service Batch Modules :
Shared-key
:-
HCIP-WLAN V2.0 Lab Guide
Page 56
----------------------------------------------------------
3.3.5 Checking the HSB Group Status
# Run the display hsb-group 0 command on WAC1 and WAC2 to check the running
status of the HSB group. The following command output shows that the Group VRRP
Status field displays Connected and the Group Status field displays Active on WAC1, and
these fields display Backup and Inactive, respectively, on WAC2.
# The command output on WAC1 is as follows:
[WAC1] display hsb-group 0
Hot Standby Group Information:
---------------------------------------------------------HSB-group ID
:0
Vrrp Group ID
:1
Vrrp Interface
: Vlanif100
Service Index
:0
Group Vrrp Status
: Master
Group Status
: Active
Group Backup Process
: Batch-Started
Backup Start Time
:Peer Group Device Name
: AirEngine9700-M1
Peer Group Software Version : V200R022C00SPC100B215
Group Backup Modules
: Access-user
AP
DHCP
----------------------------------------------------------
# The command output on WAC2 is as follows:
[WAC2] display hsb-group 0
Hot Standby Group Information:
---------------------------------------------------------HSB-group ID
:0
Vrrp Group ID
:1
Vrrp Interface
: Vlanif100
Service Index
:0
Group Vrrp Status
: Backup
Group Status
: Inactive
Group Backup Process
: Realtime
Backup Start Time
: XX, XX XX XX 12:08:02
Peer Group Device Name
: AirEngine9700-M1
Peer Group Software Version : V200R022C00SPC100B215
Group Backup Modules
: Access-user
DHCP
AP
----------------------------------------------------------
3.3.6 Checking the Wireless Configuration Synchronization Status
# Check the wireless configuration synchronization status on WAC1. The Status field
displays up, indicating that the configurations have been synchronized.
HCIP-WLAN V2.0 Lab Guide
Page 57
[WAC1] display sync-configuration status
Info: This operation may take a few seconds. Please wait for a moment.done.
Controller role:Master/Backup/Local
---------------------------------------------------------------------------------------------------Controller IP Role
Device Type
Version
Status Last synced
---------------------------------------------------------------------------------------------------10.23.100.2 Backup AirEngine9700-M1
V200R022C00SPC100B215 up XXXX-XX-XX/11:57:11
---------------------------------------------------------------------------------------------------Total: 1
# Check the wireless configuration synchronization configuration on WAC1.
[WAC1] display sync-configuration master-redundancy
Master redundancy configuration:
--------------------------------------------------------------------------------------Peer IP Version
: IPV4
Peer IP
: 10.23.100.2
VRRP Interface
: Vlanif100
VRRP Vrid
:1
VRRP Status
: Master
VRRP Type
: VRRPv4
---------------------------------------------------------------------------------------
# Check the wireless configuration synchronization status on WAC2. The Status field
displays up, indicating that the configurations have been synchronized.
[WAC2] display sync-configuration status
Info: This operation may take a few seconds. Please wait for a moment.done.
Controller role:Master/Backup/Local
---------------------------------------------------------------------------------------------------Controller IP Role
Device Type
Version
Status Last synced
---------------------------------------------------------------------------------------------------10.23.100.1 Master AirEngine9700-M1
V200R022C00SPC100B215 up XXXX-XX-XX/12:08:25
---------------------------------------------------------------------------------------------------Total: 1
# Check the wireless configuration synchronization configuration on WAC2.
[WAC2] display sync-configuration master-redundancy
Master redundancy configuration:
--------------------------------------------------------------------------------------Peer IP Version
: IPV4
Peer IP
: 10.23.100.1
VRRP Interface
: Vlanif100
VRRP Vrid
:1
VRRP Status
: Backup
VRRP Type
: VRRPv4
---------------------------------------------------------------------------------------
3.3.7 Associating a STA with the WLAN and Testing Network
Connectivity
# Enable a STA to scan and connect to the WLAN wlan-net.
HCIP-WLAN V2.0 Lab Guide
# Test the network connectivity between the STA and the service gateway.
3.4 Reference Configuration
3.4.1 WAC1 Configuration
Software Version V200R022C00SPC100
#
sysname WAC1
#
vrrp recover-delay 60
#
vlan batch 100 to 101
#
interface Vlanif100
ip address 10.23.100.1 255.255.255.0
vrrp vrid 1 virtual-ip 10.23.100.33
admin-vrrp vrid 1
vrrp vrid 1 priority 120
vrrp vrid 1 preempt-mode timer delay 1800
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
capwap source ip-address 10.23.100.33
capwap dtls psk %^%#^zZq<D7&>Mc-euO[wdR)zrjY4I`*oJ%UcK6sn%t5%^%#
Page 58
HCIP-WLAN V2.0 Lab Guide
Page 59
capwap dtls inter-controller psk %^%#dKz03q"#ARJH__Pm`Yc(6QMF>dsn6M:M247\g!I&%^%#
capwap dtls no-auth enable
#
hsb-service 0
service-ip-port local-ip 10.23.100.1 peer-ip 10.23.100.2 local-data-port 10241 peer-data-port 10241
service-keep-alive detect retransmit 3 interval 6
#
hsb-group 0
track vrrp vrid 1 interface Vlanif100
bind-service 0
hsb enable
#
hsb-service-type access-user hsb-group 0
#
hsb-service-type dhcp hsb-group 0
#
hsb-service-type ap hsb-group 0
#
wlan
temporary-management psk %^%#]=IoJfY9,RSF6n=j_GR*f{ezH4ZW@Yt,e9@B2(lQ%^%#
ap username admin password cipher %^%#.@f7"VLLMM(GI+Hg1Y[EXSVn9Fb4ULu2c7Ik,~*T%^%#
security-profile name wlan-net
security wpa-wpa2 psk pass-phrase %^%#o!yBW6ad6&3vHgWC"5`MN2q//vkIP#k6B'"}A$|4%^%#
aes
ssid-profile name wlan-net
ssid wlan-net
vap-profile name wlan-net
service-vlan vlan-id 101
ssid-profile wlan-net
security-profile wlan-net
ap-group name ap-group1
radio 0
vap-profile wlan-net wlan 1
radio 1
vap-profile wlan-net wlan 1
ap-id 0 type-id 125 ap-mac 6ce8-748d-7540 ap-sn 2102353GSG10N7100245
ap-name AP1
ap-group ap-group1
ap-id 1 type-id 125 ap-mac 6ce8-748d-6d20 ap-sn 2102353GSG10N7100219
ap-name AP2
ap-group ap-group1
ap-id 2 type-id 125 ap-mac 6ce8-748d-6f00 ap-sn 2102353GSG10N7100225
ap-name AP3
ap-group ap-group1
provision-ap
master controller
master-redundancy track-vrrp vrid 1 interface Vlanif100
master-redundancy peer-ip ip-address 10.23.100.2 local-ip ip-address 10.23.100.1
psk %^%#|~)q#J~^+$6.,2T)LEW#',X`=@}o,2NuzAQ<JW:M%^%#
#
return
HCIP-WLAN V2.0 Lab Guide
Page 60
3.4.2 WAC2 Configuration
Software Version V200R022C00SPC100
#
sysname WAC2
#
vrrp recover-delay 60
#
vlan batch 100 to 101
#
interface Vlanif100
ip address 10.23.100.2 255.255.255.0
vrrp vrid 1 virtual-ip 10.23.100.33
admin-vrrp vrid 1
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
capwap source ip-address 10.23.100.33
capwap dtls psk %^%#^zZq<D7&>Mc-euO[wdR)zrjY4I`*oJ%UcK6sn%t5%^%#
capwap dtls inter-controller psk %^%#vxg,A#,.H:Fy16L/[z1O-]Ey).1AJJUQ_e5Xv\UX%^%#
capwap dtls no-auth enable
#
hsb-service 0
service-ip-port local-ip 10.23.100.2 peer-ip 10.23.100.1 local-data-port 10241 peer-data-port 10241
service-keep-alive detect retransmit 3 interval 6
#
hsb-group 0
track vrrp vrid 1 interface Vlanif100
bind-service 0
hsb enable
#
hsb-service-type access-user hsb-group 0
#
hsb-service-type dhcp hsb-group 0
#
hsb-service-type ap hsb-group 0
#
wlan
temporary-management psk %^%#]=IoJfY9,RSF6n=j_GR*f{ezH4ZW@Yt,e9@B2(lQ%^%#
ap username admin password cipher %^%#.@f7"VLLMM(GI+Hg1Y[EXSVn9Fb4ULu2c7Ik,~*T%^%#
security-profile name wlan-net
security wpa-wpa2 psk pass-phrase %^%#o!yBW6ad6&3vHgWC"5`MN2q//vkIP#k6B'"}A$|4%^%#
aes
ssid-profile name wlan-net
ssid wlan-net
vap-profile name wlan-net
service-vlan vlan-id 101
ssid-profile wlan-net
security-profile wlan-net
ap-group name ap-group1
radio 0
vap-profile wlan-net wlan 1
radio 1
HCIP-WLAN V2.0 Lab Guide
vap-profile wlan-net wlan 1
ap-id 0 type-id 125 ap-mac 6ce8-748d-7540 ap-sn 2102353GSG10N7100245
ap-name AP1
ap-group ap-group1
ap-id 1 type-id 125 ap-mac 6ce8-748d-6d20 ap-sn 2102353GSG10N7100219
ap-name AP2
ap-group ap-group1
ap-id 2 type-id 125 ap-mac 6ce8-748d-6f00 ap-sn 2102353GSG10N7100225
ap-name AP3
ap-group ap-group1
provision-ap
master controller
master-redundancy track-vrrp vrid 1 interface Vlanif100
master-redundancy peer-ip ip-address 10.23.100.1 local-ip ip-address 10.23.100.2
psk %^%#4Ss!;Fhj"RtZDU8QSRD4i.c3$S!<1Y[iQ);)(n@R%^%#
#
return
3.4.3 SW-Core Configuration
!Software Version V200R022C00SPC500
#
sysname SW-Core
#
vlan batch 100 to 101
#
dhcp enable
#
interface Vlanif100
ip address 10.23.100.254 255.255.255.0
dhcp select interface
dhcp server excluded-ip-address 10.23.100.1 10.23.100.9
#
interface Vlanif101
ip address 10.23.101.254 255.255.255.0
dhcp select interface
#
interface MultiGE0/0/1
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/2
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/9
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
return
Page 61
HCIP-WLAN V2.0 Lab Guide
Page 62
3.4.4 SW-Access Configuration
!Software Version V200R022C00SPC500
#
sysname SW-Access
#
vlan batch 100 to 101
#
interface MultiGE0/0/1
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/2
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/3
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/9
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
return
3.5 Quiz
In this lab, the hsb-service-type dhcp hsb-group 0 command is used to bind the DHCP
service to an HSB group, and wireless configuration synchronization is configured. What
information is synchronized in the preceding configuration?
Answer:
Two WACs function as DHCP servers in active/standby mode. If the active DHCP server
fails, information about user address assignment will be synchronized to the standby
DHCP server before traffic is switched to the standby DHCP server. This mechanism
ensures that the standby DHCP server can assign IP addresses to users without IP address
conflicts.
HCIP-WLAN V2.0 Lab Guide
4
Page 63
Cloud Management Networking Lab
4.1 Introduction
4.1.1 About This Lab
This lab instructs you to configure the cloud WAC + Fit AP and the cloud AP networking
modes.
4.1.2 Objectives
⚫
Understand the basic configuration process of the WLAN service.
⚫
Understand the cloud WAC + Fit AP networking architecture and cloud-based WAC
configuration.
⚫
Understand the cloud AP networking architecture and cloud-based AP configuration.
4.1.3 Networking Topology
Figure 4-1 Cloud management networking topology
HCIP-WLAN V2.0 Lab Guide
Page 64
4.1.4 Lab Planning
Table 4-1 VLAN planning
Device
SW-Core
Port
Port Type
MultiGE0/0/3
Trunk
MultiGE0/0/4
Trunk
VLAN Settings
PVID: 1
Allow-pass: VLANs 18 100 and 101
PVID: 1
Allow-pass: VLAN 18
PVID: 1
SW-Access
MultiGE0/0/9
Trunk
MultiGE0/0/1
Trunk
MultiGE0/0/2
Trunk
MultiGE0/0/3
Trunk
MultiGE0/0/5
Trunk
Allow-pass: VLANs 100, 101, 200, and
201
PVID: 100
Allow-pass: VLANs 100 and 101
PVID: 100
Allow-pass: VLANs 100 and 101
PVID: 100
Allow-pass: VLANs 100 and 101
PVID: 1
Allow-pass: VLAN 200 201
PVID: 1
WAC3
MultiGE0/0/9
Trunk
GE 0/0/1
Trunk
Allow-pass: VLANs 100, 101, 200, and
201
PVID: 1
Allow-pass: VLANs 18 100 and 101
Table 4-2 IP address planning
Device
SW-Core
WAC3
Port
IP Address
VLANIF 18
172.18.134.246/17
VLANIF 100
10.23.100.254/24
VLANIF 101
10.23.101.254/24
VLANIF 200
10.23.200.254/24
VLANIF 201
10.23.201.254/24
VLANIF 18
172.18.134.236/17
HCIP-WLAN V2.0 Lab Guide
Device
Port
Page 65
IP Address
VLANIF 100
10.23.100.3/24
AP5
/
Automatically obtained through
DHCP
iMaster NCE-Campus (NCE
for short)
/
172.18.134.230/17
Table 4-3 WAC3 service parameter planning
WLAN Service
Parameter
Forwarding mode
Direct forwarding
Management
VLAN
100
Service VLAN
101
AP group
ap-group1
VAP profile
wlan-net
Security profile
wlan-net
Security policy
WPA/WPA2+PSK+AES
Password
a12345678
SSID profile
wlan-net
SSID
wlan-net
Table 4-4 AP5 service parameter planning
WLAN Service
Parameter
Forwarding mode
Direct forwarding
Management
VLAN
200
Service VLAN
201
AP group
default
VAP profile
ap5
Security profile
ap5
Security policy
WPA/WPA2+PSK+AES
Password
a12345678
HCIP-WLAN V2.0 Lab Guide
SSID profile
ap5
SSID
ap5
Page 66
4.2 Lab Configuration
4.2.1 Configuration Roadmap
1.
Configure network connectivity of SW-Core, SW-Access, and WAC3.
2.
Configure network connectivity between WAC3 and NCE.
3.
Configure WAC3 to be managed by NCE. Enable AP1, AP2, and AP3 to go online on
WAC3.
4.
Configure WLAN services on WAC3.
5.
Configure AP5 to go online on NCE.
6.
Configure WLAN services on AP5.
7.
Check WLAN service availability.
4.2.2 Configuration Procedure
Step 1
Configure network connectivity.
# Configure the access switch SW-Access.
# Create VLANs 100, 101, 200, and 201 on SW-Access.
<HUAWEI> system-view
[HUAWEI] sysname SW-Access
[SW-Access] vlan batch 100 101 200 201
# Configure the types, PVIDs, and allowed VLANs for the downlink interfaces on SWAccess.
[SW-Access] interface MultiGE 0/0/1
[SW-Access-MultiGE0/0/1] port link-type trunk
[SW-Access-MultiGE0/0/1] port trunk allow-pass vlan 100 101
[SW-Access-MultiGE0/0/1] port trunk pvid vlan 100
[SW-Access-MultiGE0/0/1] quit
[SW-Access] interface MultiGE 0/0/2
[SW-Access-MultiGE0/0/2] port link-type trunk
[SW-Access-MultiGE0/0/2] port trunk allow-pass vlan 100 101
[SW-Access-MultiGE0/0/2] port trunk pvid vlan 100
[SW-Access-MultiGE0/0/2] quit
[SW-Access] interface MultiGE 0/0/3
[SW-Access-MultiGE0/0/3] port link-type trunk
[SW-Access-MultiGE0/0/3] port trunk allow-pass vlan 100 101
[SW-Access-MultiGE0/0/3] port trunk pvid vlan 100
[SW-Access-MultiGE0/0/3] quit
[SW-Access] interface MultiGE 0/0/5
HCIP-WLAN V2.0 Lab Guide
Page 67
[SW-Access-MultiGE0/0/5] port link-type trunk
[SW-Access-MultiGE0/0/5] port trunk allow-pass vlan 200 201
[SW-Access-MultiGE0/0/5] port trunk pvid vlan 200
[SW-Access-MultiGE0/0/5] quit
# Configure the type of the uplink interface on SW-Access and the allowed VLANs for the
interface.
[SW-Access] interface MultiGE 0/0/9
[SW-Access-MultiGE0/0/9] port link-type trunk
[SW-Access-MultiGE0/0/9] port trunk allow-pass vlan 100 101 200 201
[SW-Access-MultiGE0/0/9] quit
# Configure the core switch SW-Core.
# Create VLANs 100, 101, 200, and 201 on SW-Core.
<HUAWEI> system-view
[HUAWEI] sysname SW-Core
[SW-Core] vlan batch 100 101 200 201
# Configure the type of the downlink interface on SW-Core and the VLAN to which the
interface belongs.
[SW-Core] interface MultiGE 0/0/9
[SW-Core-MultiGE 0/0/9] port link-type trunk
[SW-Core-MultiGE 0/0/9] port trunk allow-pass vlan 100 101 200 201
[SW-Core-MultiGE 0/0/9] quit
# Configure the type of the interface connecting SW-Core to WAC3 and the allowed
VLANs for the interface.
[SW-Core] interface MultiGE 0/0/3
[SW-Core-MultiGE0/0/3] port link-type trunk
[SW-Core-MultiGE0/0/3] port trunk allow-pass vlan 100 101
[SW-Core-MultiGE0/0/3] quit
# Configure WAC3. Create VLANs 100 and 101. Change the type of GE0/0/1 to trunk and
configure the interface to allow packets from VLANs 100 and 101 to pass through.
# Create VLANs 100 and 101 on WAC3.
<AirEngine9700-M1> system-view
[AirEngine9700-M1] sysname WAC3
[WAC3] vlan batch 100 101
# Configure the type of GE0/0/1 on WAC3 and the allowed VLANs for the interface.
[WAC3] interface GigabitEthernet 0/0/1
[WAC3-GigabitEthernet0/0/1] port link-type trunk
[WAC3-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101
[WAC3-GigabitEthernet0/0/1] quit
HCIP-WLAN V2.0 Lab Guide
Page 68
# Configure IP addresses for SW-Core and WAC3.
# Configure IP addresses for SW-Core. VLAN 100 is the management VLAN of WAC3,
VLAN 101 is the service VLAN of WAC3, VLAN 200 is the management VLAN of AP5, and
VLAN 201 is the service VLAN of AP5.
[SW-Core] interface vlan 100
[SW-Core-Vlanif100] ip address 10.23.100.254 24
[SW-Core-Vlanif100] quit
[SW-Core] interface vlan 101
[SW-Core-Vlanif101] ip address 10.23.101.254 24
[SW-Core-Vlanif101] quit
[SW-Core] interface vlan 200
[SW-Core-Vlanif200] ip address 10.23.200.254 24
[SW-Core-Vlanif200] quit
[SW-Core] interface vlan 201
[SW-Core-Vlanif201] ip address 10.23.201.254 24
[SW-Core-Vlanif201] quit
# Configure an IP address for WAC3.
[WAC3] interface Vlanif 100
[WAC3-Vlanif100] ip address 10.23.100.3 24
[WAC3-Vlanif100] quit
Step 2
Configure network connectivity between NCE and WAC3.
# The IP address and gateway of NCE have been configured during software installation
and are not described in this lab.
# The IP address of NCE is 172.18.134.230/17, and the gateway address is 172.18.128.1.
# Configure VLAN and IP address information for SW-Core.
[SW-Core] vlan 18
[SW-Core-vlan18] quit
[SW-Core] interface MultiGE 0/0/3
[SW-Core-MultiGE0/0/3] port trunk allow-pass vlan 18
[SW-Core-MultiGE0/0/3] quit
[SW-Core] interface MultiGE 0/0/4
[SW-Core-MultiGE0/0/4] port link-type trunk
[SW-Core-MultiGE0/0/4] port trunk allow-pass vlan 18
[SW-Core-MultiGE0/0/4] quit
[SW-Core] interface Vlanif 18
[SW-Core-Vlanif18] ip address 172.18.134.246 17
[SW-Core-Vlanif18] quit
# Configure VLAN and IP address information for WAC3, and configure default route,
with the next hop address pointing to the SW-Core device.
[WAC3] vlan 18
[WAC3-vlan18] quit
[WAC3] interface GigabitEthernet 0/0/1
[WAC3-GigabitEthernet0/0/1] port trunk allow-pass vlan 18
[WAC3-GigabitEthernet0/0/1] quit
HCIP-WLAN V2.0 Lab Guide
Page 69
[WAC3] interface Vlanif 18
[WAC3-Vlanif18] ip address 172.18.134.236 17
[WAC3-Vlanif18] quit
[WAC3] ip route-static 172.19.0.0 16 172.18.128.1
[WAC3] ip route-static 0.0.0.0 0.0.0.0 10.23.100.254
Step 3
Configure WAC3 to work in cloud mode.
# Configure WAC3 to work in cloud mode and specify the IP address and port number of
NCE.
[WAC3] ac-mode cloud
Warning: This operation will switch the AC mode to cloud, Continue? [Y/N] y
This operation will take several minutes, please wait...
Warning: The authentication mode is switched to SN authentication. Ensure that the APs added
offline have SN information. Otherwise, configurations of these APs may be lost..
[WAC3] cloud-mng controller ip-address 172.18.134.230 port 10020 source-interface Vlanif 100
[WAC3] pnp startup-vlan receive enable
# Test network connectivity between WAC3 and NCE.
[WAC3] ping -a 10.23.100.3 172.18.134.230
PING 172.18.134.230: 56 data bytes, press CTRL_C to break
Reply from 172.18.134.230: bytes=56 Sequence=1 ttl=62 time=1 ms
Reply from 172.18.134.230: bytes=56 Sequence=2 ttl=62 time=1 ms
Reply from 172.18.134.230: bytes=56 Sequence=3 ttl=62 time=1 ms
Reply from 172.18.134.230: bytes=56 Sequence=4 ttl=62 time=1 ms
Reply from 172.18.134.230: bytes=56 Sequence=5 ttl=62 time=1 ms
--- 172.18.134.230 ping statistics --5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 1/1/1 ms
Step 4
Configure NCE to manage WAC3.
# Log in to NCE and choose Plan > Design > Site Design > Site Management from the
main menu. Create a site named HCIP-WAC, select LSW and WAC in Device type, and
click OK in the lower right corner.
HCIP-WLAN V2.0 Lab Guide
Page 70
# Query the device ESN on WAC3.
[WAC3] display esn
ESN of device: 102276079302
# Choose Design > Device Management from the main menu. Select the site HCIP-WAC
and choose Add Device > Add.
HCIP-WLAN V2.0 Lab Guide
Page 71
# On the Manually Add page that is displayed, set Protocol type to NETCONF, Site to
HCIP-WAC, and Mode to Device Model, and click Add.
# On the page that is displayed, set the following parameters and click OK.
# Change the device name to WAC3, enter the ESN, set the description to HCIP, and click
OK.
# On the Device Management page, the status of WAC3 is Alarm, indicating that it has
been managed by NCE.
HCIP-WLAN V2.0 Lab Guide
Step 5
Page 72
Configure a DHCP server.
# SW-Core functions as a DHCP server to assign IP addresses to AP1, AP2, AP3, and STAs.
# On SW-Core, enable the DHCP service and configure VLANIF 100 on SW-Core to assign
IP addresses to APs.
[SW-Core] dhcp enable
[SW-Core] interface vlanif 100
[SW-Core-Vlanif100] dhcp select interface
[SW-Core-Vlanif100] quit
# Configure VLANIF 101 on SW-Core to assign IP addresses to STAs.
[SW-Core] interface vlanif 101
[SW-Core-Vlanif101] dhcp select interface
[SW-Core-Vlanif101] quit
Step 6
Configure WLAN services on WAC3.
# After NCE manages WAC3, APs go online and WLAN services are still configured on
WAC3. The following uses CLI commands as an example.
# Configure AP1, AP2, and AP3 to go online on WAC3. Enable the function of establishing
CAPWAP DTLS sessions in none authentication mode. (V200R021C00 and later versions)
[WAC3] capwap dtls no-auth enable
Warning: This operation allows for device access in non-DTLS encryption mode even when DTLS is
enabled and brings security risks. After the device goes online for the first time, disable this function
to prevent security risks. Continue? [Y/N]: y
# Configure the CAPWAP source interface on WAC3. Ensure that the following
parameters have been configured in advance:
DTLS PSK: a1234567
Inter-WAC DTLS PSK: a1234567
Fit AP management parameters (user name/password): admin/HUAWEI@123
Global login password of the offline management VAP: a1234567
[WAC3] capwap dtls psk a1234567
[WAC3] capwap dtls inter-controller psk a1234567
[WAC3] capwap source interface vlanif 100
HCIP-WLAN V2.0 Lab Guide
Page 73
Set the user name for FIT APs(The value is a string of 4 to 31 characters, which can contain letters,
underscores, and digits, and must start with a letter): admin
Set the password for FIT APs(plain-text password of 8-128 characters or cipher-text password of 48188 characters that must be a combination of at least three of the following: lowercase letters a to z,
uppercase letters A to Z, digits, and special characters): HUAWEI@123
Confirm password: HUAWEI@123
Set the global temporary-management psk(contains 8-63 plain-text characters, or 48-108 cipher-text
characters that must be a combination of at least two of the following: lowercase letters a to z,
uppercase letters A to Z, digits, and special characters): a1234567
Confirm PSK: a1234567
Warning: Ensure that the management VLAN and service VLAN are different. Otherwise, services may
be interrupted.
Warning: Before an added device goes online for the first time, enable DTLS no-auth if it runs a
version earlier than V200R021C00 or enable DTLS certificate-mandatory-match if it runs
V200R021C00 or later.
# Set the AP authentication mode to SN authentication on WAC3. (The WAC in cloud
mode supports only SN authentication.)
[WAC3] wlan
[WAC3-wlan-view] ap auth-mode sn-auth
[WAC3-wlan-view] quit
# Choose Design > Device Management from the main menu. Select the site HCIP-WAC
and click WAC3. The WAC3 management page is displayed.
# Three devices are not managed. Select them and then click Repair.
# In the dialog box that is displayed, select HCIP-WAC and click OK.
HCIP-WLAN V2.0 Lab Guide
Page 74
# In the Result dialog box that is displayed, the three devices have been repaired
successfully and are managed by NCE.
# On the WAC3 management page, the status of the three APs is Normal and the
running status is normal.
HCIP-WLAN V2.0 Lab Guide
Page 75
# Identify and change the AP name based on the AP SN. For example, to change the
name of AP1, click the modify icon in the Operation column corresponding to SN
2102353VUR10N5119370 on the device management page.
HCIP-WLAN V2.0 Lab Guide
Page 76
# After the names of AP1, AP2, and AP3 are changed, the following information is
displayed.
# Create the AP group ap-group1 on WAC3 and add AP1, AP2, and AP3 to the AP group.
[WAC3] wlan
[WAC3-wlan-view] ap-group name ap-group1
[WAC3-wlan-ap-group-ap-group1] quit
[WAC3-wlan-view] ap-id 0
[WAC3-wlan-ap-0] ap-group ap-group1
Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power
and antenna gain configurations of the radio, Whether to continue? [Y/N]: y
Info: This operation may take a few seconds. Please wait for a moment.. done.
[WAC3-wlan-ap-0] quit
[WAC3-wlan-view] ap-id 1
[WAC3-wlan-ap-1] ap-group ap-group1
Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power
and antenna gain configurations of the radio, Whether to continue? [Y/N]: y
Info: This operation may take a few seconds. Please wait for a moment.. done.
[WAC3-wlan-ap-1] quit
[WAC3-wlan-view] ap-id 2
[WAC3-wlan-ap-2] ap-group ap-group1
Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power
and antenna gain configurations of the radio, Whether to continue? [Y/N]: y
Info: This operation may take a few seconds. Please wait for a moment.. done.
[WAC3-wlan-ap-2] quit
[WAC3-wlan-view] quit
# Run the display ap all command to verify that the three APs are online and in normal
state.
[WAC3] display ap all
Total AP information:
nor : normal
[3]
ExtraInfo : Extra information
----------------------------------------------------------------------------------------------------------ID
MAC
Name Group
IP
Type
State STA Uptime
ExtraInfo
----------------------------------------------------------------------------------------------------------0
6ce8-748d-6d20 AP1 ap-group1 10.23.100.201 AirEngine8760-X1-PRO nor
0
52S
1
6ce8-748d-6f00 AP2 ap-group1 10.23.100.132 AirEngine8760-X1-PRO nor
0
2
6ce8-748d-7540 AP3 ap-group1 10.23.100.13 AirEngine8760-X1-PRO nor
0
3S
----------------------------------------------------------------------------------------------------------Total: 3
HCIP-WLAN V2.0 Lab Guide
Page 77
# Configure WLAN services.
# Configure the country code in a regulatory domain profile. The default country code is
CN. (If the device is located outside China, change the country code accordingly.)
[WAC3] wlan
[WAC3-wlan-view] regulatory-domain-profile name domain1
[WAC3-wlan-regulate-domain-domain1] country-code CN
[WAC3-wlan-regulate-domain-domain1] quit
# Bind the regulatory domain profile to the AP group.
[WAC3-wlan-view] ap-group name ap-group1
[WAC3-wlan-ap-group-ap-group1] regulatory-domain-profile domain1
Warning: This configuration change will clear the channel and power configurations of radios, and
may restart APs. Continue?[Y/N]: y
[WAC3-wlan-ap-group-ap-group1] quit
# Create the security profile wlan-net and configure a security policy in the profile.
[WAC3-wlan-view] security-profile name wlan-net
[WAC3-wlan-sec-prof-wlan-net] security wpa-wpa2 psk pass-phrase a12345678 aes
[WAC3-wlan-sec-prof-wlan-net] quit
# Create the SSID profile wlan-net and set the SSID name to wlan-net.
[WAC3-wlan-view] ssid-profile name wlan-net
[WAC3-wlan-ssid-prof-wlan-net] ssid wlan-net
[WAC3-wlan-ssid-prof-wlan-net] quit
# Create the VAP profile wlan-net, set the data forwarding mode and service VLAN, and
bind the security profile and SSID profile to the VAP profile.
