H3c-technologies H3C WA3600 Series Access Points Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Routeurs H3c-technologies H3C WA3600 Series Access Points. H3C Technologies H3C WA3600 Series Access Points User Manual Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 447
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs

Résumé du contenu

Page 1 - H3C WA Series Access Points

H3C WA Series Access PointsWeb-Based Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document versio

Page 2

v Recommended configuration procedure ··········································································································· 194

Page 3 - Preface

87 Loopback configuration You can check whether an Ethernet port works normally by performing the Ethernet port loopback test, during which the port

Page 4 - Network topology icons

88 Table 43 Configuration items Item Description Testing type External. Sets the loopback test type, which can be selected between External and Inter

Page 5 - Documentation feedback

89 MAC address configuration NOTE: • MAC address configurations related to interfaces apply only to Layer 2 Ethernet interfaces. • This chapter

Page 6 - Contents

90 Figure 86 MAC address table of the device Configuring a MAC address entry 1. Select Network > MAC from the navigation tree. The system autom

Page 7

91 Figure 88 Create a MAC address entry 3. Configure the MAC address entry as described in Table 44. 4. Click Apply. Table 44 Configuration item

Page 8

92 Figure 89 Set the aging time for MAC address entries 3. Set the aging time as described in Table 45. 4. Click Apply. Table 45 Configuration it

Page 9

93 Figure 90 Create a static MAC address entry

Page 10

94 VLAN configuration Overview Ethernet is a network technology based on the Carrier Sense Multiple Access/Collision Detect (CSMA/CD) mechanism. As t

Page 11

95 Creating a VLAN 1. Select Network > VLAN from the navigation tree. The system automatically selects the VLAN tab and enters the page as shown

Page 12

96 Figure 94 Modify a VLAN 3. Configure the description and port members for the VLAN as described in Table 46. 4. Click Apply. Table 46 Configur

Page 13

vi Workgroup bridge mode overview ····················································································································

Page 14 - Feature matrix

97 3. Click the icon for the port to be modified to enter the page as shown in Figure 96. Figure 96 Modify a port 4. Configure the port as des

Page 15 - WA3600 series

98 VLAN configuration example Network requirements As shown in Figure 97: • GigabitEthernet 1/0/1 on both devices are hybrid ports with VLAN 1 as th

Page 16 - Quick Start

99 Figure 99 Configure GigabitEthernet 1/0/1 as a tagged member of VLAN 2 and VLANs 6 through 50 d. Click Apply. A dialog box appears asking you t

Page 17 - Admin configuration

100 • VLAN 1 is the default VLAN, which cannot be manually created or removed. • Some VLANs are reserved for special purposes. You cannot manually

Page 18 - IP configuration

101 ARP configuration Overview Introduction to ARP The Address Resolution Protocol (ARP) is used to resolve an IP address into an Ethernet MAC addres

Page 19 - Wireless configuration

102 Figure 101 ARP Table configuration page Creating a static ARP entry 1. Select Network > ARP Management from the navigation tree to enter th

Page 20 - RADIUS configuration

103 Item Description Advanced Options VLAN ID. Enter a VLAN ID and specify a port for the static ARP entry. IMPORTANT: The VLAN ID must be the ID of

Page 21

104 Static ARP configuration example Network requirements To enhance communication security between the AP and the router, configure static ARP entri

Page 22 - Encryption configuration

105 IGMP snooping configuration Internet Group Management Protocol (IGMP) snooping is a multicast constraining mechanism that runs on Layer 2 devices

Page 23

106 Recommended configuration procedure Step Remarks 1. Enabling IGMP snooping globally Required By default, IGMP snooping is disabled. 2. Configu

Page 24

vii Configuration procedure ··························································································································

Page 25 - Configuration summary

107 Figure 107 Basic IGMP snooping configurations Configuring IGMP snooping on a VLAN 1. Select Network > IGMP snooping from the navigation tre

Page 26

108 4. Click Apply. Table 50 Configuration items Item Description VLAN ID This field displays the ID of the VLAN to be configured. IGMP snooping En

Page 27

109 Figure 109 Advanced configuration 3. Configure IGMP snooping on a port as described in Table 51. 4. Click Apply. Table 51 Configuration item

Page 28

110 Displaying IGMP snooping multicast entry information 1. Select Network > IGMP snooping from the navigation tree to enter the basic configurat

Page 29

111 IGMP snooping configuration example Network requirements • As shown in Figure 112, Router A connects to a multicast source (Source) through Ethe

Page 30

112 2. Enable IGMP snooping and the function of dropping unknown multicast data on VLAN 1 (where GigabitEthernet 1/0/1 and WLAN-BSS 1 reside by defa

Page 31

113 Figure 116 Information about an IGMP snooping multicast entry

Page 32

114 IPv4 and IPv6 routing configuration NOTE: The term router in this document refers to routers and APs with the routing functions. Overview Upo

Page 33 - Summary

115 Figure 117 IPv4 active route table Table 53 Field description Field Description Destination IP Address Destination IP address and subnet mask o

Page 34 - Device interface information

116 Figure 118 Create an IPv4 static route 3. Specify relevant information as described in Table 54. 4. Click Apply. Table 54 Configuration ite

Page 35 - Displaying WLAN service

viii Configuring band navigation ·····················································································································

Page 36

117 Item Description Interface Select the outgoing interface. You can select any available Layer 3 interface, for example, a virtual interface, of t

Page 37

118 Creating an IPv6 static route 1. Select Network > IPv6 Routing from the navigation tree. 2. Click the Create tab to enter the IPv6 static ro

Page 38

119 Item Description Interface Select the outgoing interface. You can select any available Layer 3 interface, for example, a virtual interface, of t

Page 39 - Displaying radio

120 Figure 122 Configure a default route Verifying the configuration 1. Display the route table: Enter the IPv4 route page of Switch A, Switch B,

Page 40

121 IPv6 static route configuration example Network requirements The IP addresses of devices are shown in Figure 123. IPv6 static routes must be conf

Page 41

122 Figure 124 Configure a default route Verifying the configuration 1. Display the route table: Enter the IPv6 route page of Switch A, Switch B,

Page 42 - Displaying WDS

123 0.00% packet loss round-trip min/avg/max = 62/62/63 ms Configuration guidelines When you configure a static route, follow these guideline

Page 43 - Displaying client

124 DHCP overview NOTE: After the DHCP client is enabled on an interface, the interface can dynamically obtain an IP address andother configuratio

Page 44

125 Step Remarks 3. Enabling the DHCP server on an interface Optional With the DHCP server enabled on an interface, upon receiving a client's r

Page 45

126 2. Select the Static option in the Address Pool field to view all static address pools. 3. Click Add to enter the page shown in Figure 127. Fi

Page 46

1 About the WA series access points Web-based configuration guide The H3C WA series access points Web-based configuration guide describes the software

Page 47

127 Item Description Gateway Address Enter the gateway addresses for the client. A DHCP client that wants to access an external host needs to send re

Page 48 - Configuring system name

128 Figure 128 Create a dynamic address pool 4. Configure the dynamic address pool as described in Table 58. 5. Click Apply. Table 58 Configurati

Page 49 - 4. Click Apply

129 Item Description Gateway Address Enter the gateway addresses for the client. DHCP clients that want to access hosts outside the local subnet requ

Page 50 - Software upgrade

130 Table 59 Field description Item Description IP Address Assigned IP address. Client MAC Address/Client ID Client MAC address or client ID bound

Page 51

131 Figure 131 Enable DHCP 2. Enable the DHCP server on VLAN-interface 1: (This operation can be omitted because the DHCP server is enabled on the

Page 52 - Diagnostic information

132 − Enter 10.1.1.2 for Gateway Address. c. Click Apply. Figure 133 Configure a dynamic address pool for the DHCP server

Page 53

133 DNS configuration Overview Domain Name System (DNS) is a distributed database used by TCP/IP applications to translate domain names into correspo

Page 54 - System time configuration

134 Configuring dynamic domain name resolution Step Remarks 1. Configuring dynamic domain name resolution Required Enable dynamic domain name resol

Page 55 - Configuring the system time

135 Table 60 Configuration items Item Description Host Name Configure the mapping between a host name and an IP address in the static domain mane tab

Page 56 - Log management configuration

136 Figure 137 Add a DNS server address Adding a domain name suffix 1. Select Network > DNS from the navigation tree 2. Click the Dynamic tab

