You need to configure and maintain WLAN features and functions in different profiles. These WLAN profiles include regulatory domain profile, radio profile, VAP profile, AP system profile, AP wired port profile, WIDS profile, WDS profile, and Mesh profile. When configuring WLAN services, you need to set related parameters in the WLAN profiles and bind the profiles to the AP group or APs. Then the configuration is automatically delivered to and takes effect on the APs. WLAN profiles can reference one another; therefore, you need to know the relationships among the profiles before configuring them. For details about the profile relationships and their basic configuration procedure, see WLAN Service Configuration Procedure.
An enterprise uses two APs to deploy WLAN area A to provide WLAN services. As shown in Figure 1, AP1 and AP2 in area A are directly connected to the switch, the enterprise deploys two ACs in bypass mode, and the switch connects to the Internet through the egress route. The enterprise requires that dual-link backup be used to improve data transmission reliability.
Item |
Data |
---|---|
Management VLAN for APs |
VLAN 100 |
Service VLAN for STAs |
VLAN 101 |
DHCP server |
Switch functions as the DHCP server for the APs and STAs. STAs' gateway: 10.23.101.1/24 APs' gateway: 10.23.100.1/24 |
IP address pool for APs |
10.23.100.4-10.23.100.254/24 |
IP address pool for STAs |
10.23.101.2-10.23.101.254/24 |
AC's source interface |
VLANIF 100 |
Active AC |
AC1 Local priority: 0 |
Standby AC |
AC2 Local priority: 1 |
Management IP address of AC1 |
VLANIF 100: 10.23.100.2/24 |
Management IP address of AC2 |
VLANIF 100: 10.23.100.3/24 |
AP group |
|
SSID profile |
|
Security profile |
|
VAP profile |
|
Configure port isolation on the interfaces of the device directly connected to APs. If port isolation is not configured and direct forwarding is used, a large number of unnecessary broadcast packets may be generated in the VLAN, blocking the network and degrading user experience.
In tunnel forwarding mode, the management VLAN and service VLAN cannot be the same. Only packets from the management VLAN are transmitted between the AC and APs. Packets from the service VLAN are not allowed between the AC and APs.
Dual-link backup cannot back up DHCP information. When the AC functions as the DHCP server to assign IP addresses to APs and STAs, APs and STAs need to re-obtain IP addresses if the active AC is faulty. It is recommended that the switch function as the DHCP server. If the AC must be used as the DHCP server, configure address pools containing different IP addresses on the active and standby ACs to prevent IP address conflicts.
<HUAWEI> system-view [HUAWEI] authentication unified-mode
If the NAC mode is changed from traditional to unified, the unified mode takes effect after you save the configuration and restart the device.
# Create VLAN100 (management VLAN) and VLAN101 (service VLAN) on the switch. Set the link type of GE0/0/1 and GE0/0/4 that connect the switch to the APs to trunk and PVID of the interfaces to 100, and configure the interfaces to allow packets of VLAN100 and VLAN101 to pass. Set the link type of gigabitethernet0/0/2 and gigabitethernet0/0/3 on the switch to trunk, and configure the interfaces to allow packets of VLAN100 to pass.
<Quidway> system-view [Quidway] sysname Switch [Switch] vlan batch 100 101 [Switch] interface gigabitethernet 0/0/1 [Switch-GigabitEthernet0/0/1] port link-type trunk [Switch-GigabitEthernet0/0/1] port trunk pvid vlan 100 [Switch-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 101 [Switch-GigabitEthernet0/0/1] port-isolate enable [Switch-GigabitEthernet0/0/1] quit [Switch] interface gigabitethernet 0/0/4 [Switch-GigabitEthernet0/0/4] port link-type trunk [Switch-GigabitEthernet0/0/4] port trunk pvid vlan 100 [Switch-GigabitEthernet0/0/4] port trunk allow-pass vlan 100 to 101 [Switch-GigabitEthernet0/0/4] port-isolate enable [Switch-GigabitEthernet0/0/4] quit [Switch] interface gigabitethernet 0/0/2 [Switch-GigabitEthernet0/0/2] port link-type trunk [Switch-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 [Switch-GigabitEthernet0/0/2] quit [Switch] interface gigabitethernet 0/0/3 [Switch-GigabitEthernet0/0/3] port link-type trunk [Switch-GigabitEthernet0/0/3] port trunk allow-pass vlan 100 [Switch-GigabitEthernet0/0/3] quit
# Add GE0/0/1 that connects the AC1 to the switch to VLAN100.
<HUAWEI> system-view [HUAWEI] sysname AC1 [AC1] vlan batch 100 101 [AC1] interface gigabitethernet 0/0/1 [AC1-GigabitEthernet0/0/1] port link-type trunk [AC1-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 [AC1-GigabitEthernet0/0/1] quit