[WAC3-wlan-view] vap-profile name wlan-net
[WAC3-wlan-vap-prof-wlan-net] forward-mode direct-forward
[WAC3-wlan-vap-prof-wlan-net] service-vlan vlan-id 101
[WAC3-wlan-vap-prof-wlan-net] security-profile wlan-net
[WAC3-wlan-vap-prof-wlan-net] ssid-profile wlan-net
[WAC3-wlan-vap-prof-wlan-net] quit
# Bind the VAP profile to the AP group and apply configurations in the VAP profile wlannet to radios 0 and 1 on APs in the AP group.
[WAC3-wlan-view] ap-group name ap-group1
[WAC3-wlan-ap-group-ap-group1] vap-profile wlan-net wlan 1 radio 0
[WAC3-wlan-ap-group-ap-group1] vap-profile wlan-net wlan 1 radio 1
[WAC3-wlan-ap-group-ap-group1] quit
[WAC3-wlan-view] quit
# Check the VAP status.
[WAC3] display vap all
Info: This operation may take a few seconds, please wait.
HCIP-WLAN V2.0 Lab Guide
Page 78
WID : WLAN ID
-----------------------------------------------------------------------------AP ID AP name RfID WID BSSID
Status Auth type
STA
SSID
-----------------------------------------------------------------------------0
AP1
0
1
6CE8-748D-6D20 ON
WPA/WPA2-PSK 0
wlan-net
0
AP1
1
1
6CE8-748D-6D30 ON
WPA/WPA2-PSK 0
wlan-net
1
AP2
0
1
6CE8-748D-6F00 ON
WPA/WPA2-PSK 0
wlan-net
1
AP2
1
1
6CE8-748D-6F10 ON
WPA/WPA2-PSK 0
wlan-net
2
AP3
0
1
6CE8-748D-7540 ON
WPA/WPA2-PSK 0
wlan-net
2
AP3
1
1
6CE8-748D-7550 ON
WPA/WPA2-PSK 0
wlan-net
-----------------------------------------------------------------------------Total: 6
Step 7
Configure a DHCP server.
# Configure SW-Core as a DHCP server to assign IP addresses to AP5 and STAs. Configure
VLANIF 200 on SW-Core to assign an IP address for AP5, change the AP5 mode to cloud
mode through the DHCP Option 148 field, and carry the NCE's IP address and port
number in DHCP messages. (AP5 has only delivery configuration and is not configured.)
[SW-Core] interface Vlanif 200
[SW-Core-Vlanif200] dhcp select interface
[SW-Core-Vlanif200] dhcp server option 148 ascii "agilemode=agile-cloud;agilemanagemode=ip;agilemanage-domain=172.18.134.230;agilemanage-port=10020;ap-agilemode=agile-cloud;"
[SW-Core-Vlanif200] quit
# Configure VLANIF 201 on SW-Core to assign IP addresses to STAs associated with AP5.
[SW-Core] interface Vlanif 201
[SW-Core-Vlanif201] dhcp select interface
[SW-Core-Vlanif201] quit
# Check the IP address obtained by AP5 on SW-Core.
[SW-Core] display ip pool interface Vlanif200 used
Pool-name
: Vlanif200
Pool-No
:2
Lease
: 1 Days 0 Hours 0 Minutes
Domain-name
:Option-code
: 148
Option-subcode : -Option-type
: ascii
Option-value : "agilemode=agile-cloud;agilemanage-mode=ip;agilemanagedomain=172.18.134.230;agilemanage-port=10020;ap-agilemode=agile-cloud;"
DNS-server0
:NBNS-server0
:Netbios-type
:Position
: Interface
Status
: Unlocked
Gateway-0
:Network
: 10.23.200.0
Mask
: 255.255.255.0
VPN instance
: -Logging
: Disable
HCIP-WLAN V2.0 Lab Guide
Conflicted address recycle interval: Address Statistic: Total
:254
Idle
:253
Conflict
:0
Used
Expired
Disabled
Page 79
:1
:0
:0
------------------------------------------------------------------------------------Network section
Start
End
Total
Used Idle(Expired) Conflict Disabled
------------------------------------------------------------------------------------10.23.200.1 10.23.200.254
254
1
253(0)
0
0
------------------------------------------------------------------------------------Client-ID format as follows:
DHCP : mac-address
PPPoE : mac-address
IPSec : user-id/portnumber/vrf
PPP
: interface index
L2TP : cpu-slot/session-id
SSL-VPN : user-id/session-id
------------------------------------------------------------------------------------Index
IP
Client-ID
Type
Left Status
------------------------------------------------------------------------------------164 10.23.200.165
6ce8-748d-5dd0
DHCP
86273 Used
-------------------------------------------------------------------------------------
Step 8
Configure NCE to manage AP5.
# Obtain the device ESN of AP5. You can view the label on the rear of AP5 or run a
command to obtain the ESN.
<6ce8-748d-5dd0> display esn
ESN of device: 2102353GSG10N7100170
# Choose Design > Site Management from the main menu of NCE. Create a site named
HCIP-AP and select AP in Device type. In the Add Device area, click By Model, set Device
Type to AP, Device Model to AirEngine8760-X1-PRO, Quantity to 1, and Role to AP, and
click OK.
HCIP-WLAN V2.0 Lab Guide
Page 80
# Change the device name to AP5, enter the ESN, set the description to HCIP-AP5, and
click OK.
# Choose Design > Device Management. AP5 has been managed by NCE.
Step 9
Configure WLAN services for AP5.
# Choose Design > Device Management and click AP5. The AP5 management page is
displayed. Click Command Line in the upper right corner to perform the CLI-based
configuration for AP5.
# Create VLAN information.
<AP5> system-view
HCIP-WLAN V2.0 Lab Guide
Page 81
[AP5] vlan batch 200 201
# Create the security profile ap5 and configure a security policy in the profile.
[AP5] wlan
[AP5-wlan-view] security-profile name ap5
[AP5-wlan-sec-prof-ap5] security wpa-wpa2 psk pass-phrase a12345678 aes
[AP5-wlan-sec-prof-ap5] quit
# Create the SSID profile ap5 and set the SSID name to ap5.
[AP5-wlan-view] ssid-profile name ap5
[AP5-wlan-ssid-prof-ap5] ssid ap5
[AP5-wlan-ssid-prof-ap5] quit
# Create the VAP profile ap5, set the data forwarding mode and service VLAN, and bind
the security profile and SSID profile to the VAP profile.
[AP5-wlan-view] vap-profile name ap5
[AP5-wlan-vap-prof-ap5] forward-mode direct-forward
[AP5-wlan-vap-prof-ap5] service-vlan vlan-id 201
[AP5-wlan-vap-prof-ap5] security-profile ap5
[AP5-wlan-vap-prof-ap5] ssid-profile ap5
[AP5-wlan-vap-prof-ap5] quit
# Bind the VAP profile to AP5 (ap-id of AP5 is 0).
[AP5-wlan-view] ap-id 0
[AP5-wlan-ap-0] vap-profile ap5 wlan 1 radio 0
[AP5-wlan-ap-0] vap-profile ap5 wlan 1 radio 1
[AP5-wlan-ap-0] quit
[AP5-wlan-view] quit
# Check AP5 onboarding information.
[AP5] display ap all
Total AP information:
nor : normal
[1]
ExtraInfo : Extra information
---------------------------------------------------------------------------------------------------------ID
MAC
Name Group IP
Type
State STA Uptime
ExtraInfo
---------------------------------------------------------------------------------------------------------0*
6ce8-748d-5dd0 AP5 default 10.23.200.165 AirEngine8760-X1-PRO nor
1
19M:34S ---------------------------------------------------------------------------------------------------------Total: 1
# Check the VAP status of AP5.
[AP5] display vap all
Info: This operation may take a few seconds, please wait.
WID : WLAN ID
------------------------------------------------------------------------------
HCIP-WLAN V2.0 Lab Guide
Page 82
AP ID AP name RfID WID BSSID
Status Auth type
STA
SSID
-----------------------------------------------------------------------------0
AP5
0
1
6CE8-748D-5DD0 ON
WPA/WPA2-PSK 1
ap5
0
AP5
1
1
6CE8-748D-5DE0 ON
WPA/WPA2-PSK 0
ap5
-----------------------------------------------------------------------------Total: 2
4.3 Verification
4.3.1 Checking Cloud Management Information on WAC3
# Run the display cloud-mng info command on WAC3 to check the cloud management
configuration and status.
[WAC3] display cloud-mng info
-----------------------------------------------------------AC status
: Online
Current used address
: 172.18.134.230
Current used port
: 10020
Controller URL
: Controller IP address
: 172.18.134.230
Controller port
: 10020
Controller backup URL
: Controller backup IP address
: Controller backup port
: Source interface
: Vlanif100
BootStrap server address
: BootStrap server port
: BootStrap backup server address : BootStrap backup server port
: Controller address source
: configuration
------------------------------------------------------------
4.3.2 Associating a STA with the WLAN and Testing Network
Connectivity
# Connect a STA to the SSID wlan-net and test the connectivity.
C:\Users\admin>ipconfig
Wireless LAN adapter WLAN:
Connection-specific DNS Suffix . . . . . . :
Link-local IPv6 Address . . . . . . . : fe80::3ce1:b4f7:546e:45a1%14
IPv4 Address . . . . . . . . . . . : 10.23.101.40
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . . . . : 10.23.101.254
C:\Users\admin>ping 10.23.101.254
Pinging 10.23.101.254 with 32 bytes of data:
Reply from 10.23.101.254: bytes=32 time=9ms TTL=254
HCIP-WLAN V2.0 Lab Guide
Reply from 10.23.101.254: bytes=32 time=7ms TTL=254
Reply from 10.23.101.254: bytes=32 time=5ms TTL=254
Reply from 10.23.101.254: bytes=32 time=8ms TTL=254
Ping statistics for 10.23.101.254:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss);
Approximate round trip times in milli-seconds:
Minimum = 5ms, Maximum = 9ms, Average = 7ms
# Connect the STA to the SSID ap5 and test the connectivity.
C:\Users\admin>ipconfig
Wireless LAN adapter WLAN:
Connection-specific DNS Suffix . . . . . . :
Link-local IPv6 Address . . . . . . . : fe80::3ce1:b4f7:546e:45a1%14
IPv4 Address . . . . . . . . . . . : 10.23.201.133
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . . . . : 10.23.201.254
C:\Users\admin>ping 10.23.201.254
Pinging 10.23.201.254 with 32 bytes of data:
Reply from 10.23.201.254: bytes=32 time=5ms TTL=254
Reply from 10.23.201.254: bytes=32 time=8ms TTL=254
Reply from 10.23.201.254: bytes=32 time=6ms TTL=254
Reply from 10.23.201.254: bytes=32 time=4ms TTL=254
Ping statistics for 10.23.201.254:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss);
Approximate round trip times in milli-seconds:
Minimum = 4ms, Maximum = 8ms, Average = 5ms
4.3.3 Checking the Device Running Status on NCE
# Choose Design > Device Management to check the device running status.
Page 83
HCIP-WLAN V2.0 Lab Guide
Page 84
4.3.4 Checking the STA Access Status on NCE
# Choose O&M > Terminal to check STA information such as the user online duration
and user list.
HCIP-WLAN V2.0 Lab Guide
Page 85
4.4 Reference Configuration
4.4.1 WAC3 Configuration
Software Version V200R022C00SPC100
#
sysname WAC3
#
vlan batch 100 to 101
#
interface Vlanif18
ip address 172.18.134.236 255.255.128.0
#
interface Vlanif100
ip address 10.23.100.3 255.255.255.0
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 18 100 to 101
#
cloud-mng controller ip-address 172.18.134.230 port 10020 source-interface Vlanif100
#
ip route-static 0.0.0.0 0.0.0.0 10.23.100.254
ip route-static 172.19.0.0 255.255.0.0 172.18.128.1
#
capwap source interface vlanif100
capwap dtls psk %^%#9,[q*R|]cHd+=v%C`T>Q7Y*P#&|_XD<[KRT5xZ$.%^%#
capwap dtls inter-controller psk %^%#NL#JGz-s)N|_U$@PUtF#=]3!MeT*>1#$7RL=N^q@%^%#
capwap dtls no-auth enable
capwap dtls version1.0 enable
capwap dtls cbc enable
#
wlan
temporary-management psk %^%#mbP_-D^M[>COD"M[k=n@\6g_J=Bg~9dEnQNEv0uS%^%#
ap username admin password cipher %^%#Kz#e6xN}34GN6G,CF@l0$J(T/51<ET49~i6m!*aY%^%#
traffic-profile name default
security-profile name default
security-profile name wlan-net
security wpa-wpa2 psk pass-phrase %^%#^]&K99J\6WCt{(GG`^8+Q\GQNEEvfQ;ieT4Wfh;Y%^%#
aes
security-profile name default-wds
security-profile name default-mesh
ssid-profile name default
ssid-profile name wlan-net
ssid wlan-net
vap-profile name default
vap-profile name wlan-net
service-vlan vlan-id 101
ssid-profile wlan-net
security-profile wlan-net
wds-profile name default
mesh-handover-profile name default
mesh-profile name default
regulatory-domain-profile name default
HCIP-WLAN V2.0 Lab Guide
dca-channel 5g bandwidth 20mhz
dca-channel 6g bandwidth 20mhz
regulatory-domain-profile name domain1
air-scan-profile name default
rrm-profile name default
smart-roam snr-margin high-level-margin 15 low-level-margin 6
smart-roam unable-roam-client expire-time 120
antenna-mode omnidirection
radio-2g-profile name default
radio-5g-profile name default
wids-spoof-profile name default
wids-whitelist-profile name default
wids-profile name default
wireless-access-specification
tunnel-ap-group name default
ap-system-profile name default
port-link-profile name default
wired-port-profile name default
ap auth-mode sn-auth
ap-group name default
ap-group name ap-group1
regulatory-domain-profile domain1
radio 0
vap-profile wlan-net wlan 1
radio 1
vap-profile wlan-net wlan 1
ap-id 0 type-id 125 ap-mac 6ce8-748d-6d20 ap-sn 2102353GSG10N7100219
ap-name AP1
ap-group ap-group1
ap-id 1 type-id 125 ap-mac 6ce8-748d-6f00 ap-sn 2102353GSG10N7100225
ap-name AP2
ap-group ap-group1
ap-id 2 type-id 125 ap-mac 6ce8-748d-7540 ap-sn 2102353GSG10N7100245
ap-name AP3
ap-group ap-group1
provision-ap
#
return
4.4.2 AP5 Configuration
Software Version V200R022C00SPC100
#
vlan batch 200 to 201 3911
#
dhcp enable
#
acl name nat 2000
rule 5 deny source 169.254.2.0 0.0.0.255
rule 10 permit
#
ip pool mangpool
network 169.254.2.0 mask 255.255.255.0
#
Page 86
HCIP-WLAN V2.0 Lab Guide
ip pool globaldhcp
gateway-list 10.1.1.1
network 10.1.1.0 mask 255.255.255.0
dns-list 10.1.1.1
#
interface Dialer1
ip address ppp-negotiate
nat outbound 2000
#
interface Vlanif1
nat outbound 2000
dhcp client default-route preference 1
ip address dhcp-alloc unicast
#
interface Vlanif3911
ip address 10.1.1.1 255.255.255.0
arp-proxy enable
dhcp select global
#
interface Ethernet0/0/0
#
interface Ethernet0/0/1
#
interface Ethernet0/0/46
ip address 169.254.4.1 255.255.255.0
#
interface Ethernet0/0/47
ip address 169.254.3.1 255.255.255.0
#
interface XGigabitEthernet0/0/0
port hybrid tagged vlan 2 to 3910 3912 to 4094
dhcp snooping trusted
#
interface MultiGE0/0/0
port hybrid tagged vlan 2 to 3910 3912 to 4094
dhcp snooping trusted
#
interface MultiGE0/0/1
port hybrid tagged vlan 2 to 3910 3912 to 4094
dhcp snooping trusted
#
interface NULL0
#
wmi-server
server ip-address 172.18.134.230 port 10032
collect-item device-data interval 300
collect-item radio-data interval 300
collect-item ssid-data interval 300
collect-item interface-data interval 300
collect-item terminal-data interval 300
collect-item log-data disable
collect-item location-data disable
collect-item security-data disable
collect-item application-statistics-data disable
collect-item neighbor-device-data interval 300
Page 87
HCIP-WLAN V2.0 Lab Guide
Page 88
collect-item emdi-data disable
collect-item cpcar-data disable
collect-item dns-data enable
collect-item dns-data interval 300
collect-item non-wifi-data enable
collect-item non-wifi-data interval 300
#
wmi-server2
collect-item log-data disable
#
wlan
temporary-management psk %^%#jc,#B<}8$Ab5L=5%I%++,ngV1M';Z.Y&Z!8qK!uA%^%#
traffic-profile name default
security-profile name ap5
security wpa-wpa2 psk pass-phrase %^%#!M:"&@Xp!C3U~($"IrK3'z*5.uZ>#Q!~6'3K@LE-%^%# aes
security-profile name default
security-profile name default-mesh
ssid-profile name ap5
ssid ap5
ssid-profile name default
vap-profile name ap5
service-vlan vlan-id 201
ssid-profile ap5
security-profile ap5
vap-profile name default
mesh-profile name default
regulatory-domain-profile name default
dca-channel 5g bandwidth 20mhz
air-scan-profile name 5G
air-scan-profile name 2.4G
air-scan-profile name default
rrm-profile name 5G
calibrate min-tx-power 12
airtime-fair-schedule enable
smart-roam quick-kickoff-threshold disable
smart-roam unable-roam-client expire-time 120
sta-load-balance dynamic disable
antenna-mode omnidirection
rrm-profile name 2.4G
calibrate min-tx-power radio-5g 9
airtime-fair-schedule enable
smart-roam quick-kickoff-threshold disable
smart-roam unable-roam-client expire-time 120
sta-load-balance dynamic disable
rrm-profile name default
radio-2g-profile name 2.4G
power auto-adjust enable
rrm-profile 2.4G
air-scan-profile 2.4G
radio-2g-profile name default
radio-5g-profile name 5G
power auto-adjust enable
rrm-profile 5G
a-msdu disable
air-scan-profile 5G
HCIP-WLAN V2.0 Lab Guide
radio-5g-profile name default
wids-spoof-profile name default
wids-whitelist-profile name default
wids-profile name default
wireless-access-specification
ap-system-profile name default
mesh-route aging-time 15
user-interface vty 0 idle-timeout 10 0
user-interface vty 1 idle-timeout 10 0
user-interface vty 2 idle-timeout 10 0
user-interface vty 3 idle-timeout 10 0
user-interface vty 4 idle-timeout 10 0
traffic-optimize broadcast-suppression other-broadcast rate-threshold 64
traffic-optimize broadcast-suppression other-multicast rate-threshold 64
ble-profile name default
port-link-profile name default
wired-port-profile name default
ap-group name default
ble-profile default
radio 0
radio-2g-profile 2.4G
antenna-gain 3
radio 1
radio-5g-profile 5G
antenna-gain 3
radio 2
radio-5g-profile 5G
antenna-gain 3
ap-id 0 type-id 125 ap-mac 6ce8-748d-5dd0 ap-sn 2102353GSG10N7100170
ap-name AP5
radio 0
vap-profile ap5 wlan 1
radio 1
vap-profile ap5 wlan 1
provision-ap
#
return
4.4.3 SW-Core Configuration
!Software Version V200R022C00SPC500
#
sysname SW-Core
#
vlan batch 18 100 to 101 200 to 201
#
dhcp enable
#
interface Vlanif18
ip address 172.18.134.246 255.255.128.0
#
interface Vlanif100
ip address 10.23.100.254 255.255.255.0
dhcp select interface
Page 89
HCIP-WLAN V2.0 Lab Guide
#
interface Vlanif101
ip address 10.23.101.254 255.255.255.0
dhcp select interface
#
interface Vlanif200
ip address 10.23.200.254 255.255.255.0
dhcp select interface
dhcp server option 148 ascii "agilemode=agile-cloud;agilemanage-mode=ip;agilemanagedomain=172.18.134.230;agilemanage-port=10020;ap-agilemode=agile-cloud;"
#
interface Vlanif201
ip address 10.23.201.254 255.255.255.0
dhcp select interface
#
interface MEth0/0/1
ip address 192.168.1.253 255.255.255.0
#
interface MultiGE0/0/3
port link-type trunk
port trunk allow-pass vlan 18 100 to 101
#
interface MultiGE0/0/4
port link-type trunk
port trunk allow-pass vlan 18
#
interface MultiGE0/0/9
port link-type trunk
port trunk allow-pass vlan 100 to 101 200 to 201
#
return
4.4.4 SW-Access Configuration
!Software Version V200R022C00SPC500
#
sysname SW-Access
#
vlan batch 100 to 101 200 to 201
#
interface MultiGE0/0/1
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/2
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/3
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
Page 90
HCIP-WLAN V2.0 Lab Guide
Page 91
#
interface MultiGE0/0/5
port link-type trunk
port trunk pvid vlan 200
port trunk allow-pass vlan 200 to 201
#
interface MultiGE0/0/9
port link-type trunk
port trunk allow-pass vlan 100 to 101 200 to 201
#
return
4.5 Quiz
In the preceding lab, AP5 is switched to the cloud mode through DHCP. In addition to the
DHCP mode, what methods can be used to switch a Fit AP to the cloud mode?
Answer:
A cloud AP can switch the working mode and obtain the iMaster NCE-Campus address in
the following ways:
Using a DHCP server: This method has the highest priority and is preferred if the AP can
use multiple methods to obtain the IP address of the iMaster NCE-Campus.
Obtaining through the registration query center: Low priority.
Through manual configuration on the CLI or web platform: The priority of this method is
lower than that using a DHCP server but higher than that using the registration query
center.
HCIP-WLAN V2.0 Lab Guide
5
Page 92
802.1X Authentication Lab
5.1 Introduction
5.1.1 About This Lab
This lab instructs you to master the basic implementation and configuration methods of
802.1X access authentication.
5.1.2 Objectives
⚫
Understand the basic configuration process of the WLAN service.
⚫
Understand the basic implementation and configuration methods of 802.1X access
authentication.
5.1.3 Networking Topology
Figure 5-1 802.1X authentication lab topology
HCIP-WLAN V2.0 Lab Guide
Page 93
5.1.4 Lab Planning
Table 5-1 VLAN planning
Device
SW-Core
Port
Port Type
MultiGE0/0/1
Trunk
MultiGE0/0/9
Trunk
MultiGE0/0/4
Trunk
MultiGE0/0/9
Trunk
MultiGE0/0/1
Trunk
MultiGE0/0/2
Trunk
MultiGE0/0/3
Trunk
GE0/0/1
Trunk
PVID: 1
Allow-pass: VLANs 18 100 and 101
PVID: 1
Allow-pass: VLANs 100 and 101
PVID: 1
Allow-pass: VLAN 18
PVID: 1
Allow-pass: VLANs 100 and 101
PVID: 100
Allow-pass: VLANs 100 and 101
SW-Access
WAC1
VLAN Settings
PVID: 100
Allow-pass: VLANs 100 and 101
PVID: 100
Allow-pass: VLANs 100 and 101
PVID: 1
Allow-pass: VLANs 18 100 and 101
Table 5-2 IP address planning
Device
Port
SW-Core
WAC1
iMaster NCE-Campus
IP Address
VLANIF 100
10.23.100.254/24
VLANIF 101
10.23.101.254/24
VLANIF 18
172.18.134.246/17
VLANIF 18
172.18.134.236/17
VLANIF 100
10.23.100.1/24
/
172.18.134.230/17
Table 5-3 WLAN service parameter planning
WLAN Service
Forwarding mode
Parameter
Tunnel forwarding
HCIP-WLAN V2.0 Lab Guide
WLAN Service
Page 94
Parameter
Management
VLAN
100
Service VLAN
101
AP group
ap-group1
VAP profile
wlan-net
Security profile
wlan-net
Security policy
WPA2+802.1X+AES
SSID profile
wlan-net
SSID
wlan-net
Name of the RADIUS authentication scheme: radius_huawei
Name of the RADIUS accounting scheme: scheme1
Name of a RADIUS server template: radius_huawei
RADIUS
authentication
parameters
The RADIUS server information is as follows:
IP address: 172.18.134.230
Authentication port number: 1812
Accounting port number: 1813
Shared key: HUAWEI@123
802.1X access
profile
Name: d1
Authentication mode: EAP
Name: p1
Bound profiles and schemes:
Authentication
profile
802.1X access profile: d1
RADIUS server template: radius_huawei
RADIUS authentication scheme: radius_huawei
RADIUS accounting scheme: scheme1
5.2 Lab Configuration
5.2.1 Configuration Roadmap
1.
Configure the basic network to ensure network connectivity.
2.
Configure SW-Core as a DHCP server to assign IP addresses to STAs and APs.
3.
Configure network connectivity between NCE and WAC1.
HCIP-WLAN V2.0 Lab Guide
4.
Configure AP onboarding.
5.
Configure 802.1X authentication on WAC1.
6.
Configure basic WLAN services.
7.
Configure 802.1X authentication on NCE.
8.
Verify 802.1X access authentication.
Page 95
5.2.2 Configuration Procedure
Step 1
Configure network connectivity.
Configure the access switch SW-Access. Create VLANs 100 and 101. Configure the
downlink port to allow packets from VLANs 100 and 101 to pass through, and set the
PVID to 100. Configure the uplink port to allow packets from VLANs 100 and 101 to pass
through and set the PVID to 1.
# Create VLANs 100 and 101 on SW-Access.
<HUAWEI> system-view
[HUAWEI] sysname SW-Access
[SW-Access] vlan batch 100 101
# Configure the types, PVIDs, and allowed VLANs for the downlink interfaces on SWAccess.
[SW-Access] interface MultiGE 0/0/1
[SW-Access-MultiGE0/0/1] port link-type trunk
[SW-Access-MultiGE0/0/1] port trunk allow-pass vlan 100 101
[SW-Access-MultiGE0/0/1] port trunk pvid vlan 100
[SW-Access-MultiGE0/0/1] quit
[SW-Access] interface MultiGE 0/0/2
[SW-Access-MultiGE0/0/2] port link-type trunk
[SW-Access-MultiGE0/0/2] port trunk allow-pass vlan 100 101
[SW-Access-MultiGE0/0/2] port trunk pvid vlan 100
[SW-Access-MultiGE0/0/2] quit
[SW-Access] interface MultiGE 0/0/3
[SW-Access-MultiGE0/0/3] port link-type trunk
[SW-Access-MultiGE0/0/3] port trunk allow-pass vlan 100 101
[SW-Access-MultiGE0/0/3] port trunk pvid vlan 100
[SW-Access-MultiGE0/0/3] quit
# Configure the type of the uplink interface on SW-Access and the allowed VLANs for the
interface.
[SW-Access] interface MultiGE 0/0/9
[SW-Access-MultiGE0/0/9] port link-type trunk
[SW-Access-MultiGE0/0/9] port trunk allow-pass vlan 100 101
[SW-Access-MultiGE0/0/9] quit
Configure the core switch SW-Core. Create VLANs 100 and 101. Configure the downlink
interface and MultiGE0/0/1 connected to WAC1 to allow packets from VLANs 100 and
101 to pass through.
HCIP-WLAN V2.0 Lab Guide
Page 96
# Create VLANs 100 and 101 on SW-Core.
<HUAWEI> system-view
[HUAWEI] sysname SW-Core
[SW-Core] vlan batch 100 101
# Configure the type of the downlink interface on SW-Core and configure the interface to
allow packets from VLANs 100 and 101 to pass through.
[SW-Core] interface MultiGE 0/0/9
[SW-Core-MultiGE 0/0/9] port link-type trunk
[SW-Core-MultiGE 0/0/9] port trunk allow-pass vlan 100 101
[SW-Core-MultiGE 0/0/9] quit
# Configure the type of the interface connecting SW-Core to WAC1 and the allowed
VLANs for the interface.
[SW-Core] interface MultiGE 0/0/1
[SW-Core-MultiGE 0/0/1] port link-type trunk
[SW-Core-MultiGE 0/0/1] port trunk allow-pass vlan 100 101
[SW-Core-MultiGE 0/0/1] quit
Configure WAC1. Create VLANs 100 and 101. Change the type of GE0/0/1 to trunk and
configure the interface to allow packets from VLANs 100 and 101 to pass through.
# Create VLANs 100 and 101 on WAC1.
<AirEngine9700-M1> system-view
[AirEngine9700-M1] sysname WAC1
[WAC1] vlan batch 100 101
# Configure the type of GE0/0/1 on WAC1 and the allowed VLANs for the interface.
[WAC1] interface GigabitEthernet 0/0/1
[WAC1-GigabitEthernet /0/1] port link-type trunk
[WAC1-GigabitEthernet /0/1] port trunk allow-pass vlan 100 101
[WAC1-GigabitEthernet /0/1] quit
Configure IP addresses for SW-Core and WAC1.
# Configure IP addresses for SW-Core.
[SW-Core] interface vlan 100
[SW-Core-Vlanif100] ip address 10.23.100.254 24
[SW-Core-Vlanif100] quit
[SW-Core] interface vlan 101
[SW-Core-Vlanif101] ip address 10.23.101.254 24
[SW-Core-Vlanif101] quit
# Configure an IP address for WAC1.
[WAC1] interface vlan 100
[WAC1-Vlanif100] ip address 10.23.100.1 24
HCIP-WLAN V2.0 Lab Guide
Page 97
[WAC1-Vlanif100] quit
Step 2
Configure a DHCP server.
# Configure SW-Core as a DHCP server to assign IP addresses to STAs and APs. Enable
the DHCP service on SW-Core and configure VLANIF 100 on SW-Core to assign IP
addresses to APs.
[SW-Core] dhcp enable
[SW-Core] interface vlanif 100
[SW-Core-Vlanif100] dhcp select interface
[SW-Core-Vlanif100] quit
# Configure VLANIF 101 on SW-Core to assign IP addresses to STAs.
[SW-Core] interface vlanif 101
[SW-Core-Vlanif101] dhcp select interface
[SW-Core-Vlanif101] quit
Step 3
Configure network connectivity between NCE and WAC1.
The IP address and gateway of NCE have been configured during software installation
and are not described in this lab. The IP address of NCE is 172.18.134.230/17, and the
gateway address is 172.18.128.1.