Page 57 - Setting the log host

2 Table 2 Feature matrix Module Feature WA2600 series WA3600 series Device Optical Ethernet interface Supported on the WA2620X-AGNP Not supported. De

Page 58 - Loghost IP/Domain

137 dynamic domain name resolution. The IP address of the DNS server is 2.1.1.2/16 and the DNS server has a com domain, which stores the mapping betw

Page 59

138 a. In Figure 141, right click zone com, and then select New Host. Figure 141 Add a host b. In the dialog box as shown in Figure 142, enter h

Page 60 - Configuration management

139 Configuring the AP 1. Enable dynamic DNS: a. Select Network > DNS from the navigation tree. b. Click the Dynamic tab to enter the page show

Page 61 - Saving configuration

140 c. Click Apply. Figure 145 Add a domain name suffix Verifying the configuration Use the ping host command on the AP to verify that the commun

Page 62 - Initializing configuration

141 PPPoE Overview Point-to-Point Protocol over Ethernet (PPPoE) uses the client/server model. It establishes point-to-point links over Ethernet, and

Page 63 - Downloading a file

142 Figure 148 PPPoE client information 2. Click Add to enter the page for creating a PPPoE client, as shown in 2. Figure 149 Create a PPPoE clie

Page 64 - Removing a file

143 Task Remarks IP Config Configure the way the dialer interface obtains its IP address: • None: Not configure IP address • Static Address: Static

Page 65

144 Figure 150 Statistic information Table 62 Field description Field Description Interface Ethernet interface where the PPPoE session belongs. Thi

Page 66

145 Figure 151 Summary information Table 63 Field description Field Description Session Number PPPoE session ID. Dialer Interface Number Number of

Page 67 - Creating an interface

146 Configuring the PPPoE client 1. Create a PPPoE client: a. Select Network > PPPoE from the navigation tree. The system automatically enters

Page 68

3 Quick Start The Quick Start wizard leads you through basic configuration procedures to quickly make your device available for use. Quick Start wiza

Page 69

147 1. Select Network > PPPoE from the navigation tree of the AP and click the Session tab. 2. Select Summary Information from the Information T

Page 70

148 Service management Overview The service management module provides the following types of services: Telnet, SSH, SFTP, HTTP and HTTPS. You can en

Page 71

149 Configuring service management 1. Select Network > Service from the navigation tree to enter the service management configuration page, as sh

Page 72

150 Item Description HTTPS Enable HTTPS service. Specifies whether to enable the HTTPS service. The HTTPS service is disabled by default. Port Numbe

Page 73

151 Diagnostic tools Overview Ping You can use the ping function to check whether a device with a specified address is reachable, and to examine netw

Page 74

152 Ping operation IPv4 ping operation 1. Select Diagnostic Tools > Ping from the navigation tree to enter the IPv4 Ping configuration page. 2.

Page 75

153 Figure 157 IPv4 ping operation results IPv6 ping operation 1. Select Diagnostic Tools > Ping from the navigation tree. 2. Enter the IPv6 p

Page 76 - TR-069 configuration

154 Figure 158 IPv6 ping 4. Enter the IPv6 address or host name of the destination device in the Destination IP address or host name field. 5. Se

Page 77

155 Figure 159 IPv6 ping operation results Trace route operation NOTE: • The web interface does not support trace route on IPv6 addresses. • B

Page 78

156 Figure 160 Trace Route configuration page 3. Enter the destination IP address or host name. 4. Click Start to execute the trace route command

Page 79 - Creating a user

4 Figure 2 Basic configuration page 2. Configure the parameters as described in Table 3. Table 3 Configuration items Item Description System Name

Page 80 - Setting the super password

157 Web overview The device provides web-based configuration interfaces for visual device management and maintenance. Figure 162 Web-based network ma

Page 81

158 NOTE: • The PC where you configure the device is not necessarily the web-based network management terminal.A web-based network management term

Page 82 - SNMP configuration

159 • Title area—On the left, displays the path of the current configuration interface in the navigation area; on the right, provides the Save butto

Page 83

160 Function menu Description User level Set idle timeout Display and configure the idle timeout period for a logged-in user. Configure Device Maint

Page 84 - Enabling SNMP

161 Function menu Description User level Configure SNMP. Configure Loopback Test Perform the loopback test on Ethernet interfaces. Configure Networ

Page 85 - Configuring an SNMP view

162 Function menu Description User level DNS Static Domain Name Resolution Display, create, modify, or delete a static host name-to-IP address mappi

Page 86

163 Function menu Description User level Parameter Setting Display radio parameters. Monitor Configure radio parameters. Configure Channel Scan Di

Page 87 - Adding rules to an SNMP view

164 Function menu Description User level Guest Display guest users' configuration information. Monitor Add, modify, and remove guest users. Ma

Page 88 - Configuring an SNMP group

165 Function menu Description User level ACL IPv4 Display Display IPv4 ACL configuration information. Monitor Add Add an IPv4 ACL. Configure Bas

Page 89

166 Function menu Description User level Add Add a class. Configure Setup Configure the classification rules for a class. Configure Delete Dele

Page 90 - Configuring an SNMP user

5 Figure 3 Admin configuration page 2. Configure the parameters as described in Table 4. Table 4 Configuration items Item Description Password Sp

Page 91

167 Common web interface elements Common buttons and icons Table 66 Common buttons and icons Button and icon Description Bring the configuration on

Page 92

168 Figure 165 Content display by pages Searching function The web interface provides you with the basic and advanced searching functions to displa

Page 93

169 Figure 167 Advanced search Take the ARP table shown in Figure 165 as an example. To search for the ARP entries with 000f at the beginning of th

Page 94 - SNMP configuration example

170 Figure 169 Advanced search function example (II) Figure 170 Advanced search function example (III) Sorting function The web interface provide

Page 95

171 Figure 171 Basic sorting function example (based on IP address in the descending order) Configuration guidelines • The web-based configuration

Page 96

172 Troubleshooting web browser Failure to access the device through the web interface Symptom You can ping the device successfully, and log in to th

Page 97

173 The dialog box Security Settings appears. 4. Enable these functions: Run ActiveX controls and plug-ins, script ActiveX controls marked safe for

Page 98

174 Figure 174 Firefox web browser setting

Page 99 - Configuring the NMS

175 Radio configuration Radio frequency (RF) refers to electrical signals that can be transferred over the space to a long distance. 802.11b/g in the

Page 100 - Loopback configuration

176 Item Description 802.11n IMPORTANT: The option is available only when the AP supports 802.11n and the radio mode is 802.11n. Bandwidth Mode 802.

Page 101 - Configuration guidelines

6 Figure 4 IP configuration page 2. Configure the parameters as described in Table 5. Table 5 Configuration items Item Description IP Address Spec

Page 102 - MAC address configuration

177 4. Expand Advanced Setup. Figure 176 Radio setup (advanced setup) 5. Configure the radio as described in Table 68. 6. Click Apply. Table 68

Page 103

178 Item Description Fragment Threshold Specify the maximum length of frames that can be transmitted without fragmentation. When the length of a fram

Page 104

179 Item Description Short Retry Threshold Number of retransmission attempts for unicast frames smaller than the RTS/CTS threshold if no acknowledgme

Page 105 - Network requirements

180 Table 69 Configuration items Item Description 802.11a Configure rates (in Mbps) for 802.11a. By default: • Mandatory rates are 6, 12, and 24. •

Page 106

181 MCS index Number of spatial streams Modulation Data rate (Mbps) 800ns GI 400ns GI 4 1 16-QAM 39.0 43.3 5 1 64-QAM 52.0 57.8 6 1 64-QAM 58.5 65

Page 107 - VLAN configuration

182 MCS index Number of spatial streams Modulation Data rate (Mbps) 800ns GI 400ns GI 11 2 16-QAM 108.0 120.0 12 2 16-QAM 162.0 180.0 13 2 64-QAM

Page 108 - Modifying a VLAN

183 Item Description Multicast MCS Set the multicast MCS for 802.11n. The multicast MCS is adopted only when all the clients use 802.11n. If a non 80

Page 109 - Modifying a port

184 Figure 179 Setting channel calibration NOTE: When an AP uses the radio whose working channel is auto to establish a WDS link, the auto Dynami

Page 110

185 Figure 180 Setting parameters 3. Configure calibration parameters as described in Table 74. 4. Click Apply. Table 74 Configuration items Item