# Add GE0/0/1 that connects the AC2 to the switch to VLAN100.
<HUAWEI> system-view [HUAWEI] sysname AC2 [AC2] vlan batch 100 101 [AC2] interface gigabitethernet 0/0/1 [AC2-GigabitEthernet0/0/1] port link-type trunk [AC2-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 [AC2-GigabitEthernet0/0/1] quit
# Configure VLANIF100 to use the interface address pool to allocate IP addresses to APs.
[Switch] dhcp enable [Switch] interface vlanif 100 [Switch-Vlanif100] ip address 10.23.100.1 255.255.255.0 [Switch-Vlanif100] dhcp select interface [Switch-Vlanif100] dhcp server excluded-ip-address 10.23.100.2 10.23.100.3 [Switch-Vlanif100] quit
# Configure VLANIF101 to use the interface address pool to allocate IP addresses to STAs.
[Switch] interface vlanif 101 [Switch-Vlanif101] ip address 10.23.101.1 255.255.255.0 [Switch-Vlanif101] dhcp select interface [Switch-Vlanif101] quit
# Configure basic parameters for AC2 according to the configurations of AC1. The configuration of AC2 is similar to that of AC1 except the source interface address.
# Configure the source interface of AC2.
[AC2] interface vlanif 100 [AC2-Vlanif100] ip address 10.23.100.3 255.255.255.0 [AC2-Vlanif100] quit [AC2] capwap source interface vlanif 100 [AC2] wlan
By default, dual-link backup is disabled, and running the ac protect enable command restarts all APs. After the APs are restarted, the dual-link backup function takes effect.
If dual-link backup is enabled, running the ac protect enable command does not restart APs. You need to run the ap-reset command on the active AC to restart all APs and make the dual-link backup function take effect.
[AC1-wlan-view] ac protect protect-ac 10.23.100.3 priority 0 Warning: Operation successful. It will take effect after AP reset. [AC1-wlan-view] undo ac protect restore disable [AC1-wlan-view] ac protect enable Warning: This operation maybe cause AP reset, continue?[Y/N]: y
[AC2-wlan-view] ac protect protect-ac 10.23.100.2 priority 1 [AC2-wlan-view] undo ac protect restore disable [AC2-wlan-view] ac protect enable Warning: This operation maybe cause AP reset, continue?[Y/N]: y
Run the display ac protect command on the active and standby ACs to check the dual-link information and priority on the two ACs.
[AC1-wlan-view] display ac protect ------------------------------------------------------------ Protect state : enable Protect AC : 10.23.100.3 Priority : 0 Protect restore : enable ... ------------------------------------------------------------
[AC2-wlan-view] display ac protect ------------------------------------------------------------ Protect state : enable Protect AC : 10.23.100.2 Priority : 1 Protect restore : enable ... ------------------------------------------------------------
# When the link between the AP and AC1 is faulty, AC2 takes the active role. This ensures service stability.
Configuration file of the switch
# sysname Switch # vlan batch 100 to 101 # dhcp enable # interface Vlanif100 ip address 10.23.100.1 255.255.255.0 dhcp select interface dhcp server excluded-ip-address 10.23.100.2 10.23.100.3 # interface Vlanif101 ip address 10.23.101.1 255.255.255.0 dhcp select interface # interface GigabitEthernet0/0/1 port link-type trunk port trunk pvid vlan 100 port trunk allow-pass vlan 100 to 101 port-isolate enable group 1 # interface GigabitEthernet0/0/2 port link-type trunk port trunk allow-pass vlan 100 # interface GigabitEthernet0/0/3 port link-type trunk port trunk allow-pass vlan 100 # interface GigabitEthernet0/0/4 port link-type trunk port trunk pvid vlan 100 port trunk allow-pass vlan 100 to 101 port-isolate enable group 1 # return
Configuration file of AC1
# sysname AC1 # vlan batch 100 to 101 # interface Vlanif100 ip address 10.23.100.2 255.255.255.0 # interface GigabitEthernet0/0/1 port link-type trunk port trunk allow-pass vlan 100 # capwap source interface vlanif100 # wlan ac protect enable protect-ac 10.23.100.3 security-profile name wlan-security security wpa2 psk pass-phrase %^%#m"tz0f>~7.[`^6RWdzwCy16hJj/Mc!,}s`X*B]}A%^%# aes ssid-profile name wlan-ssid ssid wlan-net vap-profile name wlan-vap service-vlan vlan-id 101 ssid-profile wlan-ssid security-profile wlan-security regulatory-domain-profile name domain1 ap-group name ap-group1 regulatory-domain-profile domain1 radio 0 vap-profile wlan-vap wlan 1 radio 1 vap-profile wlan-vap wlan 1 ap-id 0 type-id 19 ap-mac 60de-4476-e360 ap-sn 210235554710CB000042 ap-name area_1 ap-group ap-group1 ap-id 1 type-id 19 ap-mac 60de-4474-9640 ap-sn 210235419610D2000097 ap-name area_2 ap-group ap-group1 # return
Configuration file of AC2
# sysname AC2 # vlan batch 100 to 101 # interface Vlanif100 ip address 10.23.100.3 255.255.255.0 # interface GigabitEthernet0/0/1 port link-type trunk port