# Configure VLAN and IP address information for SW-Core.
[SW-Core] vlan 18
[SW-Core-vlan18] quit
[SW-Core] interface MultiGE 0/0/1
[SW-Core-MultiGE0/0/1] port trunk allow-pass vlan 18
[SW-Core-MultiGE0/0/1] quit
[SW-Core] interface MultiGE 0/0/4
[SW-Core-MultiGE0/0/4] port link-type trunk
[SW-Core-MultiGE0/0/4] port trunk allow-pass vlan 18
[SW-Core-MultiGE0/0/4] quit
[SW-Core] interface Vlanif 18
[SW-Core-Vlanif18] ip address 172.18.134.246 17
[SW-Core-Vlanif18] quit
# Configure VLAN and IP address information for WAC1, and configure the default route
with the next hop address pointing to the SW-Core.
[WAC1] vlan 18
[WAC1-vlan18] quit
[WAC1] interface GigabitEthernet 0/0/1
[WAC1-GigabitEthernet0/0/1] port trunk allow-pass vlan 18
[WAC1-GigabitEthernet0/0/1] quit
[WAC1] interface Vlanif 18
[WAC1-Vlanif18] ip address 172.18.134.236 17
[WAC1-Vlanif18] quit
[WAC1] ip route-static 172.19.0.0 16 172.18.128.1
[WAC1] ip route-static 0.0.0.0 0.0.0.0 10.23.100.254
HCIP-WLAN V2.0 Lab Guide
Step 4
Page 98
Configure AP onboarding.
# Enable the function of establishing CAPWAP DTLS sessions in none authentication
mode. (V200R021C00 and later versions)
[WAC1] capwap dtls no-auth enable
Warning: This operation allows for device access in non-DTLS encryption mode even when DTLS is
enabled and brings security risks. After the device goes online for the first time, disable this function
to prevent security risks. Continue? [Y/N]: y
# Configure the CAPWAP source interface on WAC1. Ensure that the following
parameters have been configured in advance:
DTLS PSK: a1234567
Inter-WAC DTLS PSK: a1234567
Fit AP management parameters (user name/password): admin/HUAWEI@123
Global login password of the offline management VAP: a1234567
[WAC1] capwap dtls psk a1234567
[WAC1] capwap dtls inter-controller psk a1234567
[WAC1] capwap source interface vlanif 100
Set the user name for FIT APs(The value is a string of 4 to 31 characters, which can contain letters,
underscores, and digits, and must start with a letter): admin
Set the password for FIT APs(plain-text password of 8-128 characters or cipher-text password of 48188 characters that must be a combination of at least three of the following: lowercase letters a to z,
uppercase letters A to Z, digits, and special characters): HUAWEI@123
Confirm password: HUAWEI@123
Set the global temporary-management psk(contains 8-63 plain-text characters, or 48-108 cipher-text
characters that must be a combination of at least two of the following: lowercase letters a to z,
uppercase letters A to Z, digits, and special characters): a1234567
Confirm PSK: a1234567
Warning: Ensure that the management VLAN and service VLAN are different. Otherwise, services may
be interrupted.
Warning: Before an added device goes online for the first time, enable DTLS no-auth if it runs a
version earlier than V200R021C00 or enable DTLS certificate-mandatory-match if it runs
V200R021C00 or later.
# Create an AP group.
[WAC1] wlan
[WAC1-wlan-view] ap-group name ap-group1
[WAC1-wlan-ap-group-ap-group1] quit
[WAC1-wlan-view] quit
# On WAC1, set the AP authentication mode to MAC address authentication.
[WAC1] wlan
[WAC1-wlan-view] ap auth-mode mac-auth
[WAC1-wlan-view] quit
# Add APs on WAC1. (The APs' MAC addresses here are for reference only. Replace them
as required.)
HCIP-WLAN V2.0 Lab Guide
Page 99
[WAC1] wlan
[WAC1-wlan-view] ap-id 0 ap-mac 6ce8-748d-7540
[WAC1-wlan-ap-0] ap-group ap-group1
Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power
and antenna gain configurations of the radio, Whether to continue? [Y/N]: y
Info: This operation may take a few seconds. Please wait for a moment.. done.
[WAC1-wlan-ap-0] ap-name AP1
Warning: The AP name cannot be the MAC address of another AP. Otherwise, the AP name may be
lost after the device restarts.
Warning: The AP name of more than 31 characters does not take effect for APs in versions earlier
than V200R009C00.
Warning: This operation may cause AP reset. Continue? [Y/N]: y
[WAC1-wlan-ap-0] quit
[WAC1-wlan-view] ap-id 1 ap-mac 6ce8-748d-6d20
[WAC1-wlan-ap-1] ap-group ap-group1
Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power
and antenna gain configurations of the radio, Whether to continue? [Y/N]: y
Info: This operation may take a few seconds. Please wait for a moment.. done.
[WAC1-wlan-ap-1] ap-name AP2
Warning: The AP name cannot be the MAC address of another AP. Otherwise, the AP name may be
lost after the device restarts.
Warning: The AP name of more than 31 characters does not take effect for APs in versions earlier
than V200R009C00.
Warning: This operation may cause AP reset. Continue? [Y/N]: y
[WAC1-wlan-ap-1] quit
[WAC1-wlan-view] ap-id 2 ap-mac 6ce8-748d-6f00
[WAC1-wlan-ap-2] ap-group ap-group1
Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power
and antenna gain configurations of the radio, Whether to continue? [Y/N]: y
Info: This operation may take a few seconds. Please wait for a moment.. done.
[WAC1-wlan-ap-2] ap-name AP3
Warning: The AP name cannot be the MAC address of another AP. Otherwise, the AP name may be
lost after the device restarts.
Warning: The AP name of more than 31 characters does not take effect for APs in versions earlier
than V200R009C00.
Warning: This operation may cause AP reset. Continue? [Y/N]: y
[WAC1-wlan-ap-2] quit
[WAC1-wlan-view] quit
# Run the display ap all command to verify that the three APs are online and in normal
state.
[WAC1] display ap all
Total AP information:
nor : normal
[3]
ExtraInfo : Extra information
----------------------------------------------------------------------------------------------------------ID
MAC
Name Group
IP
Type
State STA Uptime
ExtraInfo
----------------------------------------------------------------------------------------------------------0
6ce8-748d-7540 AP1 ap-group1 10.23.100.13 AirEngine8760-X1-PRO nor
0
1
6ce8-748d-6d20 AP2 ap-group1 10.23.100.201 AirEngine8760-X1-PRO nor
0
2
6ce8-748d-6f00 AP3 ap-group1 10.23.100.132 AirEngine8760-X1-PRO nor
1
29S
----------------------------------------------------------------------------------------------------------Total: 3
HCIP-WLAN V2.0 Lab Guide
Step 5
Page 100
Configure 802.1X authentication on WAC1.
# Configure a RADIUS server template.
[WAC1] radius-server template radius_huawei
[WAC1-radius-radius_huawei] radius-server authentication 172.18.134.230 1812 source vlanif 100
[WAC1-radius-radius_huawei] radius-server accounting 172.18.134.230 1813 source vlanif 100
[WAC1-radius-radius_huawei] radius-server shared-key cipher HUAWEI@123
[WAC1-radius-radius_huawei] quit
[WAC1] radius-server authorization 172.18.134.230 shared-key cipher HUAWEI@123 server-group
radius_huawei
[WAC1] radius-server authorization server-source all-interface
Warning: All interface listening has security risks.
If configured, the configuration of the specified listening IP address will be removed. Continue?[Y/N]
y
Info: This operation may take some time, please wait for a moment .....
# Configure a RADIUS authentication scheme.
[WAC1] aaa
[WAC1-aaa] authentication-scheme radius_huawei
[WAC1-aaa-authen-radius_huawei] authentication-mode radius
[WAC1-aaa-authen-radius_huawei] quit
# Configure a RADIUS accounting scheme.
[WAC1-aaa] accounting-scheme scheme1
[WAC1-aaa-accounting-scheme1] accounting-mode radius
[WAC1-aaa-accounting-scheme1] accounting realtime 3
[WAC1-aaa-accounting-scheme1] quit
[WAC1-aaa] quit
# The accounting realtime command sets the real-time accounting interval, in minutes.
# Configure the 802.1X access profile d1.
[WAC1] dot1x-access-profile name d1
[WAC1-dot1x-access-profile-d1] dot1x authentication-method eap
[WAC1-dot1x-access-profile-d1] quit
# Configure the authentication profile p1. Create the authentication profile p1, and bind
the 802.1X access profile d1, RADIUS server template radius_huawei, authentication
scheme radius_huawei, and accounting scheme scheme1 to the authentication profile.
[WAC1] authentication-profile name p1
[WAC1-authentication-profile-p1] dot1x-access-profile d1
[WAC1-authentication-profile-p1] radius-server radius_huawei
[WAC1-authentication-profile-p1] authentication-scheme radius_huawei
[WAC1-authentication-profile-p1] accounting-scheme scheme1
[WAC1-authentication-profile-p1] quit
Step 6
Configuring WLAN Services
# Create the security profile wlan-net and configure a security policy in the profile.
HCIP-WLAN V2.0 Lab Guide
Page 101
[WAC1] wlan
[WAC1-wlan-view] security-profile name wlan-net
[WAC1-wlan-sec-prof-wlan-net] security wpa2 dot1x aes
Warning: This action may cause service interruption. Continue?[Y/N] y
[WAC1-wlan-sec-prof-wlan-net] quit
# Create the SSID profile wlan-net and set the SSID name to wlan-net.
[WAC1-wlan-view] ssid-profile name wlan-net
[WAC1-wlan-ssid-prof-wlan-net] ssid wlan-net
[WAC1-wlan-ssid-prof-wlan-net] quit
# Create the VAP profile wlan-net, set the data forwarding mode and service VLAN, and
bind the security profile and SSID profile to the VAP profile.
[WAC1-wlan-view] vap-profile name wlan-net
[WAC1-wlan-vap-prof-wlan-net] forward-mode tunnel
Warning: This action may cause service interruption. Continue?[Y/N] y
[WAC1-wlan-vap-prof-wlan-net] service-vlan vlan-id 101
[WAC1-wlan-vap-prof-wlan-net] security-profile wlan-net
[WAC1-wlan-vap-prof-wlan-net] ssid-profile wlan-net
[WAC1-wlan-vap-prof-wlan-net] authentication-profile p1
Warning: This action may cause service interruption. Continue?[Y/N] y
[WAC1-wlan-vap-prof-wlan-net] quit
# Bind the VAP profile to the AP group.
[WAC1-wlan-view] ap-group name ap-group1
[WAC1-wlan-ap-group-ap-group1] vap-profile wlan-net wlan 1 radio 0
[WAC1-wlan-ap-group-ap-group1] vap-profile wlan-net wlan 1 radio 1
[WAC1-wlan-ap-group-ap-group1] quit
[WAC1-wlan-view] quit
Step 7
Configure 802.1X authentication on NCE.
Before configuring access authentication on NCE, you need to create a tenant account
and password, which is not described here.
Create the user name and password for 802.1X authentication on NCE.
# Choose Policy > NAC > Admission Resources > Admission User Management from the
main menu.
HCIP-WLAN V2.0 Lab Guide
Page 102
# Choose User Management > User, click +, and create a user group named HCIP-WLAN.
# Select the HCIP-WLAN user group and click Create. On the page that is displayed, set
User name to dot1x-user, Password to Huawei@123, and Available login mode to 802.1X
& Portal 2.0 for 802.1X authentication, and click OK.
HCIP-WLAN V2.0 Lab Guide
Page 103
Add an admission device (WAC1) to NCE.
# Choose NAC > Admission Resources > Admission Device and configure an admission
device.
HCIP-WLAN V2.0 Lab Guide
Page 104
# Click Third-party Admission Device and click Create to create a third-party admission
device.
# Set parameters according to the following figure. Set Accounting key and Authorization
key both to HUAWEI@123, and Accounting interval (min) to 3, which are the same as
those configured on WAC1.
Create authentication and authorization, authorization rules, and authorization results on
NCE.
HCIP-WLAN V2.0 Lab Guide
Page 105
# Choose NAC > Admission Policy > Authentication and Authorization from the main
menu.
# Click Authentication Rules, click Create, and configure an authentication rule according
to the following figure.
HCIP-WLAN V2.0 Lab Guide
Page 106
# Click Authorization Rules, click Create, and configure an authorization rule according to
the following figure.
HCIP-WLAN V2.0 Lab Guide
Page 107
5.3 Verification
5.3.1 Checking the AP Onboarding Status
# Run the display ap all command on WAC1 to check AP information.
[WAC1] display ap all
Total AP information:
nor : normal
[3]
ExtraInfo : Extra information
-------------------------------------------------------------------------------------------------------------ID
MAC
Name Group
IP
Type
State STA Uptime
ExtraInfo
-------------------------------------------------------------------------------------------------------------0
6ce8-748d-7540 AP1 ap-group1 10.23.100.13 AirEngine8760-X1-PRO nor
1 1H:2M:31S 1
6ce8-748d-6d20 AP2 ap-group1 10.23.100.201 AirEngine8760-X1-PRO nor
0 1H:2M:31S 2
6ce8-748d-6f00 AP3 ap-group1 10.23.100.132 AirEngine8760-X1-PRO nor
0 1H:3M:0S -------------------------------------------------------------------------------------------------------------Total: 3
HCIP-WLAN V2.0 Lab Guide
Page 108
5.3.2 Checking VAP Information
# Run the display vap all command on WAC1 to check VAP information.
[WAC1] display vap all
Info: This operation may take a few seconds, please wait.
WID : WLAN ID
----------------------------------------------------------------------------AP ID AP name RfID WID BSSID
Status Auth type
STA SSID
----------------------------------------------------------------------------0
AP1
0
1
6CE8-748D-7540 ON
WPA2+802.1X 0
wlan-net
0
AP1
1
1
6CE8-748D-7550 ON
WPA2+802.1X 0
wlan-net
1
AP2
0
1
6CE8-748D-6D20 ON
WPA2+802.1X 0
wlan-net
1
AP2
1
1
6CE8-748D-6D30 ON
WPA2+802.1X 0
wlan-net
2
AP3
0
1
6CE8-748D-6F00 ON
WPA2+802.1X 0
wlan-net
2
AP3
1
1
6CE8-748D-6F10 ON
WPA2+802.1X 0
wlan-net
----------------------------------------------------------------------------Total: 6
5.3.3 Associating a STA with the WLAN and Verifying
Authentication
# Before associating a STA with the WLAN, you need to set 802.1X parameters. This lab
describes how to set 802.1X parameters on Windows 10.
# Choose Control Panel > Network and Internet > Network and Sharing Center. (Network
and Internet is displayed when the view mode of Control Panel is set to Category.) Click
Set up a new connection or network.
# In the dialog box that is displayed, select Manually connect to a wireless network and
click Next.
HCIP-WLAN V2.0 Lab Guide
# Enter a network name, set Security type and Encryption type, select Start this
connection automatically, and click Next.
# Successfully added wlan-net is displayed. Click Change connection settings.
Page 109
HCIP-WLAN V2.0 Lab Guide
Page 110
# Click the Security tab. Select Microsoft: Protected EAP (PEAP) from the drop-down list
below Choose a network authentication method, and click Settings.
# Deselect Verify the server's identity by validating the certificate, select Secure password
(EAP-MSCHAP v2) from the drop-down list box below Select Authentication Method, and
click Configure. In the dialog box that is displayed, deselect Automatically use my
Windows logon name and password and click OK.
HCIP-WLAN V2.0 Lab Guide
# On the Security tab page, click Advanced settings.
Page 111
HCIP-WLAN V2.0 Lab Guide
Page 112
# On the 802.1X settings tab page, select User authentication from the drop-down list
below Specify authentication mode, and click OK.
# Click OK. The 802.1X parameters in the Windows 10 operating system are set.
HCIP-WLAN V2.0 Lab Guide
Page 113
# After all settings are complete, select the SSID wlan-net and click Connect.
# Enter the correct user name and password (dot1x-user and Huawei@123, respectively,
in this example).
# After the connection is set up, run the ipconfig command to verify that the IP address
obtained by the wireless network adapter is on the network segment 10.23.101.0/24. Run
the ping command to test the network connectivity.
5.3.4 Checking Terminal Authentication Logs on NCE
# On NCE, choose Policy > NAC > Diagnosis and Logs > Terminal Authentication Logs to
check terminal authentication logs.
HCIP-WLAN V2.0 Lab Guide
Page 114
# Choose RADIUS Login and Logout logs > RADIUS Authentication Logs to check
terminal authentication records. The authentication rule is 802.1X, the authorization rule
is 802.1X, and the authentication result is Success.
HCIP-WLAN V2.0 Lab Guide
Page 115
5.3.5 Checking Terminal Authentication on WAC1
# Check detailed information about NAC access users on WAC1. Success indicates
successful access of a user.
[WAC1] display access-user detail
Basic:
User ID
: 65613
User name
: dot1x-user
User MAC
: 081f-7153-90b4
User IP address
: 10.23.101.196
User vpn-instance
:User IPv6 address
:User access Interface
: Wlan-Dbss17498
User vlan event
: Success
QinQVlan/UserVlan
: 0/101
User vlan source
: user request
User access time
: XXXX
User accounting session ID
: WAC1000000000001016a****0600012
User accounting mult session ID : 6CE8748D6D20E0E1A954AE6F676CB****A8249BD
User access type
: 802.1x
AP name
: AP1
Radio ID
:1
AP MAC
: 6ce8-748d-7540
SSID
: wlan-net
Online time
: 788(s)
User Group Priority
:0
AAA:
User authentication type
: 802.1x authentication
Current authentication method
: RADIUS
Current authorization method
:Current accounting method
: RADIUS
-----------------------------------------------------------------------------Total: 1, printed: 1
5.4 Reference Configuration
5.4.1 WAC1 Configuration
Software Version V200R021C00SPC100
#
sysname WAC1
#
vlan batch 18 100 to 101
#
authentication-profile name p1
dot1x-access-profile d1
authentication-scheme radius_huawei
accounting-scheme scheme1
radius-server radius_huawei
#
HCIP-WLAN V2.0 Lab Guide
Page 116
management-port isolate enable
management-plane isolate enable
#
radius-server template radius_huawei
radius-server shared-key cipher %^%#I/N%8moVPUUFK%!cJb;M;|PZ~N],pQVb*u(KD:;+%^%#
radius-server authentication 172.18.134.230 1812 source Vlanif 100 weight 80
radius-server accounting 172.18.134.230 1813 source Vlanif 100 weight 80
radius-server authorization 172.18.134.230 shared-key
cipher %^%#FjuvX'1T<!rA8(3[m'-!d*Xt+vtm/K&8&DUTTuU.%^%# server-group radius_huawei
radius-server authorization server-source all-interface
#
aaa
authentication-scheme radius_huawei
authentication-mode radius
authorization-scheme default
authorization-mode local
accounting-scheme scheme1
accounting-mode radius
accounting realtime 3
local-user admin password irreversible-cipher
$1a$Z#*{";)Ik6$LUMXJS;VWR$p7mWZtx|EN3q#M`}27Bg+[8<)ELp.$
local-user admin privilege level 15
local-user admin service-type telnet ssh http
#
interface Vlanif18
ip address 172.18.134.236 255.255.128.0
#
interface Vlanif100
ip address 10.23.100.1 255.255.255.0
management-interface
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 18 100 to 101
#
ip route-static 0.0.0.0 0.0.0.0 10.23.100.254
ip route-static 172.19.0.0 255.255.0.0 172.18.128.1
#
capwap source interface vlanif100
capwap dtls psk %^%#EJVsX!hYu4YZ2_G4#DzXA@:RKv34&REZ}|-y_]mY%^%#
capwap dtls inter-controller psk %^%#{9Wo7!%#BFZ<@EQ|:JG>Rp<|47s,v>YPa.#^!]A9%^%#
capwap dtls no-auth enable
#
wlan
calibrate enable manual
temporary-management psk %^%#PwFE@vw_"@\n9{>}k<,-;9CD7K;0/%e,LB)9,^FX%^%#
ap username admin password cipher %^%#PBMhAQ{@}1q,vb:X0*)B\.KXW7QH=Ogpvg'K*Y)I%^%#
traffic-profile name default
security-profile name default
security-profile name wlan-net
security wpa2 dot1x aes
security-profile name default-wds
security-profile name default-mesh
ssid-profile name default
ssid-profile name wlan-net
HCIP-WLAN V2.0 Lab Guide
ssid wlan-net
vap-profile name default
vap-profile name wlan-net
forward-mode tunnel
service-vlan vlan-id 101
ssid-profile wlan-net
security-profile wlan-net
authentication-profile p1
wds-profile name default
mesh-handover-profile name default
mesh-profile name default
regulatory-domain-profile name default
air-scan-profile name default
rrm-profile name default
radio-2g-profile name default
radio-5g-profile name default
wids-spoof-profile name default
wids-whitelist-profile name default
wids-profile name default
wireless-access-specification
ap-system-profile name default
port-link-profile name default
wired-port-profile name default
ap-group name default
ap-group name ap-group1
radio 0
vap-profile wlan-net wlan 1
radio 1
vap-profile wlan-net wlan 1
ap-id 0 type-id 125 ap-mac 6ce8-748d-7540 ap-sn 2102353GSG10N7100245
ap-name AP1
ap-group ap-group1
ap-id 1 type-id 125 ap-mac 6ce8-748d-6d20 ap-sn 2102353GSG10N7100219
ap-name AP2
ap-group ap-group1
ap-id 2 type-id 125 ap-mac 6ce8-748d-6f00 ap-sn 2102353GSG10N7100225
ap-name AP3
ap-group ap-group1
#
dot1x-access-profile name d1
dot1x-access-profile name dot1x_access_profile
#
mac-access-profile name mac_access_profile
#
return
5.4.2 SW-Core Configuration
!Software Version V200R022C00SPC500
#
sysname SW-Core
#
vlan batch 18 100 to 101
#
Page 117
HCIP-WLAN V2.0 Lab Guide
dhcp enable
#
interface Vlanif18
ip address 172.18.134.246 255.255.128.0
#
interface Vlanif100
ip address 10.23.100.254 255.255.255.0
dhcp select interface
#
interface Vlanif101
ip address 10.23.101.254 255.255.255.0
dhcp select interface
#
interface MultiGE0/0/1
port link-type trunk
port trunk allow-pass vlan 18 100 to 101
#
interface MultiGE0/0/4
port link-type trunk
port trunk allow-pass vlan 18
#
interface MultiGE0/0/9
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
return
5.4.3 SW-Access Configuration
!Software Version V200R022C00SPC500
#
sysname SW-Access
#
vlan batch 100 to 101
#
interface MultiGE0/0/1
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/2
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/3
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/9
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
Page 118
HCIP-WLAN V2.0 Lab Guide
Page 119
return
5.5 Quiz
In this lab, the authentication mode for 802.1X users is set to EAP. What other
authentication modes can be configured for 802.1X users?
Answer:
Run the dot1x authentication-method command to configure the authentication mode
for 802.1X users. The authentication mode for 802.1X users can be set to EAP, CHAP, or
PAP.
EAP: indicates relay authentication using the Extensible Authentication Protocol (EAP).
CHAP: indicates EAP termination authentication using the Challenge Handshake
Authentication Protocol (CHAP).
PAP: EAP termination authentication using the Password Authentication Protocol (PAP)
HCIP-WLAN V2.0 Lab Guide
6
Page 120
Portal Authentication Lab
6.1 Introduction
6.1.1 About This Lab
This lab instructs you to master the basic implementation and configuration methods of
Portal access authentication.
6.1.2 Objectives
⚫
Understand the basic configuration process of the WLAN service.
⚫
Understand the basic implementation and configuration methods of Portal access
authentication.
6.1.3 Networking Topology
Figure 6-1 Portal authentication lab topology
HCIP-WLAN V2.0 Lab Guide
Page 121
6.1.4 Lab Planning
Table 6-1 VLAN planning
Device
Port
SW-Core
Port Type
MultiGE0/0/1
Trunk
MultiGE0/0/9
Trunk
MultiGE0/0/4
Trunk
MultiGE0/0/9
Trunk
MultiGE0/0/1
Trunk
MultiGE0/0/2
Trunk
MultiGE0/0/3
Trunk
GE0/0/1
Trunk
PVID: 1
Allow-pass: VLANs 18 100 and 101
PVID: 1
Allow-pass: VLANs 100 and 101
PVID: 1
Allow-pass: VLAN 18
PVID: 1
Allow-pass: VLANs 100 and 101
PVID: 100
Allow-pass: VLANs 100 and 101
SW-Access
WAC1
VLAN Settings
PVID: 100
Allow-pass: VLANs 100 and 101
PVID: 100
Allow-pass: VLANs 100 and 101
PVID: 1
Allow-pass: VLANs 18 100 and 101
Table 6-2 IP address planning
Device
SW-Core
WAC1
iMaster NCE-Campus
Port
IP Address
VLANIF 100
10.23.100.254/24
VLANIF 101
10.23.101.254/24
VLANIF 18
172.18.134.246/17
VLANIF 18
172.18.134.236/17
VLANIF 100
10.23.100.1/24
/
172.18.134.230/17
Table 6-3 WLAN service parameter planning
WLAN Service
Forwarding mode
Parameter
Tunnel forwarding
HCIP-WLAN V2.0 Lab Guide
WLAN Service
Page 122
Parameter
Management VLAN
100
Service VLAN
101
AP group
ap-group1
VAP profile
wlan-net
Security profile
wlan-net
Security policy
OPEN
SSID profile
wlan-net
SSID
wlan-net
Name of the RADIUS authentication scheme:
radius_huawei
Name of the RADIUS accounting scheme: scheme1
RADIUS authentication
parameters
Name of the RADIUS server template:
radius_huawei
IP address: 172.18.134.230
Authentication port number: 1812
Accounting port number: 1813
Shared key: HUAWEI@123
Name: abc
IP address: 172.18.134.230
Portal server template
URL: https://172.18.134.230:19008/portal
Destination port number in the packets sent by
WAC1 to the Portal server: 50200
Portal shared key: HUAWEI@123
Portal access profile
Authentication-free rule profile
Name: portal1
Bound profile: Portal server template abc
Name: free1
Name: p1
Bound profiles and schemes:
Portal access profile portal1
Authentication profile
RADIUS server template radius_huawei
RADIUS authentication scheme radius_huawei
RADIUS accounting scheme scheme1
Authentication-free rule profile free1
HCIP-WLAN V2.0 Lab Guide
Page 123
6.2 Lab Configuration
6.2.1 Configuration Roadmap
1.
Configure the basic network to ensure network connectivity.
2.
Configure SW-Core as a DHCP server to assign IP addresses to STAs and APs.
3.
Configure network connectivity between NCE and WAC1.
4.
Configure AP onboarding.
5.
Configure Portal authentication on WAC1.
6.
Configure basic WLAN services.
7.
Configure Portal authentication on NCE.
8.
Verify Portal authentication.
6.2.2 Configuration Procedure
Step 1
Configure network connectivity.
# For details, see Step 1 in section 5.2.2 "Configuration Procedure."
Step 2
Configure a DHCP server.
# For details, see Step 2 in section 5.2.2 "Configuration Procedure."
Step 3
Configure network connectivity between NCE and WAC1.
# For details, see Step 3 in section 5.2.2 "Configuration Procedure."
Step 4
Configure AP onboarding.
# For details, see Step 4 in section 5.2.2 "Configuration Procedure."
Step 5
Configure Portal authentication on WAC1.
# Configure a RADIUS server template.
[WAC1] radius-server template radius_huawei
[WAC1-radius-radius_huawei] radius-server authentication 172.18.134.230 1812 source vlanif 100
[WAC1-radius-radius_huawei] radius-server accounting 172.18.134.230 1813 source vlanif 100
[WAC1-radius-radius_huawei] radius-server shared-key cipher HUAWEI@123
[WAC1-radius-radius_huawei] quit
[WAC1] radius-server authorization 172.18.134.230 shared-key cipher HUAWEI@123 server-group
radius_huawei
[WAC1] radius-server authorization server-source all-interface
Warning: All interface listening has security risks.
If configured, the configuration of the specified listening IP address will be removed. Continue?[Y/N]
y
Info: This operation may take some time, please wait for a moment .....
# Configure an authentication scheme that uses RADIUS authentication.
[WAC1] aaa
HCIP-WLAN V2.0 Lab Guide
Page 124
[WAC1-aaa] authentication-scheme radius_huawei
[WAC1-aaa-authen-radius_huawei] authentication-mode radius
[WAC1-aaa-authen-radius_huawei] quit
# Configure a RADIUS accounting scheme.
[WAC1-aaa] accounting-scheme scheme1
[WAC1-aaa-accounting-scheme1] accounting-mode radius
[WAC1-aaa-accounting-scheme1] accounting realtime 3
[WAC1-aaa-accounting-scheme1] quit
[WAC1-aaa] quit
# Configure a URL template. When NCE functions as a Portal server, the default port
number of the Portal page is 19008.
[WAC1] url-template name url1
[WAC1-url-template-url1] url https://172.18.134.230:19008/portal
[WAC1-url-template-url1] url-parameter redirect-url redirect-url ssid ssid user-ipaddress userip usermac usermac device-ip ac-ip
[WAC1-url-template-url1] quit
# Configure a Portal server template. When NCE functions as a Portal server, the default
listening port is 50200.
[WAC1] web-auth-server server-source all-interface
Warning: All interface listening has security risks.
If configured, the configuration of the specified listening IP address will be removed. Continue?[Y/N]
y
[WAC1] web-auth-server abc
[WAC1-web-auth-server-abc] server-ip 172.18.134.230
[WAC1-web-auth-server-abc] source-ip 10.23.100.1
[WAC1-web-auth-server-abc] shared-key cipher HUAWEI@123
[WAC1-web-auth-server-abc] port 50200
[WAC1-web-auth-server-abc] url-template url1
[WAC1-web-auth-server-abc] quit
# Create the Portal access profile portal1 and configure Layer 2 Portal authentication.
[WAC1] portal-access-profile name portal1
[WAC1-portal-access-profile-portal1] web-auth-server abc direct
[WAC1-portal-access-profile-portal1] quit
# An authentication-free rule profile is used to permit basic network access rights, such
as accessing the DNS server, downloading patches, and updating the antivirus signature
database. Only the IP address of the NCE server is permitted in this lab.