Page 111 - VLAN configuration example

186 Item Description 802.11g Protection Mode • RTS/CTS—Use RTS/CTS mode to implement 802.11g protection. Before sending data to a client, an AP send

Page 112

Copyright © 2003-2013, Hangzhou H3C Technologies Co., Ltd. and its licensors All rights reserved No part of this manual may be reproduced or transmi

Page 113

7 Figure 5 Wireless configuration page 2. Configure the parameters as described in Table 6. Table 6 Configuration items Item Description Primary S

Page 114 - ARP configuration

187 Figure 181 Setting channel scanning 3. Configure channel scanning as described in Table 75. Table 75 Configuration items Item Description Scan

Page 115 - Creating a static ARP entry

188 Item Description 5GHz Excluded Channel/2.4GHz Excluded Channel To avoid selecting improper channels, you can exclude specific channels from autom

Page 116 - Configuring gratuitous ARP

189 • Monitor mode As shown in Figure 183, when AP 2 operates in monitor mode, it monitors all devices in the WLAN through scanning 802.11 frames an

Page 117 - Configuration procedure

190 Figure 185 Setting AP operating mode 3. Configure the AP operating mode as described in Table 76. 4. Click Apply. Table 76 Configuration item

Page 118 - IGMP snooping configuration

191 Figure 186 Displaying detection record NOTE: At present, APs, wireless bridges, clients, and ad hoc devices can be detected. Configuring the

Page 119

192 Figure 188 Displaying history record NOTE: If an entry in the detection record is not refreshed within the aging time, it is deleted from the

Page 120

193 AAA configuration The web interface supports configuring Internet Service Provider (ISP) domains and configuring AAA methods for ISP domains. AAA

Page 121

194 Configuring AAA Configuration prerequisites • To deploy local authentication, configure local users on the access device as described in "U

Page 122

195 Figure 191 Domain Setup page 2. Configure an ISP domain as described in Table 77. 3. Click Apply. Table 77 Configuration items Item Descripti

Page 123

196 Figure 192 Authentication method configuration page 3. Configure authentication methods for different types of users in the domain, as describ

Page 124 - Configuring AP

8 Figure 6 RADIUS configuration page 4. Configure the parameters as described in Table 7. Table 7 Configuration items Item Description Service Typ

Page 125 - Verifying the configuration

197 Item Description Login AuthN Configure the authentication method and secondary authentication method for login users. Options include: • HWTACAC

Page 126

198 Table 79 Configuration items Item Description Select an ISP domain Select the ISP domain for which you want to specify authentication methods. De

Page 127 - Overview

199 Configuring accounting methods for the domain 1. Select Authentication > AAA from the navigation tree. 2. Click the Accounting tab to enter

Page 128

200 Item Description LAN-access Accounting Configure the accounting method and secondary accounting method for LAN access users. Options include: •

Page 129

201 The local user management page appears. b. Click Add. c. Enter telnet as the username. d. Enter abcd as the password. e. Enter abcd again to

Page 130

202 Figure 197 Configure ISP domain test 3. Configure the ISP domain to use local authentication for login users: a. Select Authentication > A

Page 131

203 4. Configure the ISP domain to use local authorization for login users: a. Select Authentication > AAA from the navigation tree. b. Click t

Page 132 - Configuration outlines

204 RADIUS configuration RADIUS overview The Remote Authentication Dial-In User Service (RADIUS) protocol is the most commonly used protocol for impl

Page 133

205 Figure 201 RADIUS scheme configuration page 3. Enter a scheme name. 4. Select a server type and a username format. Table 81 Configuration ite

Page 134

206 Figure 202 Common configuration area 6. Configure the advanced parameters.

Page 135

9 Encryption configuration Select the Encrypt box on the wireless configuration page to enter the encryption configuration page shown in Figure 7. Fi

Page 136

207 Table 82 Configuration items Item Description Authentication Key Set the shared key for RADIUS authentication packets and that for RADIUS account

Page 137 - DHCP overview

208 Item Description Realtime Accounting Interval Set the interval for sending real-time accounting information. The interval must be a multiple of 3

Page 138 - Enabling DHCP

209 Item Description Send accounting-on packets Enable or disable the accounting-on feature. The accounting-on feature enables a device to send accou

Page 139

210 Item Description Key Specify the shared key for communication with the RADIUS server. If no shared key is specified here, the shared key specifie

Page 140

211 h. Select the AP from the device list or manually add the AP (with the IP address 10.1.1.2). NOTE: The IP address of the added access device

Page 141

212 Figure 206 Device management user configuration page Configuring the AP 1. Configure the RADIUS scheme system: a. Select Authentication >

Page 142

213 Figure 207 RADIUS authentication server configuration page f. In the RADIUS Server Configuration area, click Add to enter the RADIUS server co

Page 143 - DHCP server

214 Figure 209 RADIUS scheme configuration 2. Create the ISP domain bbb: a. From the navigation tree, select Authentication > AAA. The domain

Page 144

215 Figure 210 Create an ISP domain 3. Configure an authentication method for the ISP domain: a. Click the Authentication tab. b. Select the do

Page 145

216 4. Configure an authorization method for the ISP domain: a. Click the Authorization tab. b. Select the domain name bbb. c. Select the Defaul

Page 146 - DNS configuration

10 Item Description Key ID Select the WEP key index, which can be 1, 2, 3, or 4. Each number represents one of the four static keys of WEP. The selec

Page 147

217 Figure 213 Configure an accounting method for the ISP domain 6. Enable the Telnet service: a. From the navigation tree, select Network > S

Page 148 - Adding a DNS server address

218 • If you remove the accounting server used for online users, the device cannot send real-time accounting requests and stop-accounting messages f

Page 149 - DNS configuration example

219 HWTACACS configuration HWTACACS overview HW Terminal Access Controller Access Control System (HWTACACS) is an enhanced security protocol based on

Page 150 - DNS client

220 Step Remarks 3. Configuring HWTACACS parameters Optional. This section describes how to configure the parameters that are necessary for informat

Page 151

221 Table 85 Configuration items Configuration item Description Server Type Select the type of the server to be configured, which can be Authenticat

Page 152 - Configuring the AP

222 Figure 217 HWTACACS parameter configuration 3. Configure HWTACACS parameters as described in Table 86. 4. Click Apply. Table 86 Configuration

Page 153

223 Item Description Stop-Accounting Buffer Enable or disable buffering stop-accounting requests without responses in the device. Since stop-accounti

Page 154 - Configuring PPPoE client

224 Item Description Unit of Packets Specify the unit for data packets sent to the HWTACACS server for traffic accounting. Options include: • packet

Page 155

225 Figure 219 Create an HWTACACS scheme 2. Configure the HWTACACS authentication server: a. Select Authentication Server as the server type. b.

Page 156

226 b. Click the Parameter Configuration tab. c. Select the username format without-domain. d. Click Apply. Figure 221 Configure the parameters fo

Page 157

11 Item Description Preshared Key Type • pass-phrase—Enter a PSK in the form of a character string. You should enter a string that can be displayed

Page 158

227 Figure 222 Create an ISP domain 7. Configure an authentication method for the ISP domain: a. Click the Authentication tab. b. Select the do

Page 159 - Configuring the PPPoE server

228 8. Configure an authorization method for the ISP domain: a. Click the Authorization tab. b. Select the domain name test. c. Select the Defau

Page 160

229 Figure 225 Configure an accounting method for the ISP domain 10. Log in to the CLI, enable Telnet service, and configure the AP to use AAA for

Page 161 - Service management

230 Number of users Real-time accounting interval (in minutes) 500 to 999 12 ≥1000 ≥15

Page 162

231 User configuration User overview This module allows you to configure local users, user groups, and guests. Local user A local user is an account

Page 163 - Item Descri

232 Figure 226 Local user list 2. Click Add. The local user configuration page appears. On this page, you can create a local user of any type exce

Page 164 - Diagnostic tools

233 Item Description Password Specify a password for the local user and confirm the password. The two passwords must be identical. IMPORTANT: Leadi

Page 165 - Ping operation

234 Item Description ACL Specify the ACL to be used by the access device to restrict the access of the local user after the user passes authenticatio

Page 166 - IPv6 ping operation

235 Table 89 Configuration items Item Description Group-name Specify a name for the user group. Level Select an authorization level for the user gro