[WAC1] free-rule-template name free1
[WAC1-free-rule-free1] free-rule 1 destination ip 172.18.134.230 mask 32
[WAC1-free-rule-free1] quit
# Create the authentication profile p1, and bind the Portal access profile portal1,
authentication-free rule profile free1, RADIUS server template radius_huawei,
HCIP-WLAN V2.0 Lab Guide
Page 125
authentication scheme radius_huawei, and accounting scheme scheme1 to the
authentication profile.
[WAC1] authentication-profile name p1
[WAC1-authentication-profile-p1] portal-access-profile portal1
[WAC1-authentication-profile-p1] free-rule-template free1
[WAC1-authentication-profile-p1] radius-server radius_huawei
[WAC1-authentication-profile-p1] authentication-scheme radius_huawei
[WAC1-authentication-profile-p1] accounting-scheme scheme1
[WAC1-authentication-profile-p1] quit
Step 6
Configuring WLAN Services
# Create the security profile wlan-net and configure a security policy in the profile.
[WAC1] wlan
[WAC1-wlan-view] security-profile name wlan-net
[WAC1-wlan-sec-prof-wlan-net] security open
[WAC1-wlan-sec-prof-wlan-net] quit
# Create the SSID profile wlan-net and set the SSID name to wlan-net.
[WAC1-wlan-view] ssid-profile name wlan-net
[WAC1-wlan-ssid-prof-wlan-net] ssid wlan-net
[WAC1-wlan-ssid-prof-wlan-net] quit
# Create the VAP profile wlan-net, set the data forwarding mode and service VLAN, and
bind the security profile and SSID profile to the VAP profile.
[WAC1-wlan-view] vap-profile name wlan-net
[WAC1-wlan-vap-prof-wlan-net] forward-mode tunnel
Warning: This action may cause service interruption. Continue?[Y/N] y
[WAC1-wlan-vap-prof-wlan-net] service-vlan vlan-id 101
[WAC1-wlan-vap-prof-wlan-net] security-profile wlan-net
[WAC1-wlan-vap-prof-wlan-net] ssid-profile wlan-net
[WAC1-wlan-vap-prof-wlan-net] authentication-profile p1
Warning: This action may cause service interruption. Continue?[Y/N] y
[WAC1-wlan-vap-prof-wlan-net] quit
# Bind the VAP profile to the AP group.
[WAC1-wlan-view] ap-group name ap-group1
[WAC1-wlan-ap-group-ap-group1] vap-profile wlan-net wlan 1 radio 0
[WAC1-wlan-ap-group-ap-group1] vap-profile wlan-net wlan 1 radio 1
[WAC1-wlan-ap-group-ap-group1] quit
[WAC1-wlan-view] quit
Step 7
Configure Portal authentication on NCE.
Create the user name and password for Portal authentication on NCE.
# Choose Policy > NAC > Admission Resources > Admission User Management from the
main menu.
HCIP-WLAN V2.0 Lab Guide
Page 126
# Choose User Management > User, click +, and create a user group named HCIP-WLAN.
HCIP-WLAN V2.0 Lab Guide
Page 127
# Select the HCIP-WLAN user group and click Create. On the page that is displayed, set
User name to portal-user, Password to Huawei@123, and Available login mode to Portal
and 802.1X & Portal 2.0 for Portal authentication, and click OK.
Add an admission device (WAC1) to NCE.
# Choose NAC > Admission Resources > Admission Device and configure an admission
device.
HCIP-WLAN V2.0 Lab Guide
Page 128
# Click Third-party Admission Device and click Create to create a third-party admission
device.
# Set parameters according to the following figure. Set Accounting key and Authorization
key both to HUAWEI@123, and Accounting interval (min) to 3, which are the same as
those configured on WAC1.
HCIP-WLAN V2.0 Lab Guide
Page 129
# Configure Portal authentication parameters. Set Portal protocol to HUAWEI
Portal(Portal2.0), Portal key to HUAWEI@123 (same as the shared-key configured on
WAC1), and Portal Authentication port to 2000 (default), and click OK. The Portal
authentication port is the default listening port of WAC1 and is used to listen to Portal
packets.
Create authentication and authorization, authorization rules, and authorization results on
NCE.
# Choose NAC > Admission Policy > Authentication and Authorization from the main
menu.
HCIP-WLAN V2.0 Lab Guide
Page 130
# Click Authentication Rules, click Create, and configure an authentication rule as
follows:
HCIP-WLAN V2.0 Lab Guide
Page 131
# Click Authorization Rules, click Create, and configure an authorization rule according to
the following figure.
HCIP-WLAN V2.0 Lab Guide
Page 132
Configure the Portal page push policy on NCE. (If there is no special requirement, use the
default page.)
# Choose Policy > NAC > Admission Resources > Page Management to manage Portal
pages.
HCIP-WLAN V2.0 Lab Guide
Page 133
# Click the Portal Page Push Policy tab, click Create, set the parameters
according to the following figures, and click OK.
HCIP-WLAN V2.0 Lab Guide
Page 134
# Check the Portal page push policy.
6.3 Verification
6.3.1 Checking the AP Onboarding Status
# Run the display ap all command on WAC1 to check the AP onboarding status. If the
State field of an AP displayed as nor, the AP goes online successfully. The IP address of
the AP is dynamically obtained through DHCP. The actual IP address is subject to the lab
result.
[WAC1] display ap all
Total AP information:
nor : normal
[3]
ExtraInfo : Extra information
----------------------------------------------------------------------------------------------------------ID
MAC
Name Group
IP
Type
State STA Uptime
ExtraInfo
----------------------------------------------------------------------------------------------------------0
6ce8-748d-7540 AP1 ap-group1 10.23.100.13 AirEngine8760-X1-PRO nor
0
16S
1
6ce8-748d-6d20 AP2 ap-group1 10.23.100.201 AirEngine8760-X1-PRO nor
0
2
6ce8-748d-6f00 AP3 ap-group1 10.23.100.132 AirEngine8760-X1-PRO nor
1
21S
-
HCIP-WLAN V2.0 Lab Guide
Page 135
----------------------------------------------------------------------------------------------------------Total: 3
6.3.2 Checking VAP Information
# Run the display vap all command on WAC1 to check VAP information.
[WAC1] display vap all
Info: This operation may take a few seconds, please wait.
WID : WLAN ID
----------------------------------------------------------------------------AP ID AP name RfID WID BSSID
Status Auth type
STA
----------------------------------------------------------------------------0
AP1
0
1
6CE8-748D-7540 ON
Open+Portal 0
0
AP1
1
1
6CE8-748D-7550 ON
Open+Portal 0
1
AP2
0
1
6CE8-748D-6D20 ON
Open+Portal 0
1
AP2
1
1
6CE8-748D-6D30 ON
Open+Portal 0
2
AP3
0
1
6CE8-748D-6F00 ON
Open+Portal 0
2
AP3
1
1
6CE8-748D-6F10 ON
Open+Portal 1
----------------------------------------------------------------------------Total: 6
SSID
wlan-net
wlan-net
wlan-net
wlan-net
wlan-net
wlan-net
6.3.3 Verifying STA Access to a WLAN in Portal Authentication
Mode
# After connected SSID wlan-net, open a browser on a STA and enter any IP address. The
Portal authentication page is displayed.
# You are redirected to the Portal authentication page, where you can enter the user
name portal-user and password Huawei@123, and select User notice to log in.
HCIP-WLAN V2.0 Lab Guide
Page 136
# Verification succeeded is displayed, indicating that you can access network resources.
HCIP-WLAN V2.0 Lab Guide
Page 137
6.3.4 Checking Terminal Authentication Logs on NCE
# On NCE, choose Policy > NAC > Diagnosis and Logs > Terminal Authentication Logs to
check terminal authentication logs.
# Click the Portal Login and Logout Logs tab to check Portal terminal authentication
records.
HCIP-WLAN V2.0 Lab Guide
Page 138
6.3.5 Checking Terminal Authentication on WAC1
# Check detailed information about NAC access users on WAC1. Success indicates
successful access of a user.
[WAC1] display access-user detail
Basic:
User ID
: 393235
User name
: portal-user
User MAC
: e0e1-a954-ae6f
User IP address
: 10.23.101.93
User vpn-instance
:User IPv6 address
:User access Interface
: Wlan-Dbss17500
User vlan event
: Success
QinQVlan/UserVlan
: 0/101
User vlan source
: user request
User access time
: XXXX/XX/XX 03:18:38
User accounting session ID
: WAC100000000000101a8****0600013
User accounting mult session ID : 6CE8748D6D20E0E1A954AE6F676CC****DE696C6
User access type
: WEB
AP name
: AP2
Radio ID
:0
AP MAC
: 6ce8-748d-6d20
SSID
: wlan-net
Online time
: 300(s)
Web-server IP address
: 172.18.134.230
User Group Priority
:0
AAA:
User authentication type
: WEB authentication
Current authentication method : RADIUS
Current authorization method
:Current accounting method
: RADIUS
-----------------------------------------------------------------------------Total: 1, printed: 1
HCIP-WLAN V2.0 Lab Guide
Page 139
6.4 Reference Configuration
6.4.1 WAC1 Configuration
Software Version V200R022C00SPC100
#
sysname WAC1
#
vlan batch 100 to 101
#
authentication-profile name p1
portal-access-profile portal1
free-rule-template free1
authentication-scheme radius_huawei
accounting-scheme scheme1
radius-server radius_huawei
#
web-auth-server server-source all-interface
#
management-port isolate enable
management-plane isolate enable
#
radius-server template radius_huawei
radius-server shared-key cipher %^%#I/N%8moVPUUFK%!cJb;M;|PZ~N],pQVb*u(KD:;+%^%#
radius-server authentication 172.18.134.230 1812 source Vlanif 100 weight 80
radius-server accounting 172.18.134.230 1813 source Vlanif 100 weight 80
radius-server authorization 172.18.134.230 shared-key
cipher %^%#FjuvX'1T<!rA8(3[m'-!d*Xt+vtm/K&8&DUTTuU.%^%# server-group radius_huawei
radius-server authorization server-source all-interface
#
free-rule-template name default_free_rule
#
free-rule-template name free1
free-rule 1 destination ip 172.18.134.230 mask 255.255.255.255
#
url-template name url1
url https://172.18.134.230:19008/portal
url-parameter redirect-url redirect-url ssid ssid user-ipaddress userip user-mac usermac device-ip acip
#
web-auth-server abc
server-ip 172.18.134.230
port 50200
shared-key cipher %^%#/H+oJc*rtC_]{(WRUDt4un;&<1:g~NP{q(SD$ux#%^%#
url-template url1
source-ip 10.23.100.1
#
portal-access-profile name portal1
web-auth-server abc direct
#
portal-access-profile name portal_access_profile
#
aaa
authentication-scheme radius_huawei
HCIP-WLAN V2.0 Lab Guide
Page 140
authentication-mode radius
accounting-scheme scheme1
accounting-mode radius
accounting realtime 3
local-aaa-user password policy administrator
domain default
authentication-scheme default
accounting-scheme default
radius-server default
domain default_admin
authentication-scheme default
accounting-scheme default
#
interface Vlanif18
ip address 172.18.134.236 255.255.128.0
#
interface Vlanif100
ip address 10.23.100.1 255.255.255.0
management-interface
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 18 100 to 101
#
interface NULL0
#
ip route-static 0.0.0.0 0.0.0.0 10.23.100.254
ip route-static 172.19.0.0 255.255.0.0 172.18.128.1
#
capwap source interface vlanif100
capwap dtls psk %^%#^zZq<D7&>Mc-euO[wdR)zrjY4I`*oJ%UcK6sn%t5%^%#
capwap dtls inter-controller psk %^%#dKz03q"#ARJH__Pm`Yc(6QMF>dsn6M:M247\g!I&%^%#
capwap dtls no-auth enable
#
wlan
calibrate flexible-radio auto-switch
temporary-management psk %^%#PwFE@vw_"@\n9{>}k<,-;9CD7K;0/%e,LB)9,^FX%^%#
ap username admin password cipher %^%#PBMhAQ{@}1q,vb:X0*)B\.KXW7QH=Ogpvg'K*Y)I%^%#
traffic-profile name default
security-profile name default
security-profile name wlan-net
security open
security-profile name default-wds
security-profile name default-mesh
ssid-profile name default
ssid-profile name wlan-net
ssid wlan-net
vap-profile name default
vap-profile name wlan-net
forward-mode tunnel
service-vlan vlan-id 101
ssid-profile wlan-net
security-profile wlan-net
authentication-profile p1
wds-profile name default
HCIP-WLAN V2.0 Lab Guide
mesh-handover-profile name default
mesh-profile name default
regulatory-domain-profile name default
regulatory-domain-profile name domain1
air-scan-profile name default
rrm-profile name default
radio-2g-profile name default
radio-5g-profile name default
wids-spoof-profile name default
wids-whitelist-profile name default
wids-profile name default
wireless-access-specification
ap-system-profile name default
port-link-profile name default
wired-port-profile name default
ap-group name default
ap-group name ap-group1
radio 0
vap-profile wlan-net wlan 1
radio 1
vap-profile wlan-net wlan 1
ap-id 0 type-id 125 ap-mac 6ce8-748d-7540 ap-sn 2102353GSG10N7100245
ap-name AP1
ap-group ap-group1
ap-id 1 type-id 125 ap-mac 6ce8-748d-6d20 ap-sn 2102353GSG10N7100219
ap-name AP2
ap-group ap-group1
ap-id 2 type-id 125 ap-mac 6ce8-748d-6f00 ap-sn 2102353GSG10N7100225
ap-name AP3
ap-group ap-group1
provision-ap
#
return
6.4.2 SW-Core Configuration
!Software Version V200R022C00SPC500
#
sysname SW-Core
#
vlan batch 18 100 to 101
#
dhcp enable
#
interface Vlanif18
ip address 172.18.134.246 255.255.128.0
#
interface Vlanif100
ip address 10.23.100.254 255.255.255.0
dhcp select interface
#
interface Vlanif101
ip address 10.23.101.254 255.255.255.0
dhcp select interface
Page 141
HCIP-WLAN V2.0 Lab Guide
Page 142
#
interface MultiGE0/0/1
port link-type trunk
port trunk allow-pass vlan 18 100 to 101
#
interface MultiGE0/0/4
port link-type trunk
port trunk allow-pass vlan 18
#
interface MultiGE0/0/9
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
return
6.4.3 SW-Access Configuration
!Software Version V200R022C00SPC500
#
sysname SW-Access
#
vlan batch 100 to 101
#
interface MultiGE0/0/1
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/2
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/3
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/9
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
return
6.5 Quiz
The DNS server is not configured in the preceding lab. What is the function of a DNS
server in Portal authentication?
Answer:
HCIP-WLAN V2.0 Lab Guide
Page 143
The DNS server parses the domain name sent by a terminal so that the AP can redirect
the terminal to the Portal authentication page. That is, the terminal can be redirected to
the Portal authentication page when accessing any domain name.
HCIP-WLAN V2.0 Lab Guide
7
Page 144
WLAN Roaming Lab
7.1 Introduction
7.1.1 About This Lab
This lab activity provides instructions on configuring and commissioning intra-WAC Layer
2 and inter-WAC Layer 3 roaming so that you can understand how to deploy HUAWEI
WLAN roaming.
7.1.2 Objectives
⚫
Understand the intra-WAC Layer 2 roaming network configuration.
⚫
Understand the inter-WAC Layer 3 roaming network configuration.
7.1.3 Networking Topology
Figure 7-1 WLAN roaming networking topology
HCIP-WLAN V2.0 Lab Guide
Page 145
7.1.4 Lab Planning
Table 7-1 VLAN planning
Device
SW-Core
Port
Port Type
MultiGE0/0/1
Trunk
MultiGE0/0/2
Trunk
VLAN Settings
PVID: 1
Allow-pass: VLANs 100 and 101
PVID: 1
Allow-pass: VLANs 200 and 201
PVID: 1
MultiGE0/0/9
Trunk
Allow-pass: VLANs 100, 101, 200,
and 201
PVID: 1
MultiGE0/0/9
Trunk
MultiGE0/0/1
Trunk
MultiGE0/0/2
Trunk
MultiGE0/0/3
Trunk
WAC1
GE0/0/1
Trunk
WAC2
GE0/0/1
Trunk
SW-Access
Allow-pass: VLANs 100, 101, 200,
and 201
PVID: 100
Allow-pass: VLANs 100 and 101
PVID: 100
Allow-pass: VLANs 100 and 101
PVID: 200
Allow-pass: VLANs 200 and 201
PVID: 1
Allow-pass: VLANs 100 and 101
PVID: 1
Allow-pass: VLANs 200 and 201
Table 7-2 IP address planning
Device
WAC1
WAC2
SW-Core
Port
IP Address
VLANIF 100
10.23.100.1/24
VLANIF 101
10.23.101.254/24
VLANIF 200
10.23.200.1/24
VLANIF 201
10.23.201.254/24
VLANIF 100
10.23.100.254/24
VLANIF 200
10.23.200.254/24
HCIP-WLAN V2.0 Lab Guide
Table 7-3 WAC1 service parameter planning
WLAN Service
Parameter
Forwarding mode
Direct forwarding
Management
VLAN
100
Service VLAN
101
AP group
ap-group1
VAP profile
wlan-net1
Security profile
wlan-net
Security policy
WPA/WPA2+PSK+AES
Password
a12345678
SSID profile
wlan-net
SSID
wlan-net
Table 7-4 WAC2 service parameter planning
WLAN Service
Parameter
Forwarding mode
Direct forwarding
Management
VLAN
200
Service VLAN
201
AP group
ap-group2
VAP profile
wlan-net2
Security profile
wlan-net
Security policy
WPA/WPA2+PSK+AES
Password
a12345678
SSID profile
wlan-net
SSID
wlan-net
Page 146
HCIP-WLAN V2.0 Lab Guide
Page 147
7.2 Lab Configuration
7.2.1 Configuration Roadmap
1.
Configure network connectivity among WAC1, WAC2, SW-Access, and SW-Core.
2.
Configure WAC1 and WAC2 as DHCP servers to assign IP addresses to APs and STAs.
3.
Configure AP1 and AP2 to go online on WAC1.
4.
Configure AP3 to go online on WAC2.
5.
Configure WLAN service parameters for STAs to access the WLAN.
6.
Configure inter-WAC roaming.
7.
Verify the roaming result.
7.2.2 Configuration Procedure
Step 1
Configure network connectivity.
Configure the access switch SW-Access.
# Create VLANs 100, 101, 200, and 201 on SW-Access.
<HUAWEI> system-view
[HUAWEI] sysname SW-Access
[SW-Access] vlan batch 100 101 200 201
# Configure the types, PVIDs, and allowed VLANs for the downlink interfaces on SWAccess.
[SW-Access] interface MultiGE 0/0/1
[SW-Access-MultiGE0/0/1] port link-type trunk
[SW-Access-MultiGE0/0/1] port trunk allow-pass vlan 100 101
[SW-Access-MultiGE0/0/1] port trunk pvid vlan 100
[SW-Access-MultiGE0/0/1] quit
[SW-Access] interface MultiGE 0/0/2
[SW-Access-MultiGE0/0/2] port link-type trunk
[SW-Access-MultiGE0/0/2] port trunk allow-pass vlan 100 101
[SW-Access-MultiGE0/0/2] port trunk pvid vlan 100
[SW-Access-MultiGE0/0/2] quit
[SW-Access] interface MultiGE 0/0/3
[SW-Access-MultiGE0/0/3] port link-type trunk
[SW-Access-MultiGE0/0/3] port trunk allow-pass vlan 200 201
[SW-Access-MultiGE0/0/3] port trunk pvid vlan 200
[SW-Access-MultiGE0/0/3] quit
# Configure the type of the uplink interface on SW-Access and the allowed VLANs for the
interface.
[SW-Access] interface MultiGE 0/0/9
[SW-Access-MultiGE0/0/9] port link-type trunk
[SW-Access-MultiGE0/0/9] port trunk allow-pass vlan 100 101 200 201
[SW-Access-MultiGE0/0/9] quit
HCIP-WLAN V2.0 Lab Guide
Page 148
Configure the core switch SW-Core.
# Create VLANs 100, 101, 200, and 201 on SW-Core.
<HUAWEI> system-view
[HUAWEI] sysname SW-Core
[SW-Core] vlan batch 100 101 200 201
# Configure the type of the downlink interface on SW-Core and configure the interface to
allow packets from VLANs 100, 101, 200, and 201 to pass through.
[SW-Core] interface MultiGE 0/0/9
[SW-Core-MultiGE 0/0/9] port link-type trunk
[SW-Core-MultiGE 0/0/9] port trunk allow-pass vlan 100 101 200 201
[SW-Core-MultiGE 0/0/9] quit
# Configure the type of the interface connecting SW-Core to WAC1 and the allowed
VLANs for the interface.
[SW-Core] interface MultiGE 0/0/1
[SW-Core-MultiGE 0/0/1] port link-type trunk
[SW-Core-MultiGE 0/0/1] port trunk allow-pass vlan 100 101
[SW-Core-MultiGE 0/0/1] quit
# Configure the type of the interface connecting SW-Core to WAC2 and the allowed
VLANs for the interface.
[SW-Core] interface MultiGE 0/0/2
[SW-Core-MultiGE 0/0/2] port link-type trunk
[SW-Core-MultiGE 0/0/2] port trunk allow-pass vlan 200 201
[SW-Core-MultiGE 0/0/2] quit
Configure WAC1.
# Create VLANs 100 and 101 on WAC1.
<AirEngine9700-M1> system-view
[AirEngine9700-M1] sysname WAC1
[WAC1] vlan batch 100 101
# Configure the type of GE0/0/1 on WAC1 and the allowed VLANs for the interface.
[WAC1] interface GigabitEthernet 0/0/1
[WAC1-GigabitEthernet /0/1] port link-type trunk
[WAC1-GigabitEthernet /0/1] port trunk allow-pass vlan 100 101
[WAC1-GigabitEthernet /0/1] quit
Configure WAC2.
# Create VLANs 200 and 201 on WAC2.
<AirEngine9700-M1> system-view
[AirEngine9700-M1] sysname WAC2
[WAC2] vlan batch 200 201
HCIP-WLAN V2.0 Lab Guide
Page 149
# Configure the type of GE0/0/1 on WAC2 and the allowed VLANs for the interface.
[WAC2] interface GigabitEthernet 0/0/1
[WAC2-GigabitEthernet /0/1] port link-type trunk
[WAC2-GigabitEthernet /0/1] port trunk allow-pass vlan 200 201
[WAC2-GigabitEthernet /0/1] quit
# Configure IP addresses for SW-Core.
[SW-Core] interface vlanif 100
[SW-Core-Vlanif100] ip address 10.23.100.254 24
[SW-Core-Vlanif100] quit
[SW-Core] interface vlanif 200
[SW-Core-Vlanif200] ip address 10.23.200.254 24
[SW-Core-Vlanif200] quit
# Configure IP addresses for WAC1.
[WAC1] interface vlanif 100
[WAC1-Vlanif100] ip address 10.23.100.1 24
[WAC1-Vlanif100] quit
[WAC1] interface Vlanif 101
[WAC1-Vlanif101] ip address 10.23.101.254 24
[WAC1-Vlanif101] quit
# Configure IP addresses for WAC2.
[WAC2] interface vlan 200
[WAC2-Vlanif200] ip address 10.23.200.1 24
[WAC2-Vlanif200] quit
[WAC2] interface vlan 201
[WAC2-Vlanif201] ip address 10.23.201.254 24
[WAC2-Vlanif201] quit
# Configure WLAN service routes on SW-Core.
[SW-Core] ip route-static 10.23.101.0 255.255.255.0 10.23.100.1
[SW-Core] ip route-static 10.23.201.0 255.255.255.0 10.23.200.1
# Configure a default route on WAC1.
[WAC1] ip route-static 0.0.0.0 0.0.0.0 10.23.100.254
# Configure a default route on WAC2.
[WAC2] ip route-static 0.0.0.0 0.0.0.0 10.23.200.254
Step 2
Configure DHCP servers.
# Configure WAC1 as a DHCP server to assign IP addresses to AP1, AP2, and STAs.
[WAC1] dhcp enable
HCIP-WLAN V2.0 Lab Guide
Page 150
[WAC1] interface Vlanif 100
[WAC1-Vlanif100] dhcp select interface
[WAC1-Vlanif100] quit
[WAC1] interface Vlanif 101
[WAC1-Vlanif101] dhcp select interface
[WAC1-Vlanif101] quit
# Configure WAC2 as a DHCP server to assign IP addresses to AP3 and STAs.
[WAC2] dhcp enable
[WAC2] interface Vlanif 200
[WAC2-Vlanif200] dhcp select interface
[WAC2-Vlanif200] quit
[WAC2] interface Vlanif 201
[WAC2-Vlanif201] dhcp select interface
[WAC2-Vlanif201] quit
Step 3
Configure AP1 and AP2 to go online.
# Enable the function of establishing CAPWAP DTLS sessions in none authentication
mode on WAC1. (V200R021C00 and later versions)
[WAC1] capwap dtls no-auth enable
Warning: This operation allows for device access in non-DTLS encryption mode even when DTLS is
enabled and brings security risks. After the device goes online for the first time, disable this function
to prevent security risks. Continue? [Y/N]: y
# Configure the CAPWAP source interface on WAC1. Ensure that the following
parameters have been configured in advance:
DTLS PSK: a1234567
Inter-WAC DTLS PSK: a1234567
Fit AP management parameters (user name/password): admin/HUAWEI@123
Global login password of the offline management VAP: a1234567
[WAC1] capwap dtls psk a1234567
[WAC1] capwap dtls inter-controller psk a1234567
[WAC1] wlan
[WAC1-wlan-view] temporary-management psk a1234567
[WAC1-wlan-view] ap username admin password cipher
Warning: This operation will disconnect administrator users logging in to the AP, Continue? [Y/N]: y
Enter the password (plain-text password of 8-128 characters or cipher-text password of 48-188
characters that must be a combination of at least three of the following: lowercase letters a to z,
uppercase letters A to Z, digits, and special characters): HUAWEI@123
Confirm password: HUAWEI@123
[WAC1-wlan-view] quit
[WAC1] capwap source interface vlanif 100
Warning: Ensure that the management VLAN and service VLAN are different. Otherwise, services may
be interrupted.
Warning: Before an added device goes online for the first time, enable DTLS no-auth if it runs a
version earlier than V200R021C00 or enable DTLS certificate-mandatory-match if it runs
V200R021C00 or later.
HCIP-WLAN V2.0 Lab Guide
Page 151
# Create the AP group ap-group1 to which AP1 and AP2 will be added.
[WAC1] wlan
[WAC1-wlan-view] ap-group name ap-group1
[WAC1-wlan-ap-group-ap-group1] quit
[WAC1-wlan-view] quit
# On WAC1, set the AP authentication mode to MAC address authentication.
[WAC1] wlan
[WAC1-wlan-view] ap auth-mode mac-auth
[WAC1-wlan-view] quit
# Add APs on WAC1. (The APs' MAC addresses here are for reference only. Replace them
as required.)
[WAC1] wlan
[WAC1-wlan-view] ap-id 0 ap-mac 6ce8-748d-7540
[WAC1-wlan-ap-0] ap-group ap-group1
Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power
and antenna gain configurations of the radio, Whether to continue? [Y/N]: y
Info: This operation may take a few seconds. Please wait for a moment.. done.
[WAC1-wlan-ap-0] ap-name AP1
Warning: The AP name cannot be the MAC address of another AP. Otherwise, the AP name may be
lost after the device restarts.
Warning: The AP name of more than 31 characters does not take effect for APs in versions earlier
than V200R009C00.
Warning: This operation may cause AP reset. Continue? [Y/N]: y
[WAC1-wlan-ap-0] quit
[WAC1-wlan-view] ap-id 1 ap-mac 6ce8-748d-6d20
[WAC1-wlan-ap-1] ap-group ap-group1
Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power
and antenna gain configurations of the radio, Whether to continue? [Y/N]: y
Info: This operation may take a few seconds. Please wait for a moment.. done.
[WAC1-wlan-ap-1] ap-name AP2
Warning: The AP name cannot be the MAC address of another AP. Otherwise, the AP name may be
lost after the device restarts.
Warning: The AP name of more than 31 characters does not take effect for APs in versions earlier
than V200R009C00.
Warning: This operation may cause AP reset. Continue? [Y/N]: y
[WAC1-wlan-ap-1] quit
[WAC1-wlan-view] quit
Step 4
Configure AP3 to go online.
# Enable the function of establishing CAPWAP DTLS sessions in none authentication
mode on WAC2. (V200R021C00 and later versions)
[WAC2] capwap dtls no-auth enable
Warning: This operation allows for device access in non-DTLS encryption mode even when DTLS is
enabled and brings security risks. After the device goes online for the first time, disable this function
to prevent security risks. Continue?[Y/N]: y
HCIP-WLAN V2.0 Lab Guide
Page 152
# Configure the CAPWAP source interface on WAC2. Ensure that the following
parameters have been configured in advance:
DTLS PSK: a1234567
Inter-WAC DTLS PSK: a1234567
Fit AP management parameters (user name/password): admin/HUAWEI@123
Global login password of the offline management VAP: a1234567
[WAC2] capwap dtls psk a1234567
[WAC2] capwap dtls inter-controller psk a1234567
[WAC2] wlan
[WAC2-wlan-view] temporary-management psk a1234567
[WAC2-wlan-view] ap username admin password cipher
Warning: This operation will disconnect administrator users logging in to the AP, Continue? [Y/N]: y
Enter the password (plain-text password of 8-128 characters or cipher-text password of 48-188
characters that must be a combination of at least three of the following: lowercase letters a to z,
uppercase letters A to Z, digits, and special characters): HUAWEI@123
Confirm password: HUAWEI@123
[WAC2-wlan-view] quit
[WAC2] capwap source interface vlanif 200
Warning: Ensure that the management VLAN and service VLAN are different. Otherwise, services may
be interrupted.
Warning: Before an added device goes online for the first time, enable DTLS no-auth if it runs a
version earlier than V200R021C00 or enable DTLS certificate-mandatory-match if it runs
V200R021C00 or later.
# Create the AP group ap-group2.
[WAC2] wlan
[WAC2-wlan-view] ap-group name ap-group2
[WAC2-wlan-ap-group-ap-group2] quit
[WAC2-wlan-view] quit
# On WAC2, set the AP authentication mode to MAC address authentication.
[WAC2] wlan
[WAC2-wlan-view] ap auth-mode mac-auth
[WAC2-wlan-view] quit
# Add APs on WAC2. (The APs' MAC addresses here are for reference only. Replace them
as required.)
[WAC2] wlan
[WAC2-wlan-view] ap-id 0 ap-mac 6ce8-748d-6f00
[WAC2-wlan-ap-0] ap-group ap-group2
Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power
and antenna gain configurations of the radio, Whether to continue? [Y/N]: y
Info: This operation may take a few seconds. Please wait for a moment.. done.
[WAC2-wlan-ap-0] ap-name AP3
Warning: The AP name cannot be the MAC address of another AP. Otherwise, the AP name may be
lost after the device restarts.
Warning: The AP name of more than 31 characters does not take effect for APs in versions earlier
than V200R009C00.
HCIP-WLAN V2.0 Lab Guide
Page 153
Warning: This operation may cause AP reset. Continue? [Y/N]: y
[WAC2-wlan-ap-0] quit
[WAC2-wlan-view] quit
Step 5
Configure WLAN services on WAC1.
# Configure the country code in a regulatory domain profile. The default country code is
CN. (If the device is located outside China, change the country code accordingly.)
[WAC1] wlan
[WAC1-wlan-view] regulatory-domain-profile name domain1
[WAC1-wlan-regulate-domain-domain1] country-code CN
[WAC1-wlan-regulate-domain-domain1] quit
# Bind the regulatory domain profile to the AP group.
[WAC1-wlan-view] ap-group name ap-group1
[WAC1-wlan-ap-group-ap-group1] regulatory-domain-profile domain1
Warning: This configuration change will clear the channel and power configurations of radios, and
may restart APs. Continue?[Y/N]: y
[WAC1-wlan-ap-group-ap-group1] quit
# Create the security profile wlan-net and configure a security policy in the profile.
[WAC1] wlan
[WAC1-wlan-view] security-profile name wlan-net
[WAC1-wlan-sec-prof-wlan-net] security wpa-wpa2 psk pass-phrase a12345678 aes
[WAC1-wlan-sec-prof-wlan-net] quit
# Create the SSID profile wlan-net and set the SSID name to wlan-net.
[WAC1-wlan-view] ssid-profile name wlan-net
[WAC1-wlan-ssid-prof-wlan-net] ssid wlan-net
[WAC1-wlan-ssid-prof-wlan-net] quit
# Create the VAP profile wlan-net1, set the data forwarding mode and service VLAN, and
bind the security profile and SSID profile to the VAP profile.
[WAC1-wlan-view] vap-profile name wlan-net1
[WAC1-wlan-vap-prof-wlan-net1] forward-mode direct-forward
[WAC1-wlan-vap-prof-wlan-net1] service-vlan vlan-id 101
[WAC1-wlan-vap-prof-wlan-net1] security-profile wlan-net
[WAC1-wlan-vap-prof-wlan-net1] ssid-profile wlan-net
[WAC1-wlan-vap-prof-wlan-net1] quit
# Bind the VAP profile to the AP group.
[WAC1-wlan-view] ap-group name ap-group1
[WAC1-wlan-ap-group-ap-group1] vap-profile wlan-net1 wlan 1 radio 0
[WAC1-wlan-ap-group-ap-group1] vap-profile wlan-net1 wlan 1 radio 1
[WAC1-wlan-ap-group-ap-group1] quit
[WAC1-wlan-view] quit
HCIP-WLAN V2.0 Lab Guide
Step 6
Page 154
Configure WLAN services on WAC2.
# Configure the country code in a regulatory domain profile. The default country code is
CN. (If the device is located outside China, change the country code accordingly.)
[WAC2] wlan
[WAC2-wlan-view] regulatory-domain-profile name domain1
[WAC2-wlan-regulate-domain-domain1] country-code CN
[WAC2-wlan-regulate-domain-domain1] quit
# Bind the regulatory domain profile to the AP group.
[WAC2-wlan-view] ap-group name ap-group2
[WAC2-wlan-ap-group-ap-group2] regulatory-domain-profile domain1
Warning: This configuration change will clear the channel and power configurations of radios, and
may restart APs. Continue?[Y/N]: y
[WAC2-wlan-ap-group-ap-group2] quit
# Create the security profile wlan-net and configure a security policy in the profile.
[WAC2-wlan-view] security-profile name wlan-net
[WAC2-wlan-sec-prof-wlan-net] security wpa-wpa2 psk pass-phrase a12345678 aes
[WAC2-wlan-sec-prof-wlan-net] quit
# Create the SSID profile wlan-net and set the SSID name to wlan-net.
[WAC2-wlan-view] ssid-profile name wlan-net
[WAC2-wlan-ssid-prof-wlan-net] ssid wlan-net
[WAC2-wlan-ssid-prof-wlan-net] quit
# Create the VAP profile wlan-net2, set the data forwarding mode and service VLAN, and
bind the security profile and SSID profile to the VAP profile.
[WAC2-wlan-view] vap-profile name wlan-net2
[WAC2-wlan-vap-prof-wlan-net2] forward-mode direct-forward
[WAC2-wlan-vap-prof-wlan-net2] service-vlan vlan-id 201
[WAC2-wlan-vap-prof-wlan-net2] security-profile wlan-net
[WAC2-wlan-vap-prof-wlan-net2] ssid-profile wlan-net
[WAC2-wlan-vap-prof-wlan-net2] quit
# Bind the VAP profile to the AP group.
[WAC2-wlan-view] ap-group name ap-group2
[WAC2-wlan-ap-group-ap-group2] vap-profile wlan-net2 wlan 1 radio 0
[WAC2-wlan-ap-group-ap-group2] vap-profile wlan-net2 wlan 1 radio 1
[WAC2-wlan-ap-group-ap-group2] quit
[WAC2-wlan-view] quit
Step 7
Configure inter-WAC roaming.
# Create a mobility group on WAC1, and add WAC1 and WAC2 to the mobility group.
[WAC1] wlan
HCIP-WLAN V2.0 Lab Guide
Page 155
[WAC1-wlan-view] mobility-group name mob1
[WAC1-mc-mg-mob1] member ip-address 10.23.100.1
[WAC1-mc-mg-mob1] member ip-address 10.23.200.1
[WAC1-mc-mg-mob1] quit
# Create a mobility group on WAC2, and add WAC1 and WAC2 to the mobility group.
[WAC2] wlan
[WAC2-wlan-view] mobility-group name mob1
[WAC2-mc-mg-mob1] member ip-address 10.23.100.1
[WAC2-mc-mg-mob1] member ip-address 10.23.200.1
[WAC2-mc-mg-mob1] quit
Step 8
Configure DTLS encryption for an inter-WAC tunnel.
The pre-shared key for DTLS encryption between WACs has been configured in the
previous steps. Therefore, you do not need to configure it again.
# Enable DTLS encryption for inter-WAC tunnels on WAC1.
[WAC1] capwap dtls inter-controller control-link encrypt on
Warning: This operation may cause devices using CAPWAP connections to reset or go offline.
Continue? [Y/N]: y
# Enable DTLS encryption for inter-WAC tunnels on WAC2.
[WAC2] capwap dtls inter-controller control-link encrypt on
Warning: This operation may cause devices using CAPWAP connections to reset or go offline.
Continue? [Y/N]: y
7.3 Verification
7.3.1 Checking the AP Onboarding Status
# Run the display ap all command on WAC1 to check the onboarding status of AP1 and
AP2.
[WAC1] display ap all
Total AP information:
nor : normal
[2]
ExtraInfo : Extra information
-----------------------------------------------------------------------------------------------------------ID
MAC
Name Group
IP
Type
State STA Uptime
ExtraInfo
-----------------------------------------------------------------------------------------------------------0
6ce8-748d-7540 AP1 ap-group1 10.23.100.137 AirEngine8760-X1-PRO nor
0 24M:55S 1
6ce8-748d-6d20 AP2 ap-group1 10.23.100.180 AirEngine8760-X1-PRO nor
1 25M:6S -----------------------------------------------------------------------------------------------------------Total: 2
# Run the display ap all command on WAC2 to check the onboarding status of AP3.
HCIP-WLAN V2.0 Lab Guide
Page 156
[WAC2] display ap all
Total AP information:
nor : normal
[1]
ExtraInfo : Extra information
----------------------------------------------------------------------------------------------------------ID
MAC
Name Group
IP
Type
State STA Uptime
ExtraInfo
----------------------------------------------------------------------------------------------------------0
6ce8-748d-6f00 AP3 ap-group2 10.23.200.78 AirEngine8760-X1-PRO nor
0
16M:43S ----------------------------------------------------------------------------------------------------------Total: 1
7.3.2 Checking the VAP Status
# Run the display vap all command on WAC1 to check VAP information.
[WAC1] display vap all
Info: This operation may take a few seconds, please wait.
WID : WLAN ID
-----------------------------------------------------------------------------AP ID AP name RfID WID BSSID
Status Auth type
STA
SSID
-----------------------------------------------------------------------------0
AP1
0
1
6CE8-748D-7540 ON
WPA/WPA2-PSK 0
wlan-net
0
AP1
1
1
6CE8-748D-7550 ON
WPA/WPA2-PSK 0
wlan-net
1
AP2
0
1
6CE8-748D-6D20 ON
WPA/WPA2-PSK 1
wlan-net
1
AP2
1
1
6CE8-748D-6D30 ON
WPA/WPA2-PSK 0
wlan-net
-----------------------------------------------------------------------------Total: 4
# Run the display vap all command on WAC2 to check VAP information.
[WAC2] display vap all
Info: This operation may take a few seconds, please wait.
WID : WLAN ID
-----------------------------------------------------------------------------AP ID AP name RfID WID BSSID
Status Auth type
STA
SSID
-----------------------------------------------------------------------------0
AP3
0
1
6CE8-748D-6F00 ON
WPA/WPA2-PSK 0
wlan-net
0
AP3
1
1
6CE8-748D-6F10 ON
WPA/WPA2-PSK 0
wlan-net
-----------------------------------------------------------------------------Total: 2
7.3.3 Checking the Mobility Group Status
# Run the display mobility-group name mob1 command on WAC1 and WAC2 to check
the mobility group status. If the State field displays as normal, the mobility group status
is normal. The following uses WAC1 as an example.
[WAC1] display mobility-group name mob1
-------------------------------------------------------------------------------State
IP address
Description
-------------------------------------------------------------------------------normal
10.23.100.1
normal
10.23.200.1
-
HCIP-WLAN V2.0 Lab Guide
Page 157
-------------------------------------------------------------------------------Total: 2
7.3.4 Observing the STA Roaming Status
# In the coverage area of AP1, enable a STA to search for the WLAN wlan-net, and enter
the shared key a12345678 to connect to the WLAN.
# Check STA access on WAC1. The command output shows that the STA is connected to
AP1.
[WAC1] display station all
Rf/WLAN: Radio ID/WLAN ID
Rx/Tx: link receive rate/link transmit rate(Mbps)
---------------------------------------------------------------------------------------------------------STA MAC AP ID Ap name Rf/WLAN Band Type Rx/Tx RSSI VLAN IP address SSID
---------------------------------------------------------------------------------------------------------e0e1-a954-ae6f 0 AP1 0/1
2.4G
11n 1/52 -53 101 10.23.101.249
wlan-net
---------------------------------------------------------------------------------------------------------Total: 1 2.4G: 0 5G: 1
# As the STA gradually moves to the coverage area of AP2, it is found that the STA
roams to AP2.
[WAC1] display station all
Rf/WLAN: Radio ID/WLAN ID
Rx/Tx: link receive rate/link transmit rate(Mbps)
---------------------------------------------------------------------------------------------------------STA MAC AP ID Ap name Rf/WLAN Band Type Rx/Tx RSSI VLAN IP address SSID
---------------------------------------------------------------------------------------------------------e0e1-a954-ae6f
1 AP2
0/1 2.4G 11n 1/58
-55 101
10.23.101.249
wlan-net
---------------------------------------------------------------------------------------------------------Total: 1 2.4G: 1 5G: 0
# Check the roaming track on WAC1 (intra-WAC Layer 2 roaming).
[WAC1] display station roam-track sta-mac e0e1-a954-ae6f
Access SSID:wlan-net
Rx/Tx: link receive rate/link transmit rate(Mbps)
s:Same Frequency Network c:PMK Cache Roam
r:802.11r Roam d:802.11r over ds Roam p:proprietary 802.11r Roam
-------------------------------------------------------------------------------------L2/L3
AP-AC IP
AC-AC IP
Ap name Radio ID
BSSID
TIME
In/Out RSSI
Out Rx/Tx
--------------------------------------------------------------------------------------
HCIP-WLAN V2.0 Lab Guide
-10.23.100.1
AP1
6ce8-748d-7540 XXXX-XX-XX/12:29:54
-52/-53
1/28
L2
10.23.100.1
AP2
6ce8-748d-6d20 XXXX-XX-XX/12:37:44
-57/-/-------------------------------------------------------------------------------------Number: 1
Page 158
0
0
# As the STA moves to the coverage area of AP3, it is found that the STA roams to AP3.
[WAC2] display station all
Rf/WLAN: Radio ID/WLAN ID
Rx/Tx: link receive rate/link transmit rate(Mbps)
---------------------------------------------------------------------------------------------------------STA MAC AP ID Ap name Rf/WLAN Band Type Rx/Tx RSSI VLAN IP address SSID
---------------------------------------------------------------------------------------------------------e0e1-a954-ae6f 0 AP3
0/1 2.4G
-/101 10.23.101.249 wlan-net
---------------------------------------------------------------------------------------------------------Total: 1 2.4G: 1 5G: 0
# Check the roaming track on WAC2 (inter-WAC Layer 3 roaming).
[WAC2] display station roam-track sta-mac e0e1-a954-ae6f
Access SSID:wlan-net
Rx/Tx: link receive rate/link transmit rate(Mbps)
s:Same Frequency Network c:PMK Cache Roam
r:802.11r Roam d:802.11r over ds Roam p:proprietary 802.11r Roam
-------------------------------------------------------------------------------------L2/L3
AP-AC IP
AC-AC IP
Ap name Radio ID
BSSID
TIME
In/Out RSSI
Out Rx/Tx
--------------------------------------------------------------------------------------10.23.100.1
AP1
0
6ce8-748d-7540 XXXX-XX-XX/12:29:54
-52/-53
1/28
L2
10.23.100.1
AP2
0
6ce8-748d-6d20 XXXX-XX-XX/12:37:44
-57/28/30
L3
10.23.200.1
10.23.200.1
AP3
0
9cb2-e82d-5120 XXXX-XX-XX/20:01:58
-53/-/-------------------------------------------------------------------------------------Number: 2
7.4 Reference Configuration
7.4.1 WAC1 Configuration
Software Version V200R022C00SPC100
#
sysname WAC1
#
vlan batch 100 to 101
#
dhcp enable
#
HCIP-WLAN V2.0 Lab Guide
Page 159
interface Vlanif100
ip address 10.23.100.1 255.255.255.0
dhcp select interface
management-interface
#
interface Vlanif101
ip address 10.23.101.254 255.255.255.0
dhcp select interface
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
ip route-static 0.0.0.0 0.0.0.0 10.23.100.254
#
capwap source interface vlanif100
capwap dtls inter-controller control-link encrypt on
capwap dtls psk %^%#R=+I57EMP>bFKr35X0^<,+3nJW$Op9vERA&pLnIQ%^%#
capwap dtls inter-controller psk %^%#AgB^DVxu6@WhSA>j\UA=vTE0H&`GaOmns<<Y~Y-"%^%#
capwap dtls no-auth enable
#
wlan
temporary-management psk %^%#A0jK$oAoNG5=j>6-NcL56%e2U4\G29J@z'/-:)]Q%^%#
ap username admin password cipher %^%#U-k!~ucm:N'r~*SdQMQ3_EKpH7(s_D$O6g,NxwL$%^%#
traffic-profile name default
security-profile name default
security-profile name wlan-net
security wpa-wpa2 psk pass-phrase %^%#H95ZT,~zPB3w;;VuULcRf#$]+cnEVPT02SMi_qo=%^%#
aes
security-profile name default-wds
security-profile name default-mesh
ssid-profile name default
ssid-profile name wlan-net
ssid wlan-net
vap-profile name default
vap-profile name wlan-net
service-vlan vlan-id 101
ssid-profile wlan-net
security-profile wlan-net
wds-profile name default
mesh-handover-profile name default
mesh-profile name default
regulatory-domain-profile name default
regulatory-domain-profile name domain1
air-scan-profile name default
rrm-profile name default
radio-2g-profile name default
radio-5g-profile name default
wids-spoof-profile name default
wids-whitelist-profile name default
wids-profile name default
wireless-access-specification
tunnel-ap-group name default
ap-system-profile name default
port-link-profile name default
HCIP-WLAN V2.0 Lab Guide
Page 160
wired-port-profile name default
mobility-group name mob1
member ip-address 10.23.100.1
member ip-address 10.23.200.1
ap-group name default
ap-group name ap-group1
regulatory-domain-profile domain1
radio 0
vap-profile wlan-net wlan 1
radio 1
vap-profile wlan-net wlan 1
ap-id 0 type-id 125 ap-mac 6ce8-748d-7540 ap-sn 2102353GSG10N7100245
ap-name AP1
ap-group ap-group1
ap-id 1 type-id 125 ap-mac 6ce8-748d-6d20 ap-sn 2102353GSG10N7100219
ap-name AP2
ap-group ap-group1
provision-ap
#
return
7.4.2 WAC2 Configuration
Software Version V200R022C00SPC100
#
sysname WAC2
#
vlan batch 200 to 201
#
dhcp enable
#
interface Vlanif200
ip address 10.23.200.1 255.255.255.0
dhcp select interface
management-interface
#
interface Vlanif201
ip address 10.23.201.254 255.255.255.0
dhcp select interface
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 200 to 201
#
ip route-static 0.0.0.0 0.0.0.0 10.23.200.254
#
capwap source interface vlanif200
capwap dtls inter-controller control-link encrypt on
capwap dtls psk %^%#dgC,160`5;XLVhDL4+u@6c4NO.@cbDA='{CF\RxT%^%#
capwap dtls inter-controller psk %^%#B^maC5I1.2sxISA++m$0OtU46|kX!&*,:FD|2_#7%^%#
capwap dtls no-auth enable
#
wlan
temporary-management psk %^%#_}=*4p!(<;Pb]EVN&)vWF4S^"5LnG)-#!!9`exFJ%^%#
HCIP-WLAN V2.0 Lab Guide
Page 161
ap username admin password cipher %^%#6#pl>Kz)r.r@r&Q/_fHW|us3LjRaK)hM-#Z@q4e(%^%#
traffic-profile name default
security-profile name default
security-profile name wlan-net
security wpa-wpa2 psk pass-phrase %^%#\Mp-:nhlrX^YpV~[GI/VPz[P7!<`Q=UFu;RsrF=Y%^%# aes
security-profile name default-wds
security-profile name default-mesh
ssid-profile name default
ssid-profile name wlan-net
ssid wlan-net
vap-profile name default
vap-profile name wlan-net2
service-vlan vlan-id 201
ssid-profile wlan-net
security-profile wlan-net
wds-profile name default
mesh-handover-profile name default
mesh-profile name default
regulatory-domain-profile name default
regulatory-domain-profile name domain1
air-scan-profile name default
rrm-profile name default
radio-2g-profile name default
radio-5g-profile name default
wids-spoof-profile name default
wids-whitelist-profile name default
wids-profile name default
wireless-access-specification
tunnel-ap-group name default
ap-system-profile name default
port-link-profile name default
wired-port-profile name default
mobility-group name mob1
member ip-address 10.23.100.1
member ip-address 10.23.200.1
ap-group name default
ap-group name ap-group2
regulatory-domain-profile domain1
radio 0
vap-profile wlan-net2 wlan 1
radio 1
vap-profile wlan-net2 wlan 1
ap-id 0 type-id 125 ap-mac 6ce8-748d-6f00 ap-sn 2102353GSG10N7100225
ap-name AP3
ap-group ap-group2
provision-ap
#
return
7.4.3 SW-Core Configuration
!Software Version V200R022C00SPC500
#
sysname SW-Core
HCIP-WLAN V2.0 Lab Guide
#
vlan batch 100 to 101 200 to 201
#
interface Vlanif100
ip address 10.23.100.254 255.255.255.0
#
interface Vlanif200
ip address 10.23.200.254 255.255.255.0
#
interface MultiGE0/0/1
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/2
port link-type trunk
port trunk allow-pass vlan 200 to 201
#
interface MultiGE0/0/9
port link-type trunk
port trunk allow-pass vlan 100 to 101 200 to 201
#
interface NULL0
#
ip route-static 10.23.101.0 255.255.255.0 10.23.100.1
ip route-static 10.23.201.0 255.255.255.0 10.23.200.1
#
return
7.4.4 SW-Access Configuration
!Software Version V200R022C00SPC500
#
sysname SW-Access
#
vlan batch 100 to 101 200 to 201
#
interface MultiGE0/0/1
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/2
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/3
port link-type trunk
port trunk pvid vlan 200
port trunk allow-pass vlan 200 to 201
#
interface MultiGE0/0/9
port link-type trunk
port trunk allow-pass vlan 100 to 101 200 to 201
Page 162
HCIP-WLAN V2.0 Lab Guide
Page 163
#
interface NULL0
#
return
7.5 Quiz
The same security policy is configured during roaming verification. If different security
policies are configured before and after roaming, can STAs roam successfully?
Answer:
If two roaming APs are configured with different security policies, STAs do not trigger
roaming.
HCIP-WLAN V2.0 Lab Guide
Page 164
8
RRM Lab
8.1 Introduction
8.1.1 About This Lab
This lab provides instructions on the radio resource management (RRM) configuration,
helping you master the deployment and configuration of RRM technologies.
8.1.2 Objectives
⚫
Understand how to configure WLAN radio calibration.
⚫
Understand how to configure WLAN band steering.
⚫
Understand how to configure WLAN load balancing.
⚫
Understand how to configure CAC for WLAN users.
8.1.3 Networking Topology
Figure 8-1 RRM networking topology
HCIP-WLAN V2.0 Lab Guide
Page 165
8.1.4 Lab Planning
Table 8-1 VLAN planning
Device
Port
Port Type
MultiGE0/0/1
Trunk
MultiGE0/0/9
Trunk
MultiGE0/0/9
Trunk
MultiGE0/0/1
Trunk
MultiGE0/0/2
Trunk
MultiGE0/0/3
Trunk
GE0/0/1
Trunk
VLAN Settings
PVID: 1
Allow-pass: VLANs 100 and 101
SW-Core
PVID: 1
Allow-pass: VLAN 100 101
PVID: 1
Allow-pass: VLANs 100 and 101
PVID: 100
Allow-pass: VLANs 100 and 101
SW-Access
WAC1
PVID: 100
Allow-pass: VLANs 100 and 101
PVID: 100
Allow-pass: VLANs 100 and 101
PVID: 1
Allow-pass: VLANs 100 and 101
Table 8-2 IP address planning
Device
SW-Core
WAC1
Port
IP Address
VLANIF100
10.23.100.254/24
VLANIF101
10.23.101.254/24
VLANIF100
10.23.100.1/24
Table 8-3 WLAN service parameter planning
WLAN Service
Parameter
Forwarding mode
Direct forwarding
Management
VLAN
100
Service VLAN
101
AP group
ap-group1
VAP profile
wlan-net
HCIP-WLAN V2.0 Lab Guide
WLAN Service
Page 166
Parameter
Security profile
wlan-net
Security policy
WPA/WPA2+PSK+AES
Password
a12345678
SSID profile
wlan-net
SSID
wlan-net
8.2 Lab Configuration
8.2.1 Configuration Roadmap
1.
Configure basic network connectivity to ensure Layer 2 and Layer 3 communication
between devices.
2.
Configure AP onboarding.
3.
Configure WLAN services.
4.
Configure the automatic calibration range for channels and frequencies.
5.
Configure the band steering function.
6.
Configure the load balancing function.
7.
Configure the user CAC function.
8.2.2 Configuration Procedure
Step 1
Configure the basic network, AP onboarding, and WLAN services.
# For details, see Step 1 to Step 5 in section 1.2.2 "Configuration Procedure."
Step 2
Configure radio calibration.
# Set the radio calibration mode to auto and the default calibration interval to 1440
minutes.
[WAC1-wlan-view] calibrate enable auto
# Enable global Dynamic Frequency Assignment (DFA) function and set the redundant
radio processing mode to auto-switch.
[WAC1-wlan-view] calibrate flexible-radio auto-switch
# Enable the Dynamic Channel Assignment (DCA) and Transmit Power Control (TPC)
functions on the 2.4 GHz frequency band.
[WAC1-wlan-view] ap-group name ap-group1
[WAC1-wlan-ap-group-ap-group1] radio 0
HCIP-WLAN V2.0 Lab Guide
Page 167
[WAC1-wlan-group-radio-ap-group1/0] calibrate auto-channel-select enable
[WAC1-wlan-group-radio-ap-group1/0] calibrate auto-txpower-select enable
[WAC1-wlan-group-radio-ap-group1/0] quit
# Enable the DCA, TPC, and Dynamic Bandwidth Selection (DBS) functions on the 5 GHz
frequency band. (The DBS function takes effect only on 5 GHz radios.)
[WAC1-wlan-view] ap-group name ap-group1
[WAC1-wlan-ap-group-ap-group1] radio 1
[WAC1-wlan-group-radio-ap-group1/1] calibrate auto-channel-select enable
[WAC1-wlan-group-radio-ap-group1/1] calibrate auto-txpower-select enable
[WAC1-wlan-group-radio-ap-group1/1] calibrate auto-bandwidth-select enable
[WAC1-wlan-group-radio-ap-group1/1] quit
# Manually trigger radio calibration.
[WAC1-wlan-view] calibrate manual startup
Warning: The operation may cause business interruption, continue? [y/n]: y
Step 3
Configure band steering.
# Enable band steering for a VAP. (By default, this function is enabled.)
[WAC1-wlan-view] vap-profile name wlan-net
[WAC1-wlan-vap-prof-wlan-net] undo band-steer disable
[WAC1-wlan-vap-prof-wlan-net] quit
# Create an RRM profile and configure band steering parameters. Set the start threshold
for the number of access STAs to 90, the percentage threshold for access STAs on 5 GHz
radios to 80%, and the start SNR threshold for 5G-prior access to 18 dB.
[WAC1-wlan-view] rrm-profile name wlan-rrm
[WAC1-wlan-rrm-prof-wlan-rrm] band-steer balance start-threshold 90
[WAC1-wlan-rrm-prof-wlan-rrm] band-steer balance gap-threshold 80
[WAC1-wlan-rrm-prof-wlan-rrm] band-steer snr-threshold 18
[WAC1-wlan-rrm-prof-wlan-rrm] quit
# Create radio profiles and bind the RRM profile to the radio profiles, and enable
interference detection.
[WAC1-wlan-view] radio-2g-profile name wlan-2g
[WAC1-wlan-radio-2g-prof-wlan-2g] rrm-profile wlan-rrm
[WAC1-wlan-radio-2g-prof-wlan-2g] interference detect-enable
Warning: This action may cause service interruption. Continue?[Y/N] y
[WAC1-wlan-radio-2g-prof-wlan-2g] quit
[WAC1-wlan-view] radio-5g-profile name wlan-5g
[WAC1-wlan-radio-5g-prof-wlan-5g] rrm-profile wlan-rrm
[WAC1-wlan-radio-5g-prof-wlan-5g] interference detect-enable
Warning: This action may cause service interruption. Continue?[Y/N] y
[WAC1-wlan-radio-5g-prof-wlan-5g] quit
HCIP-WLAN V2.0 Lab Guide
Page 168
# Bind the 2.4 GHz radio profile wlan-2g to radio 0 in the AP group and bind the 5 GHz
radio profile wlan-5g to radio 1 in the AP group.
[WAC1-wlan-view] ap-group name ap-group1
[WAC1-wlan-ap-group-ap-group1] radio-2g-profile wlan-2g radio 0
Warning: This action may cause service interruption. Continue?[Y/N] y
[WAC1-wlan-ap-group-ap-group1] radio-5g-profile wlan-5g radio 1
Warning: This action may cause service interruption. Continue?[Y/N] y
[WAC1-wlan-ap-group-ap-group1] quit
Step 4
Configure load balancing.
# Configure dynamic load balancing based on the number of STAs. Set the start
threshold for the number of access STAs to 12, the RSSI difference threshold to 5, and the
RSSI threshold of members in a dynamic load balancing group to –63 dBm.
[WAC1-wlan-view] rrm-profile name wlan-rrm
[WAC1-wlan-rrm-prof-wlan-rrm] undo sta-load-balance dynamic disable
[WAC1-wlan-rrm-prof-wlan-rrm] sta-load-balance dynamic sta-number start-threshold 12
[WAC1-wlan-rrm-prof-wlan-rrm] sta-load-balance dynamic sta-number gap-threshold number 5
[WAC1-wlan-rrm-prof-wlan-rrm] sta-load-balance dynamic rssi-threshold -63
[WAC1-wlan-rrm-prof-wlan-rrm] quit
Step 5
Configure the user CAC function.
# Configure the user CAC function. Enable CAC based on the number of users and set the
access and roaming thresholds to 40. Enable the function of forbidding access from
weak-signal STAs and set the SNR threshold to 13 dB.