Page 167

236 3. Click Add to enter the guest configuration page. Figure 231 Guest configuration page 4. Configure a single guest or a batch of guests as d

Page 168 - Trace route operation

12 Configuration summary 1. On the radio configuration page, click Next. The configuration summary page appears, displaying all configurations you h

Page 169

237 Procedure for a guest administrator to configure a guest NOTE: Guest administrators can manage only guest accounts and can only manage guest ac

Page 170 - Web overview

238 Certificate management PKI overview The Public Key Infrastructure (PKI) is a general security infrastructure for providing information security t

Page 171 - (1) Navi

239 You can specify the PKI certificate request mode for a PKI domain. Different PKI certificate request modes require different configurations. Reco

Page 172 - Web user level

240 Step Remarks 5. Requesting a local certificate Required. When requesting a certificate, an entity introduces itself to the CA by providing its i

Page 173

241 Step Remarks 2. Creating a PKI domain Required. Create a PKI domain, setting the certificate request mode to Auto. Before requesting a PKI certi

Page 174

242 Figure 235 PKI entity configuration page 3. Configure the parameters as described Table 91. 4. Click Apply. Table 91 Configuration items Item

Page 175

243 2. Click the Domain tab to enter the page displaying existing PKI domains. Figure 236 PKI domain list 3. Click Add to enter the PKI domain c

Page 176

244 Item Description Institution Select the authority for certificate request. • CA—Indicates that the entity requests a certificate from a CA. • R

Page 177

245 Item Description CRL Update PeriodCRL update period, that is, the interval at which the PKI entity downloads the latest CRLs. This item is availa

Page 178

246 Destroying the RSA key pair 1. Select Authentication > Certificate Management from the navigation tree. 2. Click the Certificate tab to ente

Page 179

13 • The AP provides a plain-text wireless service with SSID service. • 802.11n (2.4 GHz) is adopted to inter-work with the existing 802.11g networ

Page 180 - Content display by pages

247 Item Description Enable Offline Mode Click this box to retrieve a certificate in offline mode (that is, by an out-of-band means like FTP, disk, o

Page 181 - Searching function

248 2. Click the Certificate tab to enter the page displaying existing PKI certificates. 3. Click Request Cert to enter the local certificate requ

Page 182

249 2. Select the CRL tab to enter the page displaying CRLs. Figure 245 CRL page 3. Click Retrieve CRL to retrieve the CRL of a domain. 4. Click

Page 183 - Sorting function

250 Figure 247 Network diagram Configuring the CA server 1. Create a CA server named myca. In this example, you must first configure the basic att

Page 184

251 Figure 248 Configure a PKI entity 2. Create a PKI domain. a. Click the Domain tab b. Click Add. c. Enter torsa as the PKI domain name. d.

Page 185 - Troubleshooting web browser

252 Figure 249 Configure a PKI domain 3. Generate an RSA key pair. a. Click the Certificate tab. b. Click Create Key. c. Enter 1024 as the key

Page 186

253 e. Click Apply. Figure 251 Retrieve the CA certificate 5. Request a local certificate. a. Click the Certificate tab. b. Click Request Cert.

Page 187

254 Verifying the configuration After the configuration, select Authentication > Certificate Management > Certificate from the navigation tree

Page 188 - Radio configuration

255 Wireless service Wireless Local Area Networks (WLAN) have become very popular because they are very easy to setup and use, and low cost. Generall

Page 189

256 Figure 254 Establish a client access Scanning A wireless client can get the surrounding wireless network information in two ways, passive scann

Page 190

14 Figure 13 Radio configuration page 3. Check and apply the configurations: Click Next to enter the configuration summary page. If you want to m

Page 191

257 A client sends a probe request (with a specified SSID): When the wireless client is configured to access a specific wireless network or has alrea

Page 192

258 Figure 258 Open system authentication process • Shared key authentication Figure 259 shows a shared key authentication process. The two partie

Page 193 - Configuring 802.11n MCS

259 • Receiving a data frame from a client which is unauthenticated. • Receiving a PS-poll frame from a client which is unauthenticated. 2. Dissoc

Page 194

260 CTR with CBC-MAC protocol (CCMP) is based on the CCM of the AES encryption algorithm. CCM combines CTR for confidentiality and CBC-MAC for authen

Page 195 - Configuring 802.11n rates

261 Figure 260 Local MAC authentication • Remote MAC authentication: Remote Authentication Dial-In User Service (RADIUS) based MAC authentication.

Page 196 - Configuring calibration

262 802.11n As the next generation wireless LAN technology, 802.11n supports both 2.4GHz and 5GHz bands. It provides higher throughput to customers b

Page 197 - Parameter setting

263 Point to point bridge connection In this network, WDS uses two devices to form a bridge between two LANs, and interconnect the two LANs. In actua

Page 198

264 Figure 264 Self topology detection and bridging Repeater mode overview An AP acting as a repeater can set up a link with another AP through a W

Page 199 - Configuring channel scanning

265 Figure 266 Network diagram LAN Segment

Page 200

266 Configuring wireless service Configuring access service Recommended configuration procedure Step Remarks 1. Creating a wireless service Requir

Page 201

15 Figure 14 Network diagram Configuring the AP 1. Perform basic configurations: From the navigation tree, select Quick Start to enter the home pa

Page 202

267 Figure 268 Create a wireless service 3. Configure the wireless service as described in Table 95. 4. Click Apply. Table 95 Configuration items

Page 203 - Displaying detection record

268 Figure 269 Configure clear type wireless service 3. Configure the basic settings for the clear type wireless service as described in Table 96.

Page 204 - Displaying history record

269 Figure 270 Advanced settings for the clear type wireless service 3. Configure the advanced settings for the clear type wireless service as des

Page 205 - Antenna

270 Figure 271 Security settings for the clear type wireless service 3. Configure the security settings for the clear type wireless service as des

Page 206 - AAA configuration

271 Item Description Port Mode • mac-authentication—Perform MAC address authentication on users. • mac-else-userlogin-secure—This mode is the combi

Page 207 - Configuring AAA

272 Figure 272 mac-authentication port security configuration page Table 99 Configuration items Item Description Port Mode mac-authentication—MAC-b

Page 208

273 Figure 273 userlogin-secure/userlogin-secure-ext port security configuration page (userlogin-secure is taken for example) Table 100 Configurati

Page 209

274 Item Description Handshake • Enable—Enable the online user handshake function so that the device can periodically send handshake messages to a u

Page 210

275 Table 101 Configuration items Item Description Port Mode • mac-else-userlogin-secure—This mode is the combination of the mac-authentication and

Page 211

276 Item Description Multicast Trigger • Enable—Enable the multicast trigger function of 802.1X to send multicast trigger messages to the clients per

Page 212

16 Figure 16 Encryption configuration page e. Click Next to enter the radio configuration page. f. To perform radio configuration:  Select th

Page 213 - AAA configuration example

277 2. Click the icon corresponding to the target crypto type wireless service. The page for configuring advanced settings for the crypto type wir

Page 214

278 Item Description Management Right Web interface management right of online clients. • Disable—Disable the web interface management right of onlin

Page 215

279 Figure 277 Security settings for the crypto type wireless service 3. Configure the security settings for the crypto type wireless service as d

Page 216 - [AP-ui-vty0-4] quit

280 Item Description Security IE Wireless service type (IE information carried in the beacon or probe response frame): • WPA—Wi-Fi Protected Access.

Page 217

281 Item Description Port Security See Table 98. Parameters such as authentication type and encryption type determine the port mode. For more informa

Page 218

282 Item Description Domain Select an existing domain from the list. The default domain is system. To create a domain, select Authentication > AA

Page 219

283 Security parameter dependencies For a clear-type wireless service or crypto-type wireless service, the security parameter dependencies are descri

Page 220

284 Binding an AP radio to a wireless service 1. Select Wireless Service > Access Service from the navigation tree. 2. Click the Bind link of th

Page 221

285 Configuring WDS service Configuring WDS service 1. Select Wireless Service > WDS from the navigation tree. 2. Click the WDS Setup tab to ent

Page 222

286 Configuring a neighbor MAC address NOTE: If no neighbor MAC address is configured for an AP, the AP can establish a WDS link with any other AP

Page 223

Preface The H3C WA Series Access Points Web-based Configuration Guide describes the web functions of the WA series, such as quick start, Web overview,

Page 224

17 Click Next to enter the configuration summary page. If you want to modify certain configurations, click Back to return to the previous pages; if

Page 225

287 Figure 285 Configure advanced WDS 4. Configure advanced WDS settings as described in Table 108. 5. Click Apply. Table 108 Configuration items

Page 226

288 Item Description STP The following loop types may exist in a WDS network: . .When a loop exists in the network, you can block redundant link

Page 227

289 Item Description VLAN (Tagged) Enter the ID of the VLAN whose packets are to be sent tagged. VLAN (Tagged) indicates that the port sends the traf

Page 228

290 NOTE: • A radio enabled with auto DFS and WDS works in a non-radar channel. • When you select auto-DFS, if no WDS link is established, a temp

Page 229

291 Figure 288 Repeater mode Configuring the workgroup bridge Enabling the client mode 1. Select Wireless Service > Client Mode from the naviga

Page 230

292 With the client mode enabled, you can check the existing wireless services in the wireless service list. Figure 290 Check the wireless service l

Page 231

293 Item Remarks CipherSuit Set the data encryption mode, which can be: • Clear—No encryption • WEP—WEP encryption • TKIP/AES-CCMP—TKIP/AES-CCMP e

Page 232 - HWTACACS configuration

294 Figure 293 Display statistics Wireless access configuration examples Wireless service configuration example Network requirements As shown in Fi

Page 233 - Configuring HWTACACS servers

295 3. Bind an AP radio to a wireless service a. Select Wireless Service > Access Service from the navigation tree. b. Click the Bind link at t

Page 234

296 Figure 298 Enable 802.11n radio Verifying the configuration • The client can successfully associate with the AP and access the WLAN network. •

Page 235

18 Figure 19 Wireless configuration page c. Click Next to enter the encryption configuration page. d. To perform encryption configuration:  S

Page 236

297 Figure 300 Network diagram Configuring the AP 1. Configure the fat AP interface: a. Assign an IP address to the fat AP:  Select Network >

Page 237

298 b. Click Add. c. On the page that appears, enter the service name office, select the wireless service type clear, and click Apply. d. On the p

Page 238

299 Figure 304 Network diagram Configuring the AP 1. Assign an IP address to the fat AP: a. Select Network > VLAN to create a VLAN on the fat

Page 239

300 Figure 306 Security setup 4. Bind an AP radio to a wireless service a. Select Wireless Service > Access Service from the navigation tree.

Page 240

301 Figure 308 Enable the wireless service 6. Enable 802.11n radio (By default, 802.11n radio is enabled. Therefore, this step is optional. ) Sele

Page 241

302 Figure 309 Configure the client The client has the same preshared PSK key as the AP, so the client can associate with the AP.

Page 242

303 Figure 310 The client is associated with the AP Verifying the configuration • The same PSK pre-shared key is configured on the client. The cli

Page 243 - interval (in minutes)

304 b. Select Device > Interface Management to assign an IP address to the VLAN interface. 2. Configure a wireless service: a. Select Wireless

Page 244 - User configuration

305 Figure 313 Security setup 4. Bind an AP radio to a wireless service a. Select Wireless Service > Access Service from the navigation tree.

Page 245

306 b. Select the mac-auth box. c. Click Enable. Figure 315 Enable the wireless service 6. Configure a MAC authentication list a. Select Wirele

Page 246

19  Use default settings for other parameters. g. Click Next. Figure 21 Radio configuration page 3. Check and apply the configurations: Click

Page 247 - Configuring a user group

307 Figure 317 Configure the client Verifying the configuration • If the MAC address of the client is in the MAC authentication list, the client c

Page 248 - Configuring a guest

308 • The IP address of the AP is 10.18.1.1. On the AP, configure the shared key for communication with the RADIUS server as expert, and configure t

Page 249

309 b. Optional: On the Domain Setup tab, create a new ISP domain. This example uses the default domain system. c. On the Authentication tab, sele

Page 250

310 Figure 322 Configure the AAA accounting method for the ISP domain 4. Configure wireless service a. Select Wireless Service > Access Servic

Page 251 - Certificate management

311 Figure 324 Security setup 6. Bind an AP radio to a wireless service a. Select Wireless Service > Access Service from the navigation tree.

Page 252

312 Figure 326 Enable the wireless service 8. Optional: Enable 802.11n radio (By default, 802.11n radio is enabled.) Select Radio > Radio from

Page 253

313 Figure 327 Add access device 2. Add service. a. Select the Service tab. b. Select Access Service > Access Device from the navigation tree

Page 254 - Creating a PKI entity

314 Figure 329 Add account Configuring the RADIUS server (iMC v5) NOTE: The following takes the iMC (iMC PLAT 5.0 and iMC UAM 5.0) as an example

Page 255 - Creating a PKI domain

315 b. Select User Access Manager > Service Configuration from the navigation tree. c. Click Add. d. On the page that appears, set the service

Page 256

316 Remote 802.1X authentication configuration example Network requirements Perform remote 802.1X authentication on the client. • A RADIUS server (a

Page 257

20 Summary Device information You can view the following information on the Device Info menu: • Device information • System resource state • Devic

Page 258 - Generating an RSA key pair

317 Figure 334 Configure RADIUS 3. Configure AAA a. Select Authentication > AAA from the navigation tree. b. Optional: On the Domain Setup ta

Page 259 - Destroying the RSA key pair

318 Figure 336 Configure the AAA authorization method for the ISP domain e. On the Accounting tab, select the ISP domain name system, select the A

Page 260

319 Figure 338 Create a wireless service 5. Configure 802.1X authentication After you create a wireless service, you enter the wireless service co

Page 261

320 b. Click the Bind link at the right side of the wireless service mac-auth to enter the page as shown in Figure 340. c. Select the box with radi

Page 262 - PKI configuration example

321 d. On the page that appears, enter the shared key expert, enter the authentication and accounting ports 1812 and 1813, select LAN Access Service

Page 263 - Configuring the CA server

322 Figure 343 Add service 3. Add account. a. Select the User tab. b. Select User > All Access Users from the navigation tree. c. Click Add.

Page 264

323 Configuring the RADIUS server (iMC v5) NOTE: The following takes the iMC (iMC PLAT 5.0 and iMC UAM 5.0) as an example to illustrate the basic

Page 265

324 Figure 346 Add a service 3. Add an account. a. Select the User tab. b. Select User > All Access Users from the navigation tree. c. Clic

Page 266

325 3. On the Wireless Networks tab, select wireless network with the SSID dot1x, and then click Properties. The dot1x Properties window appears. 4.

Page 267

326 Figure 348 Configure the wireless card (I)

Page 268 - Wireless service

21 Select a refresh mode in the Refresh Period list. • If you select a specific refresh period (for example, 1 minute), the system periodically refr

Page 269 - Scanning

327 Figure 349 Configure the wireless card (II)

Page 270 - Authentication

328 Figure 350 Configure the wireless card (III) Verifying the configuration • After entering the username user and password dot1x in the popup di

Page 271 - Other related procedures

329 Figure 351 Network diagram Configuring the AP 1. Assign an IP address to the fat AP: a. Select Network > VLAN to create a VLAN on the fat

Page 272 - WLAN data security

330 g. Disable Handshake and Multicast Trigger (recommended). h. Click Apply. Figure 353 Security setup 6. Bind an AP radio to a wireless servic

Page 273 - Client access authentication

331 Figure 355 Enable the wireless service 8. Optional: Enable 802.11n radio (802.11n radio is enabled by default.). Select Radio > Radio from

Page 274

332 Figure 356 Configure the wireless card (I) 4. On the Authentication tab, select Protected EAP (PEAP) from the EAP type list, and click Propert

Page 275 - Introduction to WDS

333 Figure 357 Configure the wireless card (II)

Page 276 - Mesh bridge connection

334 Figure 358 Configure the wireless card (III) Verifying the configuration • After the user enters the username user and password dot1x in the p

Page 277 - Repeater mode overview

335 Configuring the AP 1. Assign an IP address to the fat AP: a. Select Network > VLAN to create a VLAN on the fat AP. b. Select Device > I

Page 278 - LAN Segment

336 Figure 362 Enable the wireless service 5. Enable 802.11n(2.4GHz) radio (By default, 802.11n(2.4GHz) radio is enabled.) Select Radio > Radi

Page 279 - Configuring wireless service

22 Item Description Status Display interface status. • —The interface is up and is connected. • —The interface is up, but not connected. • —The in

Page 280

337 Configuration guidelines Note the following guidelines when you configure 802.11n: • Select Radio > Radio from the navigation tree, select th

Page 281

338 Figure 366 WDS setup page b. Click the corresponding icon of the target radio unit. c. On the page that appears, select the Pass Phrase box

Page 282

339 Figure 368 Configure the working channel 4. Enable 802.11n(5GHz) radio (By default, 802.11n(5GHz) is enabled.). Select Radio > Radio from t

Page 283

340 Figure 370 The page displaying WDS information Configuration guidelines The output information of a WDS link includes: neighbor MAC address, lo

Page 284

341 Configuration guidelines Note the following guidelines when you configure WDS: • Configure a neighbor MAC address for each radio interface (othe

Page 285

342 Figure 373 WDS setup page b. Click the icon in the Operation column of the target 802.11n (2.4GHz) radio mode. c. Select the Pass Phrase bo

Page 286

343 Figure 375 Configure the same channel 3. Enable 802.11n (2.4GHz) radio (By default, 802.11n (2.4GHz) is enabled.). Select Radio > Radio fr

Page 287

344 Figure 377 Configure the access service NOTE: When you configure access service on the repeater, make sure the radio mode of the repeater is

Page 288

345 Figure 379 The page displaying radio information Workgroup bridge mode configuration example Network requirements As shown in Figure 380, an AP

Page 289

346 a. Select Wireless Service > Client Mode from the navigation tree. b. Click Connect Setup. c. On the page that appears, select the box corr

Page 290

23 Figure 23 Displaying detailed information about WLAN service (clear type) Table 15 Field description Field Description Service Template Number

Page 291

347 Figure 383 SET CODE Verifying the configuration On the AP shown in Figure 380, select Summary > Client from the navigation tree to enter the

Page 292

348 NOTE: To configure VLAN information about the WLAN uplink interface of the workgroup bridge, make sure theVLAN ID of the WLAN uplink interface

Page 293

349 Configuring ACL and QoS NOTE: Unless otherwise stated, ACLs refer to both IPv4 and IPv6 ACLs throughout this document. Overview Introduction

Page 294

350 QoS refers to the ability to provide improved service by solving the core issues such as delay, jitter, and packet loss ratio in the packet forwa

Page 295

351 Step Remarks 3. Configuring a rule for a basic IPv4 ACL Required. Complete one of the three steps according to the ACL category. 4. Configurin

Page 296

352 Figure 386 Adding a time range 3. Configure the time range information. 4. Click Apply. Table 111 Configuration items Item Description Time

Page 297 - Enabling a radio

353 2. Click the Add tab to enter the IPv4 ACL adding page. Figure 387 Adding an IPv4 ACL 3. Configure the IPv4 ACL information as described in T

Page 298 - Configuring WDS service

354 Figure 388 Configuring an basic IPv4 ACL 3. Configure a basic IPv4 ACL as described in Table 113. 4. Click Add. Table 113 Configuration item

Page 299

355 Item Description Check Logging Select this option to log matching IPv4 packets. A log entry contains the ACL rule number, action on the matching

Page 300

356 Figure 389 Configuring an advanced IPv4 ACL 3. Configure an advanced IPv4 ACL rule as described in Table 114. 4. Click Add. Table 114 Config

Page 301

24 Figure 24 Displaying detailed information about WLAN service (crypto type) Table 16 Field description Field Description Service Template Number

Page 302 - Configuring global WDS

357 Item Description Rule ID Select the Rule ID option and enter a number for the rule. If you do not specify the rule number, the system assigns on

Page 303 - Enabling WDS service

358 Item Description TCP/UDP Port TCP Connection Established Select this option to make the rule match packets used for establishing and maintaining

Page 304 - Enabling the client mode

359 Figure 390 Configuring a rule for an Ethernet frame header ACL 3. Configure an Ethernet frame header IPv4 ACL rule as described in Table 115.

Page 305 - Method 1

360 Item Description MAC Address Filter Source MAC Address Select the Source MAC Address option and enter a source MAC address and wildcard. Source

Page 306 - Displaying statistics

361 Figure 391 Adding an IPv6 ACL 3. Configure the IPv6 ACL information as described in Table 116. 4. Click Apply. Table 116 Configuration items

Page 307

362 Figure 392 Configuring a rule for a basic IPv6 ACL 3. Configure the basic IPv6 ACL rule information as described in Table 117. 4. Click Add.

Page 308

363 Item Description Source IP Address Select the Source IP Address option and enter a source IPv6 address and prefix length. The IPv6 address must

Page 309

364 4. Click Add. Table 118 Configuration items Item Description Select Access Control List (ACL) Select the advanced IPv6 ACL for which you want t

Page 310

365 Item Description TCP/UDP Port Source Operation Select the operations and enter the source port numbers and destination port numbers as required.

Page 311

366 Figure 394 Configuring priority trust mode 2. Configure the priority trust mode of the interfaces as described in Table 119. 3. Click Apply.

Page 312 - L2 switch

25 Field Description Maximum clients per BSS Maximum number of associated clients per BSS. Displaying statistics of WLAN service Figure 25 Displayi

Page 313

367 Item Description (Select the ports) Specify the ports to be configured. Click the ports to be configured in the port list. You can select one or

Page 314 - Configuring the client

368 Step Remarks 6. Configuring classifier-behavior associations for the policy Required. Associate a traffic behavior with a class in the QoS poli

Page 315

369 Item Description Operation Specify the logical relationship between rules of the classifier. • And—Specifies the relationship between the rules

Page 316

370 Figure 396 Configuring classification rules 3. Configuration classification rules as described in Table 121. 4. Click Apply. A progress dial

Page 317

371 Item Description DSCP Define a rule to match DSCP values. If multiple such rules are configured for a class, the new configuration does not over

Page 318

372 Item Description MAC Source MAC Define a rule to match a source MAC address. If multiple such rules are configured for a class, the new configur

Page 319

373 Figure 397 Adding a traffic behavior Configuring actions for a traffic behavior 1. Select QoS > Behavior from the navigation tree. 2. Clic

Page 320

374 Figure 398 Setting a traffic behavior 3. Configure the traffic behavior actions as described in Table 122. 4. Click Apply. A progress dialog

Page 321

375 Item Description CAR Enable/Disable Enable or disable CAR. CIR Set the committed information rate (CIR), the average traffic rate. CBS Set the

Page 322

376 Item Description Filter Configure the packet filtering action. After selecting the Filter option, select one item in the following list: • Perm

Page 323

26 Displaying radio Displaying WLAN services bound to a radio Select Summary > Radio from the navigation tree, click the specified radio unit, and

Page 324

377 Figure 400 Setting a policy 3. Configure classifier-behavior associations as described in Table 123. 4. Click Apply. Table 123 Configuration

Page 325

378 Figure 401 Applying a policy to a port 3. Select a policy and apply the policy to the specified ports as described in Table 124. 4. Click Ap

Page 326

379 Figure 402 Service policy 2. Click the icon for a wireless service to enter the service policy setup page. Figure 403 Service policy setup

Page 327

380 Item Remarks Inbound Policy Apply the QoS policy to the packets received by the wireless service. Outbound Policy Apply the QoS policy to the p

Page 328

381 Figure 405 Defining a time range covering 8:00 to 18:00 every day 2. Add an advanced IPv4 ACL: a. Select QoS > ACL IPv4 from the navigatio

Page 329

382 Figure 406 Adding an advanced IPv4 ACL 3. Define an ACL rule for traffic to the FTP server: a. Click the Advanced Setup tab. b. Select 3000

Page 330

383 Figure 407 Defining an ACL rule for traffic to the FTP server 4. Add a class: a. Select QoS > Classifier from the navigation tree. b. Cli

Page 331

384 Figure 408 Adding a class 5. Define classification rules. a. Click the Setup tab. b. elect the class name class1 in the list. Select the AC

Page 332

385 Figure 409 Defining classification rules 6. Add a traffic behavior: a. Select QoS > Behavior from the navigation tree. b. Click the Add t

Page 333

386 Figure 410 Adding a traffic behavior 7. Configure actions for the traffic behavior: a. Click the Setup tab. b. elect behavior1 in the list.

Page 334

Symbols Convention Description WARNING An alert that calls attention to important information that if not understood or followed can result in person

Page 335

27 Figure 28 Displaying detailed radio information Table 17 Field description Field Description WLAN-Radio1/0/1 current state Link state of WLAN-

Page 336

387 Figure 411 Configuring actions for the behavior 8. Add a policy: a. Select QoS > QoS Policy from the navigation tree. b. Click the Add ta

Page 337

388 Figure 412 Adding a policy 9. Configure classifier-behavior associations for the policy. a. Click the Setup tab. b. Select policy1. Select

Page 338

389 Figure 414 Applying the QoS policy in the inbound direction of wireless service service1 Verifying the configuration After you complete these c

Page 339

390 Configuring wireless QoS Overview An 802.11 network offers wireless access based on the carrier sense multiple access with collision avoidance (C

Page 340

391 WMM protocol overview The distributed coordination function (DCF) in 802.11 stipulates that access points (APs) and clients use the CSMA/CA acces

Page 341

392 To use a high-priority access category, a client must send a request to the AP. The AP returns a positive or negative response based on either of

Page 342

393 Figure 416 Wireless QoS 2. Select the option in front of the radio unit to be configured. 3. Click Enable. By default, WMM is enabled. NO

Page 343

394 3. Configure SVP mapping as described in Table 126. 4. Click Apply. Table 126 Configuration items Item Description Radio Displays the selecte

Page 344

395 By default, the QoS Service tab is displayed. 2. Click the icon for the desired radio to enter the page for configuring wireless QoS. 3. On

Page 345

396 Setting EDCA parameters for wireless clients 1. Select QoS > Wireless QoS from the navigation tree. By default, the QoS Service tab is displ

Page 346

28 Field Description HT protection mode 802.11n protection modes: • no protection mode(0)—The clients associated with the AP, and the wireless devic

Page 347

397 NOTE: • ECWmin cannot be greater than ECWmax. • If all clients operate in 802.11b radio mode, set TXOPLimit to 188 and 102 for AC-VI and AC-V

Page 348

398 Field Description Radio chip max TXOPLimit Maximum TXOPLimit allowed by the radio chip. Radio chip max ECWmax Maximum ECWmax allowed by the ra

Page 349

399 Displaying client statistics 1. Select QoS > Wireless QoS from the navigation tree. 2. Click the Client Statistics tab to enter the page di

Page 350 - WDS configuration examples

400 Field Description Downlink CAC packets Number of downlink CAC packets. Downlink CAC bytes Number of downlink CAC bytes. Downgrade packets Num

Page 351

401 Item Description Direction Traffic direction, which can be: • Inbound—Traffic from clients to the AP. • Outbound—Traffic from the AP to clients

Page 352

402 Figure 425 Setting the reference radio bandwidth 3. Set the reference radio bandwidth as described in Table 135. 4. Click Apply. Table 135 Co

Page 353

403 Figure 426 Setting guaranteed bandwidth 2. Set the guaranteed bandwidth as described in Table 136. 3. Click Apply. Table 136 Configuration

Page 354 - Configuring the repeater

404 Displaying guaranteed bandwidth settings 1. Select QoS > Wireless QoS from the navigation tree. 2. Click the Bandwidth Guarantee tab. 3.

Page 355

405 b. Make sure that WMM is enabled. Figure 430 Wireless QoS configuration page c. Select the radio unit to be configured on the list and click

Page 356

406 maximum number of users allowed in high-priority access categories, which is 10 in this example, the request is allowed. The system decreases the

Page 357

29 Field Description Output: 3436 packets, 492500 bytes : 3016 unicasts, 424408 bytes : 320 multicasts/broadcasts, 42994 bytes :

Page 358

407 • Check that traffic from Client1 is rate limited to around 128 kbps, so is traffic from Client2. Dynamic rate limiting configuration example Ne

Page 359

408 1. When only Client1 accesses the WLAN through SSID service2, its traffic can pass through at a rate as high as 8000 kbps. 2. When both Client1

Page 360

409 Figure 438 Setting the reference radio bandwidth e. Click the icon for 802.11a to enter the page for setting guaranteed bandwidth. f. Set t

Page 361

410 Verifying the configuration • Send traffic from the AP to the three clients at a rate lower than 10000 kbps. The rate of traffic from the AP to

Page 362 - Configuring ACL and QoS

411 Advanced settings Advanced settings overview District code Radio frequencies for countries and regions vary based on country regulations. A distr

Page 363 - Configuring an ACL

412 Figure 442 Network diagram for uplink interface monitoring (a radio interface acts as the uplink interface) Channel busy test The channel busy

Page 364 - Adding a time range

413 Figure 443 Multicast data transmission when multicast optimization is enabled With multicast optimization enabled, the AP listens to the IGMP r

Page 365 - Adding an IPv4 ACL

414 Figure 444 Setting a district code 2. Configure a district code as described in Table 137. 3. Click Apply. Table 137 Configuration items Item

Page 366

415 Figure 446 Configuring continuous transmitting mode 2. Click the icon corresponding to the target radio to enter the page for configuring tr

Page 367

416 Configuring uplink interface monitoring 1. Select Advanced > Uplink Monitor from the navigation tree. Figure 449 Configuring uplink interface

Page 368 - Item Descri

30 Field Description Signal Quality —If the signal strength indicator is represented by no signal bar, it indicates that RSSI=0. —If the signal stren

Page 369

417 Figure 451 Testing channel busy rate 3. Configure channel busy test as described in Table 139. 4. Click Start. Table 139 Configuration items

Page 370

418 • The fast association function is disabled. By default, the fast association function is disabled. For more information about fast association,

Page 371

419 Item Description Max Denial Count Maximum denial count of client association requests. If a client has been denied more than the maximum times on

Page 372

420 Table 141 Configuration items Item Description Aging Time Specify the aging time for multicast optimization entries. If the AP does not receive a

Page 373 - Adding an IPv6 ACL

421 Table 142 Field description Field Description Total Clients Total number of clients served by multicast optimization. If a client joins multiple

Page 374

422 1. Configure wireless service: a. Select Wireless Service > Access Service from the navigation tree. b. Click Add. c. On the page that app

Page 375

423 Figure 457 Configuring band navigation Verifying the configuration Client 1 and Client 2 are associated to the 5 GHz radio of the AP, and Clien

Page 376

424 3. Click Apply. 4. Select the target wireless service. 5. Click Enable. Figure 459 Configuring multicast optimization Verifying the configur

Page 377

425 WLAN security configuration WLAN security overview 802.11 networks are susceptible to a wide array of threats such as unauthorized access points

Page 378 - Configuring priority mapping

426 At present, spoofing attack detection counters this type of attack by detecting broadcast de-authentication and disassociation frames sent on beh

Page 379

31 Table 19 Field description Field Description MAC Address MAC address of the client. AID Association ID of the client. User Name Username of the

Page 380 - Configuring a QoS policy

427 Figure 460 Configuring WIDS 2. Configure WIDS as described in Table 143. 3. Click Apply. Table 143 Configuration items Item Description Floo

Page 381 - Adding a class

428 Figure 462 Displaying statistics Configuring the blacklist and white list functions Configuring dynamic blacklist 1. Select Security > Filt

Page 382

429 NOTE: At present, these attacks can be detected through a dynamic blacklist: Assoc-Flood, Reassoc-Flood, Disassoc-Flood, ProbeReq-Flood, Action

Page 383

430 Figure 465 Configuring white list 4. Add a white list as described in Table 146. 5. Click Apply. Table 146 Configuration items Item Descripti

Page 384

431 User isolation If an AP has the user isolation feature enabled, clients associated with it are isolated at Layer 2. As shown in Figure 466, after

Page 385 - Adding a traffic behavior

432 Index A B C D E F H I L M O P Q R S T U V W A AAA configuration example,200 AAA overview,193 Access service,255 ACL/QoS configuration example,38

Page 386

433 Creating an IPv4 static route,115 Creating an IPv6 static route,118 D Device information,20 DHCP server configuration example,13 0 Diagnostic

Page 387

434 Recommended configuration procedure,133 Recommended configuration procedure,106 Recommended configuration procedure,124 Removing a file,51 Rem

Page 388

32 Field Description Client Type Client type such as WPA2 (RSN), WPA, or Pre-RSN. Authentication Method Authentication method such as open system o

Page 389 - Adding a policy

33 Figure 31 Displaying client statistics NOTE: To view the IP address of the client, enable the ARP snooping function in system view through com

Page 390 - Applying a policy to a port

34 Displaying RF ping information Radio Frequency Ping (RF Ping) is a ping function performed on wireless links. This function enables you to get the

Page 391

35 Device basic information configuration The device basic information feature provides you the following functions: • Set the system name of the de

Page 392

36 Figure 34 Configuring web idle timeout period 3. Set the web idle timeout period for a logged-in user. 4. Click Apply.