# Enable automatic SSID hiding when the number of access STAs reaches the threshold.
[WAC1-wlan-view] rrm-profile name wlan-rrm
[WAC1-wlan-rrm-prof-wlan-rrm] uac client-number enable
[WAC1-wlan-rrm-prof-wlan-rrm] uac client-number threshold access 40 roam 40
[WAC1-wlan-rrm-prof-wlan-rrm] uac client-snr enable
Warning: This action may cause service interruption. Continue?[Y/N] y
[WAC1-wlan-rrm-prof-wlan-rrm] uac client-snr threshold 13
Warning: This action may cause service interruption. Continue?[Y/N] y
[WAC1-wlan-rrm-prof-wlan-rrm] uac reach-access-threshold hide-ssid
[WAC1-wlan-rrm-prof-wlan-rrm] quit
[WAC1-wlan-view] quit
8.3 Verification
8.3.1 Checking RRM Profile Information
# Check the RRM profile configuration on WAC1.
[WAC1] display rrm-profile name wlan-rrm
-------------------------------------------------------------------Retransmission rate threshold for trigger channel/power select(%) : 60
HCIP-WLAN V2.0 Lab Guide
Noise-floor threshold for trigger channel/power select(dBm) : -75
Calibrate tpc threshold(dBm):
: -60
Maximum 2.4G calibration TX power(dBm)
: 127
Maximum 5G calibration TX power(dBm)
: 127
Maximum 6G calibration TX power(dBm)
: 127
Minimum 2.4G calibration TX power(dBm)
:9
Minimum 5G calibration TX power(dBm)
: 12
Minimum 6G calibration TX power(dBm)
: 12
Calibrate retransmission rate check interval(min)
:1
Calibrate retransmission rate check traffic threshold(kbps) : 1250
Calibrate grouping interference threshold(dBm)
: -127
Airtime fairness schedule
: disable
Dynamic adjust EDCA parameter
: disable
Dynamic EDCA be-service threshold
:6
UAC check client's SNR
: enable
UAC client's SNR threshold(dB)
: 13
UAC check client number
: enable
UAC client number access threshold
: 40
UAC client number roam threshold
: 40
Action upon reaching the UAC threshold
: SSID hide
Band steer deny threshold
:0
Band steer SNR threshold(dB)
: 18
Band balance start threshold
: 90
Band balance gap threshold(%)
: 80
Client's band expire based on continuous probe counts
: 35
Station load balance
: enable
Station load balance mode
: sta-number
Station load balance RSSI threshold(dBm)
: -63
Station load balance RSSI-diff-gap threshold(dBm)
:5
Station load balance sta-number start threshold
: 12
Station load balance sta-number gap threshold(percentage)
:Station load balance sta-number gap threshold(number)
:5
Station load balance deauth fail times
:0
Station load balance BTM fail times
:5
Station load balance steer-restrict restrict time(s)
:5
Station load balance steer-restrict probe threshold
:5
Station load balance steer-restrict auth threshold
:0
Station load balance probe-report interval(s)
: 120
BSS color switch
: enable
Spatial reuse switch
: enable
Smart-roam
: enable
Smart-roam AI mode
: enable
Smart-roam quick kickoff
: enable
Smart-roam check SNR
: enable
Smart-roam quick kickoff check SNR
: enable
Smart-roam check rate
: disable
Smart-roam quick kickoff check rate
: disable
Smart-roam standing SNR threshold(dB)
: 20
Smart-roam SNR quick-kickoff-threshold(dB)
: 15
Smart-roam rate threshold(%)
: 20
Smart-roam rate quick-kickoff-threshold(%)
: 20
Smart-roam high level SNR margin(dB)
: 15
Smart-roam low level SNR margin(dB)
: 10
Smart-roam SNR check interval(s)
:3
Smart-roam unable roam client expire time(min)
: 30
Page 169
HCIP-WLAN V2.0 Lab Guide
Smart-roam quick-kickoff SNR check interval(ms)
Smart-roam quick-kickoff SNR P-N observe time
Smart-roam quick-kickoff SNR P-N qualify time
Smart-roam advanced scan
Smart-roam quick-kickoff back off time
AMC policy
High density AMC optimize
Antenna-mode
SFN roam check high threshold(dBm)
SFN roam check low threshold(dBm)
SFN roam check interval(ms)
SFN roam report interval(ms)
SFN roam check rssi-accumulate threshold(dB)
SFN roam check sta-holding times
SFN roam check gap-rssi(dB)
SFN roam check better-times
DFS smart select
DFS recover delay time(min)
Multimedia air optimize
Switch
Voice threshold
Video threshold
Voice downlink-slice-ratio
Video downlink-slice-ratio
Voice downlink-delay-guarantee
Video downlink-delay-guarantee
Congestion-control tcp-window-tuning switch
Rate limit dynamic interval
Rate limit dynamic threshold
CO-SR
Wlan-slice high-reliability
Switch
rtt
time-ratio
FRER-enhance
--------------------------------------------------------------------
Page 170
: 500
:6
:4
: enable
: 60
: auto-balance
: disable
: auto
: -55
: -60
: 700
: 400
:8
:3
:6
:2
: enable
:0
: enable
: 30
: 100
: medium
: medium
: medium
: medium
: enable
:5
: 80
: enable
: disable
: 20
: 80
: disable
8.3.2 Checking the 2.4 GHz Radio Profile Configuration
# Check the 2.4 GHz radio profile configuration on WAC1.
[WAC1] display radio-2g-profile name wlan-2g
-------------------------------------------------------------------Radio type
: 802.11ax
Power auto adjust
: disable
Beacon interval(TUs)
: 100
Beamforming switch
: disable
Support short preamble
: support
Fragmentation threshold(Byte)
: 2346
Channel switch announcement
: enable
Channel switch mode
: continue
Guard interval mode
: short
802.11ax Guard interval mode
: dot8
A-MPDU switch
: enable
HT A-MPDU length limit
:3
HCIP-WLAN V2.0 Lab Guide
A-MSDU switch
: auto
RTS-CTS-mode
: rts-cts
RTS-CTS-threshold
: 1400
802.11bg basic rate
:12
802.11bg support rate
: 1 2 5 6 9 11 12 18 24 36 48 54
Multicast rate 2.4G
: auto adapt
Interference detect switch
: enable
Co-channel frequency interference threshold(%)
: 50
Adjacent-channel frequency interference threshold(%) : 50
Station interference threshold
: 32
WMM switch
: enable
Mandatory switch
: disable
Auto-off start time
:Auto-off end time
:Auto-off time-range
:Wifi-light mode
: signal-strength
Utmost power switch
: auto
Rrm-profile
: wlan-rrm
Air-scan-profile
: default
Smart-antenna
: default
Agile-antenna-polarization
: disable
CCA threshold(dBm)
:RX sensitivity(dBm)
: -128
AGC high threshold(dBm)
:High PER threshold(%)
: 80
Low PER threshold(%)
: 20
Training interval(s)
: auto
Training mpdu num
: 640
Throughput trigger training threshold (%)
: 10
Autonavigation roam optimize beacon interval(TUs): 60
VIP user bandwidth reservation ratio (%)
: 20
-------------------------------------------------------------------AP EDCA parameters:
-----------------------------------------------------------ECWmax ECWmin AIFSN TXOPLimit(32us) Ack-Policy
AC_VO 3
2
1
47
normal
AC_VI 4
3
1
94
normal
AC_BE 6
4
3
0
normal
AC_BK 10
4
7
0
normal
------------------------------------------------------------
8.3.3 Checking the 5 GHz Radio Profile Configuration
# Check the 5 GHz radio profile configuration on WAC1.
[WAC1] display radio-5g-profile name wlan-5g
-------------------------------------------------------------------Radio type
: 802.11ax
Power auto adjust
: disable
Beacon interval(TUs)
: 100
Beamforming switch
: disable
Fragmentation threshold(Byte)
: 2346
Channel switch announcement
: enable
Channel switch mode
: continue
Guard interval mode
: short
Page 171
HCIP-WLAN V2.0 Lab Guide
802.11ax guard interval mode
: dot8
A-MPDU switch
: enable
HT A-MPDU length limit
:3
VHT A-MPDU length limit
:7
A-MSDU switch
: auto
VHT A-MSDU Max frame number
:2
RTS-CTS-mode
: RTS-CTS
RTS-CTS-threshold
: 1400
802.11a basic rate
: 6 12 24
802.11a support rate
: 6 9 12 18 24 36 48 54
Multicast rate 5G
: auto adapt
VHT mcs
:99999999
Interference detect switch
: enable
Co-channel frequency interference threshold(%)
: 50
Adjacent-channel frequency interference threshold(%) : 50
Station interference threshold
: 32
WMM switch
: enable
Mandatory switch
: disable
Auto-off start time
:Auto-off end time
:Auto-off time-range
:WiFi-light mode
: signal-strength
Utmost power switch
: auto
Rrm-profile
: wlan-rrm
Air-scan-profile
: default
Smart-antenna
: default
Agile-antenna-polarization
: disable
CCA threshold(dBm)
:RX sensitivity(dBm)
: -128
AGC high threshold(dBm)
:High PER threshold(%)
: 80
Low PER threshold(%)
: 20
Training interval(s)
: auto
Training mpdu num
: 640
Throughput trigger training threshold (%)
: 10
Autonavigation roam optimize beacon interval(TUs): 60
VIP user bandwidth reservation ratio (%)
: 20
-------------------------------------------------------------------AP EDCA parameters:
-----------------------------------------------------------ECWmax ECWmin AIFSN TXOPLimit(32us) Ack-Policy
AC_VO 3
2
1
47
normal
AC_VI 4
3
1
94
normal
AC_BE 6
4
3
0
normal
AC_BK 10
4
7
0
normal
------------------------------------------------------------
8.3.4 Checking the Radio Status
# Check the current radio status on WAC1, especially the channel utilization.
[WAC1] display radio all
Info: This operation may take a few seconds. Please wait for a moment.done.
CH/BW:Channel/Bandwidth
CE:Current EIRP (dBm)
Page 172
HCIP-WLAN V2.0 Lab Guide
Page 173
ME:Max EIRP (dBm)
CU:Channel utilization
ST:Status
WM:Working mode (normal/monitor/monitor dual-band-scan/monitor proxy dual-band-scan)
---------------------------------------------------------------------------------------------AP ID Name RfID Band Type
ST CH/BW
CE/ME STA
CU
WM
---------------------------------------------------------------------------------------------0
AP1 0
2.4G 11ax
on 6/20M
9/29
2
57% normal
0
AP1 1
5G
11ax
on 56/20M
12/34 0
0%
normal
1
AP2 0
2.4G 11ax
on 11/20M
9/29
0
69% normal
1
AP2 1
5G
11ax
on 60/40M+
12/34 0
0%
normal
2
AP3 0
2.4G 11ax
on 1/20M
9/29
0
97% normal
2
AP3 1
5G
11ax
on 153/20M
12/34 0
1%
normal
---------------------------------------------------------------------------------------------Total:6
8.4 Reference Configuration
8.4.1 WAC1 Configuration
Software Version V200R021C00SPC100
#
sysname WAC1
#
vlan batch 100 to 101
#
interface Vlanif100
ip address 10.23.100.1 255.255.255.0
management-interface
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
interface NULL0
#
ip route-static 0.0.0.0 0.0.0.0 10.23.100.254
#
capwap source interface vlanif100
capwap dtls inter-controller control-link encrypt on
capwap dtls psk %^%#R=+I57EMP>bFKr35X0^<,+3nJW$Op9vERA&pLnIQ%^%#
capwap dtls inter-controller psk %^%#AgB^DVxu6@WhSA>j\UA=vTE0H&`GaOmns<<Y~Y-"%^%#
capwap dtls no-auth enable
#
wlan
calibrate flexible-radio auto-switch
temporary-management psk %^%#A0jK$oAoNG5=j>6-NcL56%e2U4\G29J@z'/-:)]Q%^%#
ap username admin password cipher %^%#U-k!~ucm:N'r~*SdQMQ3_EKpH7(s_D$O6g,NxwL$%^%#
traffic-profile name default
security-profile name default
security-profile name wlan-net
HCIP-WLAN V2.0 Lab Guide
Page 174
security wpa-wpa2 psk pass-phrase %^%#H95ZT,~zPB3w;;VuULcRf#$]+cnEVPT02SMi_qo=%^%#
aes
security-profile name default-wds
security-profile name default-mesh
ssid-profile name default
ssid-profile name wlan-net
ssid wlan-net
vap-profile name default
vap-profile name wlan-net
service-vlan vlan-id 101
ssid-profile wlan-net
security-profile wlan-net
wds-profile name default
mesh-handover-profile name default
mesh-profile name default
regulatory-domain-profile name default
regulatory-domain-profile name domain1
air-scan-profile name default
rrm-profile name default
rrm-profile name wlan-rrm
uac reach-access-threshold hide-ssid
band-steer balance gap-threshold 80
uac client-snr enable
uac client-snr threshold 13
uac client-number enable
uac client-number threshold access 40 roam 40
band-steer balance start-threshold 90
sta-load-balance dynamic rssi-threshold -63
sta-load-balance dynamic sta-number start-threshold 12
sta-load-balance dynamic sta-number gap-threshold number 5
band-steer snr-threshold 18
radio-2g-profile name default
radio-2g-profile name wlan-2g
interference detect-enable
rrm-profile wlan-rrm
radio-5g-profile name default
radio-5g-profile name wlan-5g
interference detect-enable
rrm-profile wlan-rrm
wids-spoof-profile name default
wids-whitelist-profile name default
wids-profile name default
wireless-access-specification
tunnel-ap-group name default
ap-system-profile name default
port-link-profile name default
wired-port-profile name default
mobility-group name mob1
member ip-address 10.23.100.1
member ip-address 10.23.200.1
ap-group name default
ap-group name ap-group1
regulatory-domain-profile domain1
radio 0
radio-2g-profile wlan-2g
HCIP-WLAN V2.0 Lab Guide
vap-profile wlan-net wlan 1
radio 1
radio-5g-profile wlan-5g
vap-profile wlan-net wlan 1
calibrate auto-bandwidth-select enable
ap-id 0 type-id 125 ap-mac 6ce8-748d-7540 ap-sn 2102353GSG10N7100245
ap-name AP1
ap-group ap-group1
ap-id 1 type-id 125 ap-mac 6ce8-748d-6d20 ap-sn 2102353GSG10N7100219
ap-name AP2
ap-group ap-group1
ap-id 2 type-id 125 ap-mac 6ce8-748d-6f00 ap-sn 2102353GSG10N7100225
ap-name AP3
ap-group ap-group1
provision-ap
#
return
8.4.2 SW-Core Configuration
!Software Version V200R022C00SPC500
#
sysname SW-Core
#
vlan batch 100 to 101
#
dhcp enable
#
interface Vlanif100
ip address 10.23.100.254 255.255.255.0
dhcp select interface
#
interface Vlanif101
ip address 10.23.101.254 255.255.255.0
dhcp select interface
#
interface MultiGE0/0/1
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/9
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
return
8.4.3 SW-Access Configuration
!Software Version V200R022C00SPC500
#
sysname SW-Access
#
vlan batch 100 to 101
Page 175
HCIP-WLAN V2.0 Lab Guide
Page 176
#
interface MultiGE0/0/1
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/2
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/3
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/9
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
return
8.5 Quiz
In a radio calibration solution, the 2.4 GHz calibration channel set contains channels 1, 6,
and 11 by default. Why are these channels selected in the 2.4 GHz calibration channel
set?
Answer:
Channels 1, 6, and 11 are non-overlapping channels on the 2.4 GHz frequency band,
which can avoid signal interference.
HCIP-WLAN V2.0 Lab Guide
9
Page 177
Indoor WLAN Planning Lab
9.1 Introduction
9.1.1 About This Lab
This lab uses the WLAN Planner to plan and design WLANs for indoor scenarios to meet
customers' wireless requirements.
9.1.2 Objectives
⚫
Understand the indoor WLAN planning process.
⚫
Master the basic operations of the WLAN Planner.
9.1.3 Lab Scenarios
A company plans to build a WLAN in the indoor office area. Figure 9-1 shows the floor
plan of the area in this project. You need to design and plan an indoor WLAN for the
company to ensure that the WLAN covers all areas required by the customer and meets
the mobile office requirements of employees and Internet access requirements of guests.
HCIP-WLAN V2.0 Lab Guide
Page 178
Figure 9-1 Building floor plan for indoor WLAN planning
9.1.4 Preparations
Preparation for WLAN planning consists of requirements collection and site survey.
9.1.4.1 Requirement Collection
Requirements collection is the first step for WLAN planning. Communicate with the
customer to collect complete and comprehensive project and requirement information to
prevent redesign work due to insufficient information collected.
The information to be obtained during this phase includes basic requirements, service
requirements, and installation requirements. The information collection result is listed in
the following table.
Table 9-1 Basic requirements collection checklist
Requirement Type
Collection Result
Laws and regulations
Country code: CN
Floor plan
JPG drawing with scale information (building length: 45 m)
Coverage mode
Indoor settled
HCIP-WLAN V2.0 Lab Guide
Page 179
Table 9-2 Service requirements collection checklist
Requirement Type
Collection Result
Key coverage areas: Open office areas, offices, meeting
rooms, and manager's office
Coverage area
Common coverage area: Corridor
Areas that do not need to be covered: staircases, restrooms,
ELV room, and storage room
Field strength
Key coverage areas: ≥ –65 dBm
Common coverage areas: ≥ –70 dBm
Open office area: 40 cubicles in each open office area, with
two STAs per cubicle
Conference room: 30 persons at most, each with 1 STA
Number of access STAs
Meeting room: 8 persons at most, each with 1 STA
Reception room: 12 persons at most, each with 2 STAs
Office and manager's office: 1 person, with no more than 5
STAs
Terminal type
Laptop, mobile phone, and tablet
Open office area: 4 Mbps, with a concurrency rate of 100%
Meeting room: 8 Mbps, with a concurrency rate of 100%
Bandwidth
Reception room: 16 Mbps, with a concurrency rate of 80%
Office and manager's office: 16 Mbps, with a concurrency
rate of 100%
Table 9-3 Installation requirements collection checklist
Requirement Type
Collection Result
Power supply mode
Power supply by a PoE switch
Switch location
ELV room in the lower left corner of the floor plan
Special requirements
No special requirements
9.1.4.2 Site Survey
A site survey is conducted to obtain site environment information, such as interference
sources, signal attenuation caused by obstacles, floor height, new obstacles, and ELV
room locations. Determine AP models, installation positions and modes, and power
supply and cabling design based on the construction drawings.
HCIP-WLAN V2.0 Lab Guide
Page 180
Table 9-4 Survey result
Site Survey Item
Determining drawing
information
Survey Result
The onsite building information is consistent with that on the
floor plan provided by the customer.
The floor height is 2.6 m.
Internal buildings: Tables and chairs are at normal heights
and have little interference to signals, which can be ignored.
Outer wall: 240 mm concrete
Building materials
and signal
attenuation
Interior walls of conference rooms, offices, and reception
room: 240 mm thickened brick walls
Walls of the break room, printing room, and reception desk:
12 mm thickened glass
Determining
interference sources
There is no interference source in the WLAN coverage area.
Cabling rules
Network cables between switches and APs are routed above
the ceiling. Hidden cabling is required, and hole drilling is
allowed.
Switch location
ELV room or storage room
Installation admission
Approved
9.2 Lab Configuration
9.2.1 Configuration Roadmap
1.
Analyze requirements based on the existing information.
2.
Select devices based on requirements and calculate the number of APs.
3.
Log in to the WLAN Planner and import the building floor plan.
4.
Set the environment and draw obstacles.
5.
Deploy APs.
6.
Adjust AP parameters and antenna angles.
7.
Lay out switches and cables.
8.
Perform signal simulation.
9.
Adjust the AP positions and repeatedly perform signal simulation until the signal
coverage is complete.
10. Export the WLAN planning report.
HCIP-WLAN V2.0 Lab Guide
Page 181
9.2.2 Configuration Procedure
Step 1
Analyze requirements.
Based on the requirements collection and site survey, the following parameters are
obtained.
Table 9-5 WLAN planning requirements analysis
Requirement Type
Analysis Result
Country Code
CN
Floor plan
JPG drawing with scale information (building length: 45 m)
Coverage mode
Indoor settled
Open office area: 160 STAs, 4 Mbps per-STA bandwidth
requirement, and concurrency rate of 100%
Conference room: 30 STAs, 8 Mbps per-STA bandwidth,
concurrency rate of 100%
Bandwidth
Meeting room: 8 STAs, 8 Mbps per-STA bandwidth, concurrency
rate of 100%
Meeting room: 24 STAs, 16 Mbps per-STA bandwidth, concurrency
rate of 80%
Office and manager's office: 5 STAs;16 Mbps per-STA bandwidth,
concurrency rate of 100%
Only one floor needs to be covered by the WLAN.
Coverage area
Key coverage areas: One reception room, two open office areas,
three meeting rooms, and three offices
Common coverage area: Corridor
Key coverage areas: ≥ –65 dBm
Field strength
Common coverage areas: ≥ –70 dBm
Leakage field strength: no requirement
Terminal type
Laptop, mobile phone, and tablet that support 2x2 MIMO and 40
MHz frequency bandwidth @ 5 GHz
Power supply
mode
Power supply by a PoE switch
Installation mode
Ceiling mounting
Switch location
ELV room, meeting the PoE power supply distance requirement
Acceptance items
and criteria
No special requirements
HCIP-WLAN V2.0 Lab Guide
Step 2
Page 182
Select devices and calculate the number of APs.
Calculate the number of APs required in each area based on the proportions of services in
indoor scenarios and single-AP concurrency specifications.
Table 9-6 Proportions of services in indoor scenarios
Service Type
Single-Service
Baseline Rate
(Mbps)
Proportion of Services in Indoor Scenarios
Open Office Meeting
Area
Room
Single-Person
Office
Reception
Room
2%
15%
10%
0%
8%
15%
10%
4
0%
7%
15%
10%
32
16
0%
0%
0%
10%
Email
32
16
6%
8%
10%
10%
Web browsing
8
4
21%
30%
20%
30%
Gaming
2
1
8%
5%
10%
0%
Instant
messaging
0.512
0.256
35%
20%
10%
10%
VoIP (voice)
0.256
0.128
30%
30%
5%
10%
4
8
16
16
Excellent
Good
4K video
50
30
0%
1080p video
16
12
720p video
8
E-whiteboard
(wireless
projection)
Average Single-User Bandwidth
(Mbps) — Excellent
HCIP-WLAN V2.0 Lab Guide
Page 183
Table 9-7 Single-AP concurrency specifications
Maximum Number of Concurrent STAs Supported by a Wi-Fi 6 AP at Different
Bandwidths
(20 MHz @ 2.4 GHz, 40 MHz @ 5 GHz, Wi-Fi 6 and Dual Spatial Streams Supported by
All STAs)
No.
Access
Bandwidth
1
Single Radio (5
GHz)
Dual Radios (5
GHz)
Three Radios (2.4 GHz + 5
GHz-1 + 5 GHz-2)
Maximum
Number of
Concurrent STAs
Maximum
Number of
Concurrent
STAs
2 Mbps
56
85
141
2
4 Mbps
39
56
95
3
6 Mbps
27
38
65
4
8 Mbps
21
30
51
5
16 Mbps
12
18
30
Maximum Number of
Concurrent STAs
Calculate the maximum number of concurrent STAs in each coverage area based on the
collected information. The calculation process is as follows:
There are 40 cubicles in each open office area, with two STAs at each cubicle and a
concurrency rate of 100%. Therefore, the total number of STAs in the open office area is:
160 = 40 x 2 x 2 x 100%.
There are a total of 30 seats in a conference room, with one STA at each seat and a
concurrency rate of 100%. Therefore, the maximum number of concurrent STAs in the
conference room is: 30 = 30 x 1 x 100%.
There are a total of 8 seats in each meeting room, with one STA at each seat and a
concurrency rate of 100%. Therefore, the maximum number of concurrent STAs in the
meeting room is: 8 = 8 x 1 x 100%.
There are a total of 12 seats in the reception room, with two STAs at each seat and a
concurrency rate of 80%. Therefore, the maximum number of concurrent STAs in the
reception room is around: 19 = 12 x 2 x 80%.
Each user in an office has five STAs, with a concurrency rate of 100%. Therefore, the
maximum number of concurrent STAs in the office is: 5 = 1 x 5 x 100%.
Calculate the number of APs required in each coverage area based on the single-AP
concurrency specifications. The calculation formula is as follows: Maximum number of
concurrent STAs/Maximum number of concurrent STAs on a single AP radio to meet the
user access bandwidth. The calculation process is as follows:
In the open office area, the bandwidth requirement is 4 Mbps, and the maximum number
of concurrent dual-radio APs is 56. In this case, the number of required APs is 2 (160/56 ≈
2).
HCIP-WLAN V2.0 Lab Guide
Page 184
In a conference room, the bandwidth requirement is 8 Mbps, and the maximum number
of concurrent dual-radio APs is 30. In this case, the number of required APs is 1 (30/30 =
1).
In a meeting room, the bandwidth requirement is 8 Mbps, and the maximum number of
concurrent dual-radio APs is 30. In this case, the number of required APs is 1 (8/30 ≈ 1).
In the reception room, the bandwidth requirement is 16 Mbps, and the maximum
number of concurrent dual-radio APs is 18. In this case, the number of required APs is 1
(19/18 ≈ 1).
In the single-person office room, the bandwidth requirement is 16 Mbps, and the
maximum number of concurrent dual-radio APs is 18. In this case, the number of
required APs is 1 (5/18 ≈ 1).
Step 3
Log in to the WLAN Planner platform and create a project.
The WLAN Planner is available on the ServiceTurbo Cloud platform, and all users can
apply for the tool. The link is as follows:
https://sg.serviceturbo-cloud.huawei.com/serviceturbocloud/en/tool/tool-details-extraneto3?id=GT2021113005&lang=en_US
# Click Running.
# Read the security management regulations on customer network data and click
Confirm.
HCIP-WLAN V2.0 Lab Guide
Page 185
# Enter project information based on the site requirements, select I have read and agree
to the Terms of Use, and click OK.
Step 4
Create a floor and import a floor plan.
# Create a floor and import the floor plan. In the Create dialog box that is displayed, set
Type to Indoor, enter the name, and click Select File to import the corresponding floor
plan.
HCIP-WLAN V2.0 Lab Guide
# Select a WLAN scenario. For this project, select Office and click OK.
# Select the floor plan file and click OK.
Page 186
HCIP-WLAN V2.0 Lab Guide
Step 5
Page 187
Set the environment parameters.
Set the environment and regions based on the customer requirements collection
checklists and site survey information.
# Set the scale.
HCIP-WLAN V2.0 Lab Guide
Page 188
# The floor plan width is 45 m. Select any position on the floor plan and set the scale
length to 45 m from left to right.
# Draw obstacles. Draw frames using insulation boundaries to draw frames, indoor walls
using 240 mm thickened brick walls, and the break room, reception desk, and print room
using 12 mm thickened glass. The following figure shows the final effect.
HCIP-WLAN V2.0 Lab Guide
Step 6
Page 189
Set regions.
Select key coverage areas and common coverage areas based on customer requirements,
as shown in the following figure.
Set key coverage areas.
# Set the same parameters for the two open office areas.
# Set region parameters for the conference room (assuming 30 STAs) and meeting
rooms (each assuming 8 STAs). The platform does not have 8 Mbit/s terminal bandwidth
HCIP-WLAN V2.0 Lab Guide
requirements. To meet user requirements, select 10 Mbit/s terminal bandwidth
requirements.
# Set region parameters for the reception room.
Page 190
HCIP-WLAN V2.0 Lab Guide
# Set region parameters for the single-person office.
Set common coverage areas.
# Set region parameters for the corridor.
Page 191
HCIP-WLAN V2.0 Lab Guide
Page 192
Check the regions after the basic properties are set.
Step 7
Deploy APs and adjust AP parameters.
# You can manually deploy APs one by one or configure automatic deployment and then
manually adjust the number and positions of APs.
# Select the required AP model. This project uses the AirEngine 5760-51. (If there is no
AP model required by the project, click Choose Other AP Model to search for it.)
HCIP-WLAN V2.0 Lab Guide
# Set channel parameters.
# The following figure shows the automatic deployment effect.
Page 193
HCIP-WLAN V2.0 Lab Guide
Page 194
# After the number and positions of APs are manually adjusted, the final effect is as
shows.
Adjust AP parameters.
# Right-click an AP in the activity area and choose Property from the shortcut menu.
(You can drag-select all APs and right-click them for the setting). The AP Attributes page
is displayed.
HCIP-WLAN V2.0 Lab Guide
Page 195
# Because the customer requires APs to be mounted on the ceiling, retain the default
installation mode of T-rail, height of 2.6 m, working mode of dual-radio mode, and other
parameters. Set the attributes of APs in other areas in the same way.
Step 8
Deploy switches.
# Select a switch model. This project uses the S5731-S24P4X switch.
HCIP-WLAN V2.0 Lab Guide
# Deploy a switch in the ELV room in the lower left corner on the floor plan.
Step 9
Route cables.
Cables can be routed above the ceilings to directly connect APs and switches.
Page 196
HCIP-WLAN V2.0 Lab Guide
Step 10
Page 197
Simulate signals.
Check the signal RSSI in key coverage areas (≥ –65 dBm). If an area has no color covered,
the RSSI is lower than –65 dBm.
# Set the signal strength in the simulation diagram to –65 dBm and click Open
simulation.
HCIP-WLAN V2.0 Lab Guide
Page 198
# In this project, you only need to pay attention to the signal coverage in open office
areas, offices, meeting rooms, and reception room.
Check the signal RSSI in common coverage areas (≥ –70 dBm). If an area has no color
covered, the RSSI is lower than –70 dBm.
# Adjust the signal strength in the simulation diagram to –70 dBm.
HCIP-WLAN V2.0 Lab Guide
Page 199
# In this project, you only need to pay attention to the signal coverage in the corridor.
If the signal coverage is poor, adjust the number and positions of APs repeatedly to
ensure normal signal simulation.
Check the coverage satisfaction degree to determine whether there are areas with poor
signal coverage.
The signal coverage in most areas is good.
HCIP-WLAN V2.0 Lab Guide
Step 11
Page 200
Export the WLAN planning report.
Before exporting the report, you can check the WLAN planning.
# Check whether there is any problem. If there is any warning item, confirm it. If there is
no problem, export the WLAN planning report.
HCIP-WLAN V2.0 Lab Guide
Page 201
# Export the report and save it to the local PC.
# Display the saved WLAN planning report.
9.3 Quiz
1. What information needs to be confirmed during requirements collection during the
early phase of WLAN planning and design?
Answer:
1.
Laws and regulations: EIRP restrictions and available channels
2.
Drawing information: drawing completeness
HCIP-WLAN V2.0 Lab Guide
Page 202
3.
Coverage areas: key coverage areas, common coverage areas, and areas that do not
need to be covered
4.
Field strength: signal strength requirements
5.
Number of access STAs: total number of access STAs in a coverage area
6.
Terminal types
7.
Bandwidth requirements
8.
Wall types: Estimate the signal attenuation values of walls and determine whether
signals can penetrate the walls.
9.
Power supply mode
10. Switch location
11. Special requirements such as positioning and IoT
2. An open office area has 120 cubicles, each of which involves two STAs with a
concurrency rate of 70%. In this case, how many APs need to be deployed to meet the 4
Mbps bandwidth and requirement for each STA?
Answer:
Number of access STAs: 120 x 2 = 240
Number of concurrent STAs: 240 x 70% = 168
Based on the single-AP concurrency specifications in this lab, the number of required APs
is calculated as follows: 168/56 = 3.
HCIP-WLAN V2.0 Lab Guide
10
Page 203
Outdoor WLAN Planning Lab
10.1 Introduction
10.1.1 About This Lab
This lab uses the WLAN Planner to plan and design WLANs for outdoor scenarios to meet
customers' wireless requirements.
10.1.2 Objectives
⚫
Understand the outdoor WLAN planning process.
⚫
Master the basic operations of the WLAN Planner.
10.1.3 Lab Scenarios
A pedestrian street has an open square and plans to increase customer flows by
deploying a free outdoor WLAN.
Figure 10-1 Plan of the pedestrian square
HCIP-WLAN V2.0 Lab Guide
Page 204
10.1.4 Preparations
Preparation for WLAN planning consists of requirements collection and site survey.
10.1.4.1 Requirements Collection
Requirements collection is the first step for WLAN planning. Communicate with the
customer to collect complete and comprehensive project and requirement information to
prevent redesign work due to insufficient information collected.
The information to be obtained during this phase includes basic requirements, service
requirements, and installation requirements. The information collection result is listed in
the following table.
Table 10-1 Basic requirements collection checklist
Requirement Type
Collection Result
Laws and regulations
Country code: CN
Floor plan
JPG drawing with scale information (building length: 95 m)
Coverage mode
Outdoor installation
Table 10-2 Service requirements collection checklist
Requirement Type
Collection Result
Key coverage areas: pedestrian street and rest areas
Coverage area
Common coverage area: parking lot
Areas that do not need to be covered: store areas
Field strength
Key coverage areas: ≥ –65 dBm
Common coverage areas: ≥ –70 dBm
Number of access STAs
300 persons during peak hours, one STA for each person
Terminal type
Mobile phone and tablet
Bandwidth
Bandwidth required by each user: 4 Mbps, with a
concurrency rate of 60%
Table 10-3 Installation requirements collection checklist
Requirement Type
Collection Result
Power supply mode
Power supply by a PoE switch
Switch location
ELV room in the store area on the left
Special requirements
No special requirement
HCIP-WLAN V2.0 Lab Guide
Page 205
10.1.4.2 Site Survey
A site survey is conducted to obtain site environment information, such as interference
sources, signal attenuation caused by obstacles, floor height, new obstacles, and ELV
room locations. Determine AP models, installation positions and modes, and power
supply and cabling design based on the construction drawings.
Table 10-4 Survey result
Site Survey Item
Determining drawing
information
Building materials
and signal
attenuation
Survey result
The onsite building information is consistent with that on the
floor plan provided by the customer.
The store height is 5 m.
Outer walls of stores: 240 mm thickened brick walls
Partition walls of dining areas: 8 mm gypsum boards
The onsite green belts have a height of half a person, which
have little interference to signals and can be ignored.
Determining
interference sources
There is no interference source in the WLAN coverage area.
AP installation mode
Wall mounting for APs near stores; pole mounting for APs in
the parking lots
Installation admission
Approved
10.2 Lab Configuration
10.2.1 Configuration Roadmap
1.
Analyze requirements based on the existing information.
2.
Select devices based on requirements and calculate the number of APs.
3.
Log in to WLAN Planner and import the building floor plan.
4.
Set the environment and draw obstacles.
5.
Deploy APs.
6.
Adjust AP parameters and antenna angles.
7.
Simulate signals.
8.
Adjust the AP positions and repeatedly perform signal simulation until the signal
coverage is complete.
9.
Export the WLAN planning report.
10.2.2 Configuration Procedure
Step 1
requirements analysis
HCIP-WLAN V2.0 Lab Guide
Page 206
Based on the requirements collection and site survey, the following parameters are
obtained.
Table 10-5 WLAN planning requirements analysis
Requirement Type
Analysis Result
Country Code
CN
Floor plan
JPG drawing with scale information (building length: 95 m)
Coverage mode
Outdoor installation
Bandwidth
Pedestrian street and rest areas (in peak hours): 300 STAs, 4
Mbps, 60% concurrency rate
Key coverage areas: pedestrian street and rest areas
Coverage area
Common coverage area: parking lot
Areas that do not need to be covered: store areas
Key coverage areas: ≥ –65 dBm
Field strength
Common coverage areas: ≥ –70 dBm
Leakage field strength: no requirement
Terminal type
Mobile phone and tablet that support 2x2 MIMO and 40 MHz
frequency bandwidth @ 5 GHz
Power supply
mode
Wall-mounted APs can be powered by PoE switches, and polemounted APs can be powered by PoE adapters.
Installation mode
Wall mounting or pole mounting
Switch location
Determine the installation position with the property
management company based on the actual situation.
Acceptance items
and criteria
No special requirements
Step 2
Select device models and calculate the number of APs.
Calculate the number of APs required in each area based on the proportions of services in
outdoor scenarios and single-AP concurrency specifications.
Table 10-6 Proportions of services in outdoor scenarios
Service Type
Web browsing
Single-Service Baseline
Rate (Mbps)
Proportion of Services in Outdoor
Scenarios
Excellent
Good
Square
Street
Outdoor
Parking Lot
8
4
50%
60%
35%
HCIP-WLAN V2.0 Lab Guide
Page 207
Streaming
media (1080p)
16
12
10%
10%
20%
VoIP
0.25
0.125
10%
10%
0%
Gaming
2
1
10%
0%
30%
Instant
messaging
0.5
0.25
20%
20%
15%
6
8
8
Average Single-User Bandwidth (Mbps)
— Excellent
Table 10-7 Single-AP concurrency specifications
Maximum Number of Concurrent STAs Supported by a Wi-Fi 6 AP at Different
Bandwidths
(20 MHz @ 2.4 GHz, 40 MHz @ 5 GHz, Wi-Fi 6 and Dual Spatial Streams Supported by
All STAs)
Single Radio (5
GHz)
Dual Radios (5
GHz)
Three Radios (2.4 GHz + 5
GHz-1 + 5 GHz-2)
No.
Access
Bandwidth
Maximum
Number of
Concurrent STAs
(Single-Radio)
Maximum
Number of
Concurrent
STAs (SingleRadio)
1
2 Mbps
56
85
141
2
4 Mbps
39
56
95
3
6 Mbps
27
38
65
4
8 Mbps
21
30
51
5
16 Mbps
12
18
30
Maximum Number of
Concurrent STAs (SingleRadio)
Calculate the maximum number of concurrent STAs in each coverage area based on the
collected information. The calculation process is as follows:
During peak hours in the pedestrian street, there are 300 people, with one STA per user
and a concurrency rate of 60%. Therefore, the total number of terminals in the
pedestrian street scenario is 180 (300 x 1 x 60%).
Calculate the number of APs required in each coverage area based on the single-AP
concurrency specifications. The calculation formula is as follows: Maximum number of
concurrent STAs/Maximum number of concurrent STAs on a single AP radio to meet the
user access bandwidth. The calculation process is as follows:
HCIP-WLAN V2.0 Lab Guide
Page 208
In the pedestrian street, the bandwidth requirement is 4 Mbps, and the maximum
number of concurrent dual-radio APs is 56. In this case, the number of required APs is 4
(180/56 ≈ 4).
Step 3
Log in to the WLAN Planner platform and create a project.
The WLAN Planner is available on the ServiceTurbo Cloud platform, and all users can
apply for the tool. The link is as follows:
https://serviceturbo-cloudcn.huawei.com/serviceturbocloud/#/toolsummary?entityId=d59de9ac-e4ef-409e-bbdceff3d0346b42
# Click Running.
# Read the security management regulations on customer network data and click
Confirm.
# Enter project information based on the site requirements, select I have read and agree
to the Terms of Use, and click OK.
HCIP-WLAN V2.0 Lab Guide
Step 4
Page 209
Add a region and import a floor plan.
# Add a region, import a floor plan. In the Create dialog box that is displayed, set Type to
Outdoor, enter the area name, and click Select to select a scenario.
# Select a WLAN scenario. For this project, select Road/Walking Street and click Next.
HCIP-WLAN V2.0 Lab Guide
Page 210
# Select the floor plan file and click OK.
Step 5
Set up the environment.
Set the environment and regions based on the customer requirements collection
checklists and site survey information.
# Set the scale.
HCIP-WLAN V2.0 Lab Guide
Page 211
# The floor plan width is 95 m. Select any position on the floor plan and set the scale
length to 95 m from left to right.
# Drag-select a building area and set the obstacle height.
HCIP-WLAN V2.0 Lab Guide
Page 212
# After the environment is set, the effect is as follows.
Step 6
Deploy APs and adjust AP parameters.
In outdoor scenarios, skip the region setting step and directly go to the device
deployment step. In outdoor scenarios, only manual AP deployment is supported.
# Select a proper AP model on the toolbar and manually deploy APs.
HCIP-WLAN V2.0 Lab Guide
Page 213
# In this project, the AirEngine 5761R-11 is used as the wall-mounted AP, and the
AirEngine 5761R-11E is used as the pole-mounted AP. The following figure shows the
manual deployment effect.
Adjust AP parameters.
# Right-click an AP in a store area and choose Property from the shortcut menu. (You
can drag-select all APs and right-click them for the setting). The AP Attributes page is
displayed.
HCIP-WLAN V2.0 Lab Guide
Page 214
# Because the customer requires APs in these areas to be mounted on the walls, set the
installation mode to Hanging and the height to 3 m, and retain default settings of other
parameters. Set the downtilt of both 2.4 GHz and 5 GHz radios to 15 degrees. Set the
attributes of APs in other areas in the same way.
# The APs in the parking lots are installed on poles. The AirEngine 5761R-11E model is
used. Set the parameters as follows.
HCIP-WLAN V2.0 Lab Guide
Step 7
Page 215
Simulate signals.
Check the signal RSSI in key coverage areas (≥ –65 dBm). If an area has no color covered,
the RSSI is lower than –65 dBm.
# Set the signal strength in the simulation diagram to –65 dBm and click Open
simulation.
# In this project, you only need to pay attention to the signal coverage of the pedestrian
street and rest areas.
HCIP-WLAN V2.0 Lab Guide
Page 216
Check the signal RSSI in common coverage areas (≥ –70 dBm). If an area has no color
covered, the RSSI is lower than –70 dBm.
# Adjust the signal strength in the simulation diagram to –70 dBm.
# In this project, you only need to pay attention to the signal coverage in the parking
lots.
HCIP-WLAN V2.0 Lab Guide
Page 217
If the signal coverage is poor, adjust the number and positions of repeatedly to ensure
normal signal simulation.
Check the coverage satisfaction degree to determine whether there are areas with poor
signal coverage.
The signal coverage in most areas is good.
HCIP-WLAN V2.0 Lab Guide
Step 8
Page 218
Export the WLAN planning report.
Before exporting the report, you can check the network planning.
# Check whether there is any problem. If there is any warning item, confirm it. If there is
no problem, export the network planning report.
HCIP-WLAN V2.0 Lab Guide
Page 219
# Export the report and save it to the local PC.
# Display the saved WLAN planning report.
10.3 Quiz
1. Which of the following information needs to be determined during requirements
collection in outdoor WLAN planning and design?
Answer:
1.
Laws and regulations: EIRP restrictions and available channels
2.
Drawing information: floor plan or map
HCIP-WLAN V2.0 Lab Guide
Page 220
3.
Coverage areas: key coverage areas, common coverage areas, and areas that do not
need to be covered
4.
Field strength: signal strength requirements
5.
Number of access STAs: total number of access STAs in a coverage area
6.
Terminal types
7.
Bandwidth requirements
8.
Surrounding environment: Check whether there are buildings and trees around the
site.
9.
AP installation position and power supply mode: APs are typically mounted on lamp
poles or external walls of buildings. If necessary, new poles are built for installing
APs.
10. Switch location
11. Interference source: Check whether interference sources such as city surveillance
based on wireless backhaul and microwave stations exist.
2. What are the differences between the application scenarios of outdoor APs with
omnidirectional and directional antennas? What are their coverage ranges in a scenario
in China?
Answer:
It is recommended that omnidirectional antennas be used in open outdoor areas with a
coverage radius of 60 m to 80 m.
It is recommended that directional antennas be used in outdoor street scenarios with a
coverage length of 120 m to 150 m and a coverage width of 20 m to 35 m.
HCIP-WLAN V2.0 Lab Guide
11
Page 221
CampusInsight O&M Lab
11.1 Introduction
11.1.1 About This Lab
This lab instructs you to deploy the CampusInsight intelligent O&M platform, helping you
understand how to perform WLAN inspection using the intelligent O&M platform.
11.1.2 Objectives
⚫
Understand how to configure the interconnection between the WAC and
CampusInsight.
⚫
Understand basic O&M functions of CampusInsight.
11.1.3 Networking Topology
Figure 11-1 CampusInsight O&M networking topology
HCIP-WLAN V2.0 Lab Guide
Page 222
In this lab, AP1, AP2, and AP3 are managed and configured by WAC1. The CampusInsight
server is connected to the core switch SW-Core, and the network segment is
172.18.0.0/17. WAC1 interworks with the CampusInsight server to report service run logs
and data to the CampusInsight server. The administrator can perform unified and
intelligent O&M on the WLAN through CampusInsight.
11.1.4 Lab Planning
Table 11-1 VLAN planning
Device
SW-Core
Port
Port Type
MultiGE0/0/1
Trunk
MultiGE0/0/9
Trunk
MultiGE0/0/4
Trunk
MultiGE0/0/9
Trunk
MultiGE0/0/1
Trunk
MultiGE0/0/2
Trunk
MultiGE0/0/3
Trunk
GE0/0/1
Trunk
SW-Access
WAC1
VLAN Settings
PVID: 1
Allow-pass: VLANs 18 100 and 101
PVID: 1
Allow-pass: VLAN 100 101
PVID: 1
Allow-pass: VLAN 18
PVID: 1
Allow-pass: VLANs 100 and 101
PVID: 100
Allow-pass: VLANs 100 and 101
PVID: 100
Allow-pass: VLANs 100 and 101
PVID: 100
Allow-pass: VLANs 100 and 101
PVID: 1
Allow-pass: VLANs 18 100 and 101
Table 11-2 IP address planning
Device
SW-Core
WAC1
CampusInsight server
Port
IP Address
VLANIF 100
10.23.100.254/24
VLANIF 101
10.23.101.254/24
VLANIF 18
172.18.134.246/17
VLANIF 18
172.18.134.236/17
VLANIF 100
10.23.100.1/24
/
172.18.134.232/17
HCIP-WLAN V2.0 Lab Guide
Page 223
Table 11-3 WLAN service parameter planning
WLAN Service
Parameter
Forwarding mode
Direct forwarding
Management VLAN
100
Service VLAN
101
AP group
ap-group1
VAP profile
wlan-net
Security profile
wlan-net
Security policy
WPA/WPA2+PSK+AES
Password
a12345678
SSID profile
wlan-net
SSID
wlan-net
11.2 Lab Configuration
11.2.1 Configuration Roadmap
1.
Configure VLAN information for SW-Core, SW-Access, and WAC1.
2.
Configure IP addresses for network devices to ensure network connectivity.
3.
Configure the DHCP server on SW-Core to ensure that APs can obtain IP addresses.
4.
Configure the basic network of CampusInsight to ensure network connectivity.
5.
Configure WLAN service parameters to implement STA access.
6.
Configure the interworking between the WAC1 and the CampusInsight server.
7.
Log in to the CampusInsight server through the web to implement intelligent O&M.
11.2.2 Configuration Procedure
Step 1
Configure the basic network connectivity, AP onboarding, and WLAN services.
# For details, see Step 1 to Step 5 in section 1.2.2 "Configuration Procedure."
Step 2
Configure network connectivity between CampusInsight and WAC1.
The IP address and gateway of CampusInsight have been configured during software
installation and are not described in this lab. The IP address of CampusInsight is
172.18.134.232/17, and the gateway address is 172.18.128.1.
# Configure VLAN and IP address information for SW-Core.
HCIP-WLAN V2.0 Lab Guide
Page 224
[SW-Core] vlan 18
[SW-Core-vlan18] quit
[SW-Core] interface MultiGE 0/0/4
[SW-Core-MultiGE0/0/4] port link-type trunk
[SW-Core-MultiGE0/0/4] port trunk allow-pass vlan 18
[SW-Core-MultiGE0/0/4] quit
[SW-Core] interface Vlanif 18
[SW-Core-Vlanif18] ip address 172.18.134.246 17
[SW-Core-Vlanif18] quit
# Configure VLAN and IP address information for WAC1, and configure default route for
WAC1 and set the next hop address to SW-Core.
[WAC1] vlan 18
[WAC1-vlan18] quit
[WAC1] interface GigabitEthernet 0/0/1
[WAC1-GigabitEthernet0/0/1] port trunk allow-pass vlan 18
[WAC1-GigabitEthernet0/0/1] quit
[WAC1] interface Vlanif 18
[WAC1-Vlanif18] ip address 172.18.134.236 17
[WAC1-Vlanif18] quit
[WAC1] ip route-static 172.19.0.0 16 172.18.128.1
[WAC1] ip route-static 0.0.0.0 0.0.0.0 10.23.100.254
Step 3
Configure SNMP.
WAC1 can be added to CampusInsight for management only after the SNMP protocol is
configured on the device.
# SNMPv2c is an insecure protocol. You are advised to configure SNMPv3, which is more
secure.
[WAC1] mgmt isolate disable
Warnning: Disabling management plane isolation may bring security risks. Are you sure you want to
continue ? [y/n]: y
[WAC1] snmp-agent sys-info version v3
[WAC1] snmp-agent mib-view HCIP-test include iso
[WAC1] snmp-agent group v3 test-group privacy write-view HCIP-test notify-view HCIP-test
[WAC1] snmp-agent usm-user version v3 test-user group test-group
[WAC1] snmp-agent usm-user version v3 test-user authentication-mode sha2-256
Please configure the authentication password (<8-64>)
Enter Password: HUAWEI@123
Confirm password: HUAWEI@123
[WAC1] snmp-agent usm-user version v3 test-user privacy-mode aes256
Please configure the privacy password (<8-64>)
Enter Password: HUAWEI@456
Confirm password: HUAWEI@456
# This lab assumes that the SNMP user name is test-user, authentication password is
HUAWEI@123, and encryption password is HUAWEI@456. These parameters must be the
same as those configured on CampusInsight.
Step 4
Configure SFTP.
HCIP-WLAN V2.0 Lab Guide
Page 225
# The SFTP protocol is configured to enable CampusInsight to synchronize basic
information, interface and link information, and other information about APs from
devices through SFTP.
[WAC1] ssh client first-time enable
Step 5
Configure LLDP.
# LLDP enables CampusInsight to discover LLDP links of the device.
[WAC1] lldp enable
[WAC1] wlan
[WAC1-wlan-view] ap-system-profile name default
[WAC1-wlan-ap-system-prof-default] lldp report enable
[WAC1-wlan-ap-system-prof-default] quit
[WAC1-wlan-view] quit
Step 6
Configure log data reporting.
By default, the device log reporting function supports HTTP/2 and UDP channels. HTTP/2
is recommended.
# Configure the HTTP/2 channel for WAC1.
[WAC1] undo access-user syslog-restrain enable
[WAC1] wmi-server
[WAC1-wmi-server] server ip-address 172.18.134.232 port 27371
[WAC1-wmi-server] collect-item log-data interval 60
[WAC1-wmi-server] log module mid ff760000
[WAC1-wmi-server] log module mid ff5f0000
[WAC1-wmi-server] log module mid ff630000
[WAC1-wmi-server] log module mid fff30000
[WAC1-wmi-server] log module mid ff620000
[WAC1-wmi-server] log module mid ff050000
[WAC1-wmi-server] log module mid d0410000
[WAC1-wmi-server] log module mid ff5a0000
[WAC1-wmi-server] log module mid ff8c0000
[WAC1-wmi-server] log module mid ff5d0000
[WAC1-wmi-server] quit
# Configure the HTTP/2 channel for APs.
[WAC1] wlan
[WAC1-wlan-view] wmi-server name test
[WAC1-wlan-wmi-server-prof-test] server ip-address 172.18.134.232 port 27371
[WAC1-wlan-wmi-server-prof-test] collect-item log-data interval 60
[WAC1-wlan-wmi-server-prof-test] ap log module mid FF600000
[WAC1-wlan-wmi-server-prof-test] ap log module mid D0410000
[WAC1-wlan-wmi-server-prof-test] ap log module mid FF620000
[WAC1-wlan-wmi-server-prof-test] ap log module mid FFED0000
[WAC1-wlan-wmi-server-prof-test] ap log module mid FFEF0000
[WAC1-wlan-wmi-server-prof-test] ap log module mid FFF30000
[WAC1-wlan-wmi-server-prof-test] ap log module mid FF2B0000
[WAC1-wlan-wmi-server-prof-test] ap log module mid FE011004
HCIP-WLAN V2.0 Lab Guide
Page 226
[WAC1-wlan-wmi-server-prof-test] quit
[WAC1-wlan-view] ap-system-profile name default
[WAC1-wlan-ap-system-prof-default] wmi-server test index 2
[WAC1-wlan-ap-system-prof-default] quit
[WAC1-wlan-view] ap-group name ap-group1
[WAC1-wlan-ap-group-ap-group1] ap-system-profile default
[WAC1-wlan-ap-group-ap-group1] quit
[WAC1-wlan-view] quit
Step 7
Configure the function of reporting WLAN service performance metric data.
# This configuration enables the device to proactively report WLAN service performance
metric data to CampusInsight for analysis.
[WAC1] pki realm default
[WAC1-pki-realm-default] certificate-check none
[WAC1-pki-realm-default] quit
[WAC1] wmi-server
[WAC1-wmi-server] collect-item device-data interval 60
[WAC1-wmi-server] collect-item interface-data interval 60
[WAC1-wmi-server] collect-item cpcar-data interval 60
[WAC1-wmi-server] collect-item security-data interval 60
[WAC1-wmi-server] quit
[WAC1] wlan
[WAC1-wlan-view] wmi-server name test
[WAC1-wlan-wmi-server-prof-test] report-interval 60
[WAC1-wlan-wmi-server-prof-test] collect-item device-data interval 60
[WAC1-wlan-wmi-server-prof-test] collect-item radio-data interval 60
[WAC1-wlan-wmi-server-prof-test] collect-item ssid-data interval 60
[WAC1-wlan-wmi-server-prof-test] collect-item terminal-data interval 60
[WAC1-wlan-wmi-server-prof-test] collect-item non-wifi-data interval 60
[WAC1-wlan-wmi-server-prof-test] quit
[WAC1-wlan-view] ap-group name ap-group1
[WAC1-wlan-ap-group-ap-group1] radio 0
[WAC1-wlan-group-radio-ap-group1/0] wids device detect enable
Warning: This action may cause service interruption. Continue?[Y/N] y
[WAC1-wlan-group-radio-ap-group1/0] spectrum-analysis enable
[WAC1-wlan-group-radio-ap-group1/0] channel-monitor enable
[WAC1-wlan-ap-group-ap-group1] radio 1
[WAC1-wlan-group-radio-ap-group1/1] wids device detect enable
Warning: This action may cause service interruption. Continue?[Y/N] y
[WAC1-wlan-group-radio-ap-group1/1] spectrum-analysis enable
[WAC1-wlan-group-radio-ap-group1/1] channel-monitor enable
[WAC1-wlan-group-radio-ap-group1/1] quit
[WAC1-wlan-ap-group-ap-group1] quit
[WAC1-wlan-view] ap-group name ap-group1
[WAC1-wlan-ap-group-ap-group1] ap-system-profile default
[WAC1-wlan-ap-group-ap-group1] quit
Step 8
Configure the CampusInsight server.
# Log in to CampusInsight, choose Inventory > Site-Region, and click Add.
HCIP-WLAN V2.0 Lab Guide
Page 227
# Add a site. Set the site name to HCIP-test and Parent node to Global, and click
Confirm.
# Choose Inventory > Wired Device, click Add Device, and click Add single device.
HCIP-WLAN V2.0 Lab Guide
Page 228
# Set IP address to 10.23.100.1 (IP address of WAC1), Site-Region to HCIP-test, and
Device role to WAC.
# In the SNMP area, select Edit SNMP parameters, set Version to v3, Security name to
test-user, Authentication protocol to HMAC_SHA2_256, Privacy protocol to AES_256, Port
to 161, Authentication password to HUAWEI@123, and Encryption password to
HUAWEI@456. Then click Confirm.
# The security name must be the same as the SNMP user name configured on WAC1.
Other parameters must also be the same.
# Check the onboarding status of wired devices. WAC1 is online.
# After WAC1 is added to CampusInsight, the APs managed by WAC1 are automatically
added to the AP list of CampusInsight. Click Wireless Device. The three APs are online.
# Add a building to the HCIP-test site. Choose Inventory > Site-Region, select HCIP-test,
and click Add.
HCIP-WLAN V2.0 Lab Guide
Page 229
# Set Type to Building and Name to Building_01, and click Confirm.
# Add a floor to Building_01. Choose Inventory > Site-Region, select Building_01, and
click Add.
# Set Type to Floor and Name to First floor, and click Confirm.
HCIP-WLAN V2.0 Lab Guide
Page 230
# Choose Inventory > Wireless Device, select three APs, and click Move to move the three
APs to First floor.
# The Site-Region values of the three APs are changed to /HCIP-test/Building_01/First
floor.
Step 9
Configure CampusInsight O&M functions.
Check the status of the entire network.
# Choose Dashboard > General to view key information about the HCIP-test site, such as
the resource status, health status, number of clients, traffic, and AP rate/traffic, so that
the administrator can learn about the overall running status of the network.
HCIP-WLAN V2.0 Lab Guide
Page 231
Check the wireless network health.
# Choose Network > Health to view the running status of the wireless network.
# Detailed metrics include the access success rate, access time consumption, roaming
fulfillment rate, signal and interference, capacity, and throughput.
HCIP-WLAN V2.0 Lab Guide
Page 232
HCIP-WLAN V2.0 Lab Guide
Page 233
Check the client journey.
# Choose Clients > Client Journey. On the Normal view tab page, you can view basic
information about access clients.
# Click a client MAC address (for example, 08-1f-71-53-90-b4) to view detailed
indicators.
HCIP-WLAN V2.0 Lab Guide
Page 234
11.3 Verification
11.3.1 Checking the SNMP Configuration on WAC1
# Run the display snmp-agent mib-view command on WAC1 to view SNMP MIB
information.
[WAC1] display snmp-agent mib-view HCIP-test
View name: HCIP-test
MIB subtree: iso
Subtree mask:
Storage type: nonVolatile
View type: included
View status: active
# Run the display snmp-agent group command on WAC1 to view SNMP group
information.
[WAC1] display snmp-agent group
Group name: test-group
Security model: v3 AuthPriv
Readview: ViewDefault
Writeview: HCIP-test
Notifyview: HCIP-test
Storage type: nonVolatile
Total number is 1
# Run the display snmp-agent usm-user command on WAC1 to view SNMP user
information.
[WAC1] display snmp-agent usm-user
User name: test-user
Engine ID: 800007DB033CA37E857647
Group name: test-group
Authentication mode: sha2-256, Privacy mode: aes256
Storage type: nonVolatile
User status: active
Total number is 1
11.3.2 Checking VAP information on WAC1
# Run the display vap all command on WAC1 to check VAP information.
[WAC1] display vap all
Info: This operation may take a few seconds, please wait.