Page 393

Category Documents Purposes your AP. Configuration guides Describe software features and configuration procedures. Command references Provide a qui

Page 394

37 Device maintenance configuration Software upgrade A boot file, also known as the system software or device software, is an application file used t

Page 395

38 Item Description File Type Specify the type of the boot file for the next boot: • Main—Boots the device. • Backup—Boots the device when the main

Page 396

39  If you have selected the box before "Check configuration with next startup configuration file", the system checks the configuration b

Page 397

40 NOTE: • The generation of the diagnostic file will take a period of time. During this process, do not perform anyoperation on the web page. •

Page 398

41 System time configuration You must configure a correct system time so that the device can work with other devices properly. The device supports se

Page 399

42 Configuring the system time 1. Select Device > System Time from the navigation tree. The calendar page appears. Figure 40 Calendar page 2.

Page 400

43 Log management configuration System logs contain a large amount of network and device information, including running status and configuration chan

Page 401

44 TIP: • You can click Reset to clear all system logs saved in the log buffer on the web interface. • You can click Refresh to manually refresh t

Page 402

45 Figure 42 Set loghost 3. Configure the log host as described in Table 26. 4. Click Apply. Table 26 Configuration item Item Description Loghost

Page 403 - Configuring wireless QoS

46 Figure 43 Syslog configuration page 3. Configure buffer capacity and refresh interval as described in Table 27. 4. Click Apply. Table 27 Confi

Page 404 - WMM protocol overview

i Contents About the WA series access points Web-based configuration guide ····································································· 1App

Page 405 - Enabling wireless QoS

47 Configuration management Backing up configuration NOTE: When backing up a configuration file, back up the configuration file with the extension

Page 406 - Setting the SVP service

48 The page for restoring configuration appears. Figure 45 Configuration restore page 3. Click the upper Browse button. The file upload dialog box

Page 407 - Setting CAC admission policy

49 Figure 46 Save configuration confirmation Common 1. Select Device > Configuration from the navigation tree. 2. Click the Save tab. The page

Page 408

50 File management configuration The device saves useful files (such as host software, configuration file) into the storage device, and the system pr

Page 409

51 The File Download dialog box appears. You can select to open the file or to save the file to a specified path. Uploading a file NOTE: Uploading

Page 410 - Displaying radio statistics

52 Interface management configuration NOTE: Support for interface types varies with device models. An interface is the point of interaction or c

Page 411

53 Figure 49 Interface management page 2. Click an interface name in the Name column to display the statistics of that interface. The page for dis

Page 412 - Displaying client statistics

54 Creating an interface 1. Select Device > Interface from the navigation tree The page in Figure 49 appears. 2. Click Add. The page for creatin

Page 413 - Setting rate limiting

55 Item Description VID This parameter is available only for Layer 3 Ethernet subinterfaces. If you are creating a Layer 3 Ethernet subinterface, se

Page 414

56 Item Description IPv6 Config Set the way for the interface to obtain an IPv6 link-local address, including: • None: Select this option if you do n

Page 415 - Setting guaranteed bandwidth

ii Log management configuration ······················································································································

Page 416 - Enabling bandwidth guarantee

57 Table 29 Configuration items Item Description Port State Enables or disables the interface. In some cases, modification to the interface parameter

Page 417

58 Item Description MDI Set the Medium Dependent Interface (MDI) mode for the interface. Two types of Ethernet cables can be used to connect Ethernet

Page 418

59 Item Description Multicast Suppression Set multicast suppression. You can suppress multicast traffic by percentage or by PPS as follows: • ratio:

Page 419

60 Figure 53 Modify a Layer 3 physical interface 3. Modify the information about the Layer 3 interface. The configuration items of modifying the L

Page 420

61 Item Description Interface Status Display and set the interface status. • The display of Connected indicates that the current status of the inter

Page 421

62 Figure 55 Create VLAN-interface 100 c. Select Vlan-interface from the Interface Name list, enter the interface ID 100, select the Static Addres

Page 422

63 TR-069 configuration TR-069 is a technology specification initiated and developed by the Digital Subscriber's Line (DSL) Forum. It defines th

Page 423

64 1. Select Device > TR-069 from the navigation tree. The TR-069 configuration page appears. Figure 57 TR-069 configuration page 2. Configure

Page 424 - Advanced settings

65 Configuration guidelines When you configure TR-069, follow these guidelines: • TR-069 configuration through ACS is of higher priority than that t

Page 425 - L2 Switch

66 User management configuration In the user management part, you can perform the following configuration: • Create a local user, and set the passwo

Page 426 - Setting a district code

iii VLAN configuration ·······························································································································

Page 427

67 Item Description Access Level Set the access level for a user. Users of different levels can perform different operations. Web user levels, from l

Page 428

68 Table 34 Configuration items Item Description Create/Remove Set the operation type: • Create: Configure or modify the super password. • Remove:

Page 429

69 SNMP configuration SNMP overview Simple Network Management Protocol (SNMP) offers the communication rules between a management device and the mana

Page 430 - Configuring band navigation

70 Table 35 SNMPv1 or SNMPv2c configuration task list Task Remarks Enabling SNMP Required The SNMP agent function is disabled by default. IMPORTANT:

Page 431

71 Enabling SNMP 1. Select Device > SNMP from the navigation tree. The SNMP configuration page appears. Figure 61 Setup page 2. Configure SNMP

Page 432

72 Table 37 Configuration items Item Description SNMP Enable or disable SNMP agent. Local Engine ID Configure the local engine ID. The validity of a

Page 433

73 Figure 63 Create an SNMP view (1) 4. Enter the view name. 5. Click Apply. The page in Figure 64 appears. Figure 64 Create an SNMP view (2) 6

Page 434

74 Adding rules to an SNMP view 1. Select Device > SNMP from the navigation tree. 2. Click the View tab. The page in Figure 62 appears. 3. Clic

Page 435

75 Figure 67 Create an SNMP Community 4. Configure SNMP community settings as described in Table 39. 5. Click Apply. Table 39 Configuration items

Page 436

76 Figure 68 SNMP group 3. Click Add. The Add SNMP Group page appears. Figure 69 Create an SNMP group 4. Configure SNMP group settings as desc

Page 437

iv Adding a domain name suffix ·······················································································································

Page 438 - WLAN security configuration

77 Item Description Notify View Select the notify view of the SNMP group, that is, the view that can send trap messages. If no notify view is configu

Page 439 - Configuring WIDS

78 Figure 71 Create an SNMP user 4. Configure SNMP user settings as described in Table 41. 5. Click Apply. Table 41 Configuration items Item Desc

Page 440

79 Item Description Authentication Password Set the authentication password when the security level is Auth/NoPriv or Auth/Priv. The confirm authenti

Page 441

80 Figure 73 Add a target host of SNMP traps 6. Configure the settings for the target host as described in Table 42. 7. Click Apply. Table 42 Con

Page 442 - Configuring white list

81 Displaying SNMP packet statistics Select Device > SNMP from the navigation tree. The page for displaying SNMP packet statistics appears. Figure

Page 443

82 a. Select Device > SNMP from the navigation tree. The Setup page appears. Figure 76 Enable SNMP b. Select the Enable option. c. Select the

Page 444 - User isolation

83 Figure 78 Create an SNMP view (2) e. Select the Included radio box, enter the MIB subtree OID interfaces, and click Add. f. Click Apply. A co

Page 445

84 Figure 80 Create an SNMP group c. Enter group1 in the field of Group Name, select view1 from the Read View box, and select view1 from the Write

Page 446

85 Figure 81 Create an SNMP user 5. Enable the agent to send SNMP traps. a. Click the Trap tab The page in Figure 82 appears. b. Select the Enab

Page 447

86 The page in Figure 83 appears. b. Select the destination IP address type as IPv4/Domain, enter the destination address 1.1.1.2, enter the user na

Commentaires sur ces manuels

Pas de commentaire