WID : WLAN ID
-----------------------------------------------------------------------------AP ID AP name RfID WID BSSID
Status Auth type
STA
SSID
-----------------------------------------------------------------------------0
AP1
0
1
6CE8-748D-7540 ON
WPA/WPA2-PSK 0
wlan-net
0
AP1
1
1
6CE8-748D-7550 ON
WPA/WPA2-PSK 0
wlan-net
HCIP-WLAN V2.0 Lab Guide
1
AP2
0
1
6CE8-748D-6D20 ON
WPA/WPA2-PSK
1
AP2
1
1
6CE8-748D-6D30 ON
WPA/WPA2-PSK
2
AP3
0
1
6CE8-748D-6F00 ON
WPA/WPA2-PSK
2
AP3
1
1
6CE8-748D-6F10 ON
WPA/WPA2-PSK
-----------------------------------------------------------------------------Total: 6
Page 235
0
0
1
1
wlan-net
wlan-net
wlan-net
wlan-net
11.4 Reference Configuration
11.4.1 WAC1 Configuration
Software Version V200R022C00SPC100
#
sysname WAC1
#
vlan batch 18 100 to 101
#
interface Vlanif18
ip address 172.18.134.236 255.255.128.0
#
interface Vlanif100
ip address 10.23.100.1 255.255.255.0
management-interface
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 18 100 to 101
#
interface NULL0
#
snmp-agent local-engineid 800007DB033CA37E857647
snmp-agent group v3 test-group privacy write-view HCIP-test notify-view HCIP-test
snmp-agent mib-view HCIP-test include iso
snmp-agent usm-user version v3 test-user
snmp-agent usm-user version v3 test-user group test-group
snmp-agent usm-user version v3 test-user authentication-mode sha2-256 %^%#o{tU-CUJ2I~#IK]4u7JzyqS6df_o%SZbsWov~t;%^%#
snmp-agent usm-user version v3 test-user privacy-mode aes256 %^%#K<*vH_`J]W33uM9IZz~XWD5DK50`NApy4Dvn\J@%^%#
snmp-agent protocol source-interface MEth0/0/1
snmp-agent
#
ssh server-source -i Vlanif100
ssh client first-time enable
sftp server enable
stelnet server enable
#
ip route-static 0.0.0.0 0.0.0.0 10.23.100.254
ip route-static 172.19.0.0 255.255.0.0 172.18.128.1
#
capwap source interface vlanif100
capwap dtls inter-controller control-link encrypt on
HCIP-WLAN V2.0 Lab Guide
Page 236
capwap dtls psk %^%#R=+I57EMP>bFKr35X0^<,+3nJW$Op9vERA&pLnIQ%^%#
capwap dtls inter-controller psk %^%#AgB^DVxu6@WhSA>j\UA=vTE0H&`GaOmns<<Y~Y-"%^%#
capwap dtls no-auth enable
#
wmi-server
server ip-address 172.18.134.232 port 27371
collect-item device-data interval 60
collect-item log-data interval 60
collect-item cpcar-data interval 60
log module mid fe090000 name SIPFPM
log module mid ff2f0000 name SACADP
log module mid ff5d0000 name AM
log module mid ff8c0000 name ENTITYTRAP
log module mid ff5a0000 name AAA
log module mid d0410000 name SHELL
log module mid ff050000 name IFPDT
log module mid ff620000 name DHCP
log module mid fff30000 name WLAN
log module mid ff630000 name CM
log module mid ff5f0000 name DOT1X
log module mid ff760000 name WEB
#
wmi-server2
#
wlan
calibrate flexible-radio auto-switch
temporary-management psk %^%#A0jK$oAoNG5=j>6-NcL56%e2U4\G29J@z'/-:)]Q%^%#
ap username admin password cipher %^%#U-k!~ucm:N'r~*SdQMQ3_EKpH7(s_D$O6g,NxwL$%^%#
traffic-profile name default
security-profile name default
security-profile name wlan-net
security wpa-wpa2 psk pass-phrase %^%#H95ZT,~zPB3w;;VuULcRf#$]+cnEVPT02SMi_qo=%^%#
aes
ssid-profile name wlan-net
ssid wlan-net
vap-profile name wlan-net
service-vlan vlan-id 101
ssid-profile wlan-net
security-profile wlan-net
regulatory-domain-profile name domain1
wmi-server name test
server ip-address 172.18.134.232 port 27371
collect-item device-data interval 60
collect-item radio-data interval 60
collect-item terminal-data interval 60
collect-item log-data interval 60
collect-item non-wifi-data enable
ap log module mid FF2B0000
ap log module mid FE011004
ap log module mid FFDC0000
ap log module mid FF2F0000
ap log module mid FE090000
ap log module mid FF600000 name PORTAL
ap log module mid D0410000 name SHELL
ap log module mid FF620000 name DHCP
HCIP-WLAN V2.0 Lab Guide
ap log module mid FFED0000 name SEA
ap log module mid FFEF0000 name WSRV
ap log module mid FFF30000 name WLAN
ap-system-profile name default
lldp report enable
wmi-server test index 2
ap-group name ap-group1
regulatory-domain-profile domain1
radio 0
vap-profile wlan-net wlan 1
wids device detect enable
spectrum-analysis enable
channel-monitor enable
radio 1
vap-profile wlan-net wlan 1
wids device detect enable
spectrum-analysis enable
channel-monitor enable
ap-id 0 type-id 125 ap-mac 6ce8-748d-7540 ap-sn 2102353GSG10N7100245
ap-name AP1
ap-group ap-group1
ap-id 1 type-id 125 ap-mac 6ce8-748d-6d20 ap-sn 2102353GSG10N7100219
ap-name AP2
ap-group ap-group1
ap-id 2 type-id 125 ap-mac 6ce8-748d-6f00 ap-sn 2102353GSG10N7100225
ap-name AP3
ap-group ap-group1
provision-ap
#
return
11.4.2 SW-Core Configuration
!Software Version V200R022C00SPC500
#
sysname SW-Core
#
vlan batch 18 100 to 101
#
dhcp enable
#
interface Vlanif18
ip address 172.18.134.246 255.255.128.0
#
interface Vlanif100
ip address 10.23.100.254 255.255.255.0
dhcp select interface
#
interface Vlanif101
ip address 10.23.101.254 255.255.255.0
dhcp select interface
#
interface MultiGE0/0/1
port link-type trunk
Page 237
HCIP-WLAN V2.0 Lab Guide
Page 238
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/4
port link-type trunk
port trunk allow-pass vlan 18
#
interface MultiGE0/0/9
port link-type trunk
port trunk allow-pass vlan 100 to 101
return
11.4.3 SW-Access Configuration
!Software Version V200R022C00SPC500
#
sysname SW-Access
#
vlan batch 100 to 101
#
interface MultiGE0/0/1
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/2
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/3
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/9
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
return
11.5 Quiz
In this lab, CampusInsight is used to perform intelligent O&M on a WLAN. What are the
advantages of intelligent O&M compared with traditional O&M on the WAC's web page?
Answer:
Visualized experience: Telemetry-based second-level data collection is supported,
visualizing experience of any user in any application at any moment.
Minute-level proactive identification and root cause locating for potential faults: Identify
potential faults based on dynamic baselines and big data association. Accurately locate
root causes based on KPI association analysis and protocol playback.
HCIP-WLAN V2.0 Lab Guide
Page 239
Predictive network optimization: AI technologies are used to intelligently analyze the load
trend of APs to complete predictive optimization of wireless networks.
HCIP-WLAN V2.0 Lab Guide
12
Page 240
WLAN Troubleshooting Lab
12.1 Introduction
12.1.1 About This Lab
This lab instructs you to troubleshoot common faults.
12.1.2 Objectives
⚫
Describe the fault symptoms and related configurations.
⚫
Understand troubleshooting methods.
12.1.3 Networking Topology
Figure 12-1 WLAN troubleshooting networking topology
HCIP-WLAN V2.0 Lab Guide
Page 241
12.1.4 Lab Planning
Table 12-1 VLAN planning
Device
SW-Core
Port
Port Type
MultiGE0/0/1
Trunk
MultiGE0/0/9
Trunk
MultiGE0/0/4
Trunk
MultiGE0/0/9
Trunk
MultiGE0/0/1
Trunk
MultiGE0/0/2
Trunk
MultiGE0/0/3
Trunk
GE0/0/1
Trunk
PVID: 1
Allow-pass: VLANs 18 100 and 101
PVID: 1
Allow-pass: VLAN 100 101
PVID: 1
Allow-pass: VLAN 18
PVID: 1
Allow-pass: VLANs 100 and 101
PVID: 100
Allow-pass: VLANs 100 and 101
SW-Access
WAC1
VLAN Settings
PVID: 100
Allow-pass: VLANs 100 and 101
PVID: 100
Allow-pass: VLANs 100 and 101
PVID: 1
Allow-pass: VLANs 18 100 and 101
Table 12-2 IP address planning
Device
Port
SW-Core
WAC1
iMaster NCE-Campus
IP Address
VLANIF 100
10.23.100.254/24
VLANIF 101
10.23.101.254/24
VLANIF 18
172.18.134.246/17
VLANIF 18
172.18.134.236/17
VLANIF 100
10.23.100.1/24
/
172.18.134.230/17
Table 12-3 WLAN service parameter planning
WLAN Service
Forwarding mode
Parameter
Tunnel forwarding
HCIP-WLAN V2.0 Lab Guide
WLAN Service
Parameter
Management
VLAN
100
Service VLAN
101
AP group
ap-group1
VAP profile
wlan-net
Security profile
wlan-net
Security policy
OPEN
SSID profile
wlan-net
SSID
wlan-net
Name of the RADIUS authentication scheme: radius_huawei
Name of the RADIUS accounting scheme: scheme1
RADIUS
authentication
parameters
Name of the RADIUS server template: radius_huawei
IP address: 172.18.134.230
Authentication port number: 1812
Accounting port number: 1813
Shared key: HUAWEI@123
Portal server
template
Portal access
profile
Authenticationfree rule profile
Name: abc
IP address: 172.18.134.230
Portal shared key: HUAWEI@123
Name: portal1
Bound profile: Portal server template abc
Name: default_free_rule
Name: p1
Bound profiles and schemes:
Authentication
profile
Portal access profile portal1
RADIUS server template radius_huawei
RADIUS authentication scheme radius_huawei
RADIUS accounting scheme scheme1
Authentication-free rule profile default_free_rule
Page 242
HCIP-WLAN V2.0 Lab Guide
Page 243
12.2 Lab Configuration
12.2.1 Configuration Roadmap
1.
Import the pre-configuration.
2.
Rectify the fault based on the fault symptom.
12.2.2 Configuration Procedure
Step 1
Import the pre-configuration.
# Import the pre-configuration of WAC1.
Software Version V200R022C00SPC100
#
sysname WAC1
#
vlan batch 18 100
#
authentication-profile name p1
free-rule-template free1
authentication-scheme radius_huawei
accounting-scheme scheme1
radius-server radius_huawei
#
web-auth-server server-source all-interface
#
radius-server template radius_huawei
radius-server shared-key cipher %^%#:0-xH8,(|&.L-5UCL0p7VjX]LyPSDU,9NX;sV`sV%^%#
radius-server authentication 172.18.134.230 1812 source Vlanif 100 weight 80
radius-server accounting 172.18.134.230 1813 source Vlanif 100 weight 80
radius-server authorization 172.18.134.230 shared-key cipher %^%#MeTn6Ud7d,LYC8=omJ2>,*:V-@zY=G$Q9IgU1+&%^%# server-group radius_huawei
radius-server authorization server-source all-interface
#
#
free-rule-template name free1
free-rule 1 destination ip 172.18.134.230 mask 255.255.255.255
#
url-template name url1
url https://172.18.134.230:8445/portal
url-parameter redirect-url redirect-url ssid ssid user-ipaddress userip user-mac usermac device-ip acip
#
web-auth-server abc
server-ip 172.18.134.229
port 50100
shared-key cipher %^%#3KxF"4M3}TH5|8P_$GE>K>j$/oQiM,GyQw3qsXH>%^%#
url-template url1
source-ip 10.23.100.1
server-detect
#
portal-access-profile name portal1
HCIP-WLAN V2.0 Lab Guide
Page 244
web-auth-server abc direct
#
portal-access-profile name portal_access_profile
#
aaa
authentication-scheme radius_huawei
authentication-mode radius
accounting-scheme scheme1
accounting-mode radius
accounting realtime 3
#
interface Vlanif18
ip address 172.18.134.236 255.255.128.0
#
interface Vlanif100
ip address 10.23.100.1 255.255.255.0
management-interface
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 18 100 to 101
#
ip route-static 0.0.0.0 0.0.0.0 10.23.100.254
ip route-static 172.19.0.0 255.255.0.0 172.18.128.1
#
capwap source interface vlanif100
capwap dtls psk %^%#eA~Y!E}kkQ%J_gCXL-(Z\eel8@*iU#Kdf<~OtF!T%^%#
capwap dtls inter-controller psk %^%#-E4LO_;{`JNgV$#W;k&Oa<O&DL_c.C=<e6#f>om1%^%#
capwap dtls no-auth enable
#
wlan
temporary-management psk %^%#g*hpDBM3I-3eL3-CJ~1$Xq'"~_/NZ7_~+y~wC||Q%^%#
ap username admin password cipher %^%#jj`AXVN<fYtQZf=f5`uLcLUN6+fG7I.#vvJ!)&LD%^%#
security-profile name wlan-net
security open
ssid-profile name wlan-net
ssid wlan-net
vap-profile name wlan-net
forward-mode tunnel
service-vlan vlan-id 101
ssid-profile wlan-net
security-profile wlan-net
authentication-profile p1
regulatory-domain-profile name domain1
ap-group name ap-group1
regulatory-domain-profile domain1
radio 1
radio disable
ap-id 0 type-id 125 ap-mac 6ce8-748d-7540 ap-sn 2102353GSG10N7100245
ap-name AP1
ap-group ap-group1
ap-id 1 type-id 125 ap-mac 6ce8-748d-6d20 ap-sn 2102353GSG10N7100219
ap-name AP2
ap-group ap-group1
ap-id 2 type-id 125 ap-mac 6ce8-748d-6f00 ap-sn 2102353GSG10N7100225
HCIP-WLAN V2.0 Lab Guide
ap-name AP3
provision-ap
#
return
# Import the pre-configuration of SW-Core.
!Software Version V200R022C00SPC500
#
sysname SW-Core
#
vlan batch 18 100 to 101
#
dhcp enable
#
vinterface Vlanif18
ip address 172.18.134.246 255.255.128.0
#
interface Vlanif100
ip address 10.23.100.254 255.255.255.0
dhcp select interface
#
interface Vlanif101
ip address 10.23.101.254 255.255.255.0
dhcp select interface
#
interface MultiGE0/0/1
port link-type trunk
port trunk allow-pass vlan 18 100 to 101
#
interface MultiGE0/0/4
port link-type trunk
port trunk allow-pass vlan 18
#
interface MultiGE0/0/9
port link-type trunk
port trunk allow-pass vlan 100 to 101
return
# Import the pre-configuration of SW-Access.
!Software Version V200R022C00SPC500
#
sysname SW-Access
#
vlan batch 100 to 101
#
interface MultiGE0/0/1
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/2
port link-type trunk
port trunk pvid vlan 100
Page 245
HCIP-WLAN V2.0 Lab Guide
Page 246
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/3
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/9
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
return
# Pre-configure the authentication server. For details, see Step 7 in section 6.2.2
"Configuration Procedure."
Step 2
Troubleshoot STAs' failures to detect radio signals.
# Search for SSIDs on a STA. The STA fails to detect the radio signal wlan-net. In this
case, check whether the AP is online on WAC1.
[WAC1] display ap all
Total AP information:
fault : fault
[1]
nor : normal
[2]
ExtraInfo : Extra information
-----------------------------------------------------------------------------------------------------------ID
MAC
Name Group
IP
Type
State STA Uptime
ExtraInfo
-----------------------------------------------------------------------------------------------------------0
6ce8-748d-7540 AP1 ap-group1 10.23.100.61 AirEngine8760-X1-PRO nor
0
36M:20S 1
6ce8-748d-6d20 AP2 ap-group1 10.23.100.112 AirEngine8760-X1-PRO nor
0
35M:27S 2
6ce8-748d-6f00 AP3 default AirEngine8760-X1-PRO fault 0
-----------------------------------------------------------------------------------------------------------Total: 3
# The three APs are online, but AP3 is not in the AP group ap-group1. To ensure that
WAC1 delivers unified policies to APs, add AP3 to the correct AP group.
[WAC1] wlan
[WAC1-wlan-view] ap-id 2
[WAC1-wlan-ap-2] ap-group ap-group1
Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power
and antenna gain configurations of the radio, Whether to continue? [Y/N]: y
Info: This operation may take a few seconds. Please wait for a moment.. done.
[WAC1-wlan-ap-2] quit
# Check AP information on WAC1 again. The command output shows that the three APs
are all online and belong to ap-group1.
[WAC1] display ap all
Total AP information:
nor : normal
[3]
ExtraInfo : Extra information
HCIP-WLAN V2.0 Lab Guide
Page 247
-----------------------------------------------------------------------------------------------------------ID
MAC
Name Group
IP
Type
State STA Uptime
ExtraInfo
-----------------------------------------------------------------------------------------------------------0
6ce8-748d-7540 AP1 ap-group1 10.23.100.61 AirEngine8760-X1-PRO nor
0
34M:25S 1
6ce8-748d-6d20 AP2 ap-group1 10.23.100.112 AirEngine8760-X1-PRO nor
0
33M:32S 2
6ce8-748d-6f00 AP3 ap-group1 10.23.100.213 AirEngine8760-X1-PRO nor
0
34M:28S -----------------------------------------------------------------------------------------------------------Total: 3
# Check the VAP status.
[WAC1] display vap all
Info: This operation may take a few seconds, please wait.
WID : WLAN ID
--------------------------------------------------------------------------AP ID AP name RfID WID BSSID
Status Auth type STA
----------------------------------------------------------------------------------------------------------------------------------------------------Total: 0
SSID
# The command output shows that no AP is associated with any VAP. Check the
configuration of WAC1. The command output shows that the VAP profile is not bound to
any AP group. In this case, modify the configuration as follows.
[WAC1] wlan
[WAC1-wlan-view] ap-group name ap-group1
[WAC1-wlan-ap-group-ap-group1] vap-profile wlan-net wlan 1 radio 0
[WAC1-wlan-ap-group-ap-group1] vap-profile wlan-net wlan 1 radio 1
[WAC1-wlan-ap-group-ap-group1] quit
# Check VAP information again. It is found that the three APs have released the SSID
wlan-net, but the status of radio 1 on the APs is OFF, indicating that the 5 GHz radios are
disabled and need to be manually enabled.
[WAC1] display vap all
Info: This operation may take a few seconds, please wait.
WID : WLAN ID
--------------------------------------------------------------------------AP ID AP name RfID WID BSSID
Status Auth type STA
--------------------------------------------------------------------------0
AP1
0
1
6CE8-748D-7540 ON
Open
0
0
AP1
1
1
6CE8-748D-7550 OFF
Open
0
1
AP2
0
1
6CE8-748D-6D20 ON
Open
0
1
AP2
1
1
6CE8-748D-6D30 OFF
Open
0
2
AP3
0
1
6CE8-748D-6F00 ON
Open
1
2
AP3
1
1
6CE8-748D-6F10 OFF
Open
0
--------------------------------------------------------------------------Total: 6
# Manually enable the 5 GHz radio.
[WAC1] wlan
SSID
wlan-net
wlan-net
wlan-net
wlan-net
wlan-net
wlan-net
HCIP-WLAN V2.0 Lab Guide
Page 248
[WAC1-wlan-view] ap-group name ap-group1
[WAC1-wlan-ap-group-ap-group1] radio 1
[WAC1-wlan-group-radio-ap-group1/1] undo radio disable
[WAC1-wlan-group-radio-ap-group1/1] quit
# Check the VAP status. The VAP status is normal.
[WAC1] display vap all
Info: This operation may take a few seconds, please wait.
WID : WLAN ID
----------------------------------------------------------------------------AP ID AP name RfID WID BSSID
Status Auth type
STA
----------------------------------------------------------------------------0
AP1
0
1
6CE8-748D-7540 ON
Open+Portal 0
0
AP1
1
1
6CE8-748D-7550 ON
Open+Portal 0
1
AP2
0
1
6CE8-748D-6D20 ON
Open+Portal 0
1
AP2
1
1
6CE8-748D-6D30 ON
Open+Portal 0
2
AP3
0
1
6CE8-748D-6F00 ON
Open+Portal 0
2
AP3
1
1
6CE8-748D-6F10 ON
Open+Portal 0
----------------------------------------------------------------------------Total: 6
Step 3
SSID
wlan-net
wlan-net
wlan-net
wlan-net
wlan-net
wlan-net
Troubleshoot STAs' failures to obtain IP addresses after associating with radio
signals.
# After a STA connects to wlan-net, it cannot obtain an IP address. The check result
shows that the data forwarding mode of the VAP is tunnel forwarding, but WAC1 does
not have service VLAN information. In this case, manually create VLAN 101 on WAC1.
[WAC1] vlan 101
[WAC1-vlan101] quit
# Disconnect the STA from wlan-net and then reconnect the STA to wlan-net. The STA
can obtain an IP address. Run the ipconfig command to verify this.
C:\Users\admin>ipconfig
Wireless LAN adapter WLAN:
Connection-specific DNS Suffix . :
Link-local IPv6 Address . . . . . : fe80::2d38:d0da:819f:238e%4
IPv4 Address. . . . . . . . . . . : 10.23.101.194
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 10.23.101.254
Step 4
Troubleshoot failures to automatically display Portal authentication pages in Portal
authentication mode.
# After a STA connects to the SSID wlan-net, open the browser and enter any IP address
in the address box. The Portal authentication page is not displayed.
HCIP-WLAN V2.0 Lab Guide
Page 249
# There are many reasons for a failure to display the Portal authentication
page. Check whether the authentication profile is correctly bound to the VAP
profile. The VAP configuration is correct.
vap-profile name wlan-net
forward-mode tunnel
service-vlan vlan-id 101
ssid-profile wlan-net
security-profile wlan-net
authentication-profile p1
# Check whether the authentication profile is correctly configured. It is found that no
Portal access profile is configured in the authentication profile.
authentication-profile name p1
authentication-scheme radius_huawei
accounting-scheme scheme1
radius-server radius_huawei
# Check the authentication profile configuration. The command output shows that the
Portal access profile portal1 has been configured in WAC1 and bound to the
authentication profile.
[WAC1] authentication-profile name p1
[WAC1-authentication-profile-p1] portal-access-profile portal1
Info: This operation may take a few minutes, please wait....
Warning: Changing the authentication profile will cause online users to go offline. Continue? [Y/N] y
Authentication profile p1 : done.
[WAC1-authentication-profile-p1] quit
HCIP-WLAN V2.0 Lab Guide
Page 250
# The Portal authentication page still cannot be displayed on the STA. Check the
configuration of the Portal server template. The IP address and port number of the Portal
server are incorrect. The correct IP address is 172.18.134.230, and the correct port
number is 50200.
#
web-auth-server abc
server-ip 172.18.134.229
port 50100
shared-key cipher %^%#N[ePT/1o_2@zKz/>v:dTE_H%#s@Cy<{-|g:s'&\8%^%#
url-template url1
source-ip 10.23.100.1
server-detect
#
# Configure a correct server address and set the shared key to HUAWEI@123 to ensure
that the shared key is the same as that on NCE.
[WAC1] web-auth-server abc
[WAC1-web-auth-server-abc] undo server-ip 172.18.134.230
Warning: Server-ip access-users will be offline, sure to continue?[Y/N] y
[WAC1-web-auth-server-abc] server-ip 172.18.134.230
[WAC1-web-auth-server-abc] port 50200
[WAC1-web-auth-server-abc] shared-key cipher HUAWEI@123
# Check the Portal service status. The Portal server is in DOWN state.
[WAC1] display portal-server state
Web-auth-server
:
abc
Total-servers
:
1
Live-servers
:
0
Critical-num
:
0
Status
:
Abnormal
Ip-address
Status
172.18.134.230
DOWN
# Check the configuration. It is found that the Portal server detection function is enabled
on the device, but the authentication server is not configured. Therefore, you need to
manually disable the Portal server detection function.
[WAC1] web-auth-server abc
[WAC1-web-auth-server-abc] undo server-detect
[WAC1-web-auth-server-abc] quit
# Check the status of the Portal server again. The status is UP, as shown in the following
figure.
[WAC1] display portal-server state
Web-auth-server
:
abc
Total-servers
:
1
Live-servers
:
1
Critical-num
:
0
Status
:
Normal
HCIP-WLAN V2.0 Lab Guide
Ip-address
172.18.134.230
Page 251
Status
UP
# Use the STA to perform the test again. It is found that the Portal authentication page
still cannot be displayed. The port number of the redirected page is 8445, but the default
port number of NCE that functions as the Portal server is 19008. Check the URL template
on WAC1. It is found that the port number in the URL is incorrect, as shown in the
following figure.
#
url-template name url1
url https://172.18.134.230:8445/portal
url-parameter redirect-url redirect-url ssid ssid user-ipaddress userip user-mac usermac device-ip acip
#
# Change the URL port number to 19008.
[WAC1] url-template name url1
[WAC1-url-template-url1] url https://172.18.134.230:19008/portal
[WAC1-url-template-url1] quit
# Disconnect the STA from wlan-net and reconnect the STA to wlan-net. The Portal
authentication page is displayed. After the user name and password are entered, Portal
authentication succeeds.
12.3 Verification
12.3.1 Checking VAP Information
# Run the display vap all command on WAC1 to check VAP information.
[WAC1] display vap all
Info: This operation may take a few seconds, please wait.
WID : WLAN ID
----------------------------------------------------------------------------AP ID AP name RfID WID BSSID
Status Auth type
STA
----------------------------------------------------------------------------0
AP1
0
1
6CE8-748D-7540 ON
Open+Portal 0
0
AP1
1
1
6CE8-748D-7550 ON
Open+Portal 0
1
AP2
0
1
6CE8-748D-6D20 ON
Open+Portal 0
1
AP2
1
1
6CE8-748D-6D30 ON
Open+Portal 0
2
AP3
0
1
6CE8-748D-6F00 ON
Open+Portal 0
2
AP3
1
1
6CE8-748D-6F10 ON
Open+Portal 1
----------------------------------------------------------------------------Total: 6
SSID
wlan-net
wlan-net
wlan-net
wlan-net
wlan-net
wlan-net
HCIP-WLAN V2.0 Lab Guide
12.3.2 Associating a STA with the WLAN and Verifying
Authentication
Page 252
HCIP-WLAN V2.0 Lab Guide
Page 253
12.4 Reference Configuration
12.4.1 WAC1 Configuration
Software Version V200R022C00SPC100
#
sysname WAC1
#
vlan batch 100 to 101
#
authentication-profile name p1
portal-access-profile portal1
free-rule-template free1
authentication-scheme radius_huawei
accounting-scheme scheme1
radius-server radius_huawei
#
web-auth-server server-source all-interface
#
management-port isolate enable
management-plane isolate enable
#
radius-server template radius_huawei
radius-server shared-key cipher %^%#I/N%8moVPUUFK%!cJb;M;|PZ~N],pQVb*u(KD:;+%^%#
radius-server authentication 172.18.134.230 1812 source Vlanif 100 weight 80
radius-server accounting 172.18.134.230 1813 source Vlanif 100 weight 80
radius-server authorization 172.18.134.230 shared-key
cipher %^%#FjuvX'1T<!rA8(3[m'-!d*Xt+vtm/K&8&DUTTuU.%^%# server-group radius_huawei
radius-server authorization server-source all-interface#
free-rule-template name default_free_rule
#
free-rule-template name free1
free-rule 1 destination ip 172.18.134.230 mask 255.255.255.255
#
url-template name url1
url https://172.18.134.230:19008/portal
url-parameter redirect-url redirect-url ssid ssid user-ipaddress userip user-mac usermac device-ip acip
#
web-auth-server abc
server-ip 172.18.134.230
port 50200
shared-key cipher %^%#/H+oJc*rtC_]{(WRUDt4un;&<1:g~NP{q(SD$ux#%^%#
url-template url1
source-ip 10.23.100.1
#
portal-access-profile name portal1
web-auth-server abc direct
#
portal-access-profile name portal_access_profile
#
aaa
authentication-scheme radius_huawei
authentication-mode radius
HCIP-WLAN V2.0 Lab Guide
Page 254
accounting-scheme scheme1
accounting-mode radius
accounting realtime 3
local-aaa-user password policy administrator
domain default
authentication-scheme default
accounting-scheme default
radius-server default
domain default_admin
authentication-scheme default
accounting-scheme default
#
interface Vlanif18
ip address 172.18.134.236 255.255.128.0
#
interface Vlanif100
ip address 10.23.100.1 255.255.255.0
management-interface
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 18 100 to 101
#
interface NULL0
#
ip route-static 0.0.0.0 0.0.0.0 10.23.100.254
ip route-static 172.19.0.0 255.255.0.0 172.18.128.1
#
capwap source interface vlanif100
capwap dtls psk %^%#^zZq<D7&>Mc-euO[wdR)zrjY4I`*oJ%UcK6sn%t5%^%#
capwap dtls inter-controller psk %^%#dKz03q"#ARJH__Pm`Yc(6QMF>dsn6M:M247\g!I&%^%#
capwap dtls no-auth enable
#
wlan
calibrate flexible-radio auto-switch
temporary-management psk %^%#PwFE@vw_"@\n9{>}k<,-;9CD7K;0/%e,LB)9,^FX%^%#
ap username admin password cipher %^%#PBMhAQ{@}1q,vb:X0*)B\.KXW7QH=Ogpvg'K*Y)I%^%#
traffic-profile name default
security-profile name default
security-profile name wlan-net
security open
security-profile name default-wds
security-profile name default-mesh
ssid-profile name default
ssid-profile name wlan-net
ssid wlan-net
vap-profile name default
vap-profile name wlan-net
forward-mode tunnel
service-vlan vlan-id 101
ssid-profile wlan-net
security-profile wlan-net
authentication-profile p1
wds-profile name default
mesh-handover-profile name default
HCIP-WLAN V2.0 Lab Guide
mesh-profile name default
regulatory-domain-profile name default
regulatory-domain-profile name domain1
air-scan-profile name default
rrm-profile name default
radio-2g-profile name default
radio-5g-profile name default
wids-spoof-profile name default
wids-whitelist-profile name default
wids-profile name default
wireless-access-specification
ap-system-profile name default
port-link-profile name default
wired-port-profile name default
ap-group name default
ap-group name ap-group1
radio 0
vap-profile wlan-net wlan 1
radio 1
vap-profile wlan-net wlan 1
ap-id 0 type-id 125 ap-mac 6ce8-748d-7540 ap-sn 2102353GSG10N7100245
ap-name AP1
ap-group ap-group1
ap-id 1 type-id 125 ap-mac 6ce8-748d-6d20 ap-sn 2102353GSG10N7100219
ap-name AP2
ap-group ap-group1
ap-id 2 type-id 125 ap-mac 6ce8-748d-6f00 ap-sn 2102353GSG10N7100225
ap-name AP3
ap-group ap-group1
provision-ap
#
return
12.4.2 SW-Core Configuration
!Software Version V200R022C00SPC500
#
sysname SW-Core
#
vlan batch 18 100 to 101
#
dhcp enable
#
interface Vlanif18
ip address 172.18.134.246 255.255.128.0
#
interface Vlanif100
ip address 10.23.100.254 255.255.255.0
dhcp select interface
#
interface Vlanif101
ip address 10.23.101.254 255.255.255.0
dhcp select interface
#
Page 255
HCIP-WLAN V2.0 Lab Guide
Page 256
interface MultiGE0/0/1
port link-type trunk
port trunk allow-pass vlan 18 100 to 101
#
interface MultiGE0/0/4
port link-type trunk
port trunk allow-pass vlan 18
#
interface MultiGE0/0/9
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
return
12.4.3 SW-Access Configuration
!Software Version V200R022C00SPC500
#
sysname SW-Access
#
vlan batch 100 to 101
#
interface MultiGE0/0/1
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/2
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/3
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100 to 101
#
interface MultiGE0/0/9
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
return
12.5 Quiz
In this lab, the URL configured on WAC1 is represented by the IP address of the Portal
server. In an actual environment, the URL is represented by a domain name. In this case,
what are the precautions for deploying Portal authentication?
Answer:
When a STA accesses the Portal server, the domain name needs to be resolved into an IP
address through the DNS server. Therefore, before Portal authentication deployment, you
HCIP-WLAN V2.0 Lab Guide
Page 257
need to configure an authentication-free rule profile to allow the DNS server address to
pass through to ensure correct DNS resolution.
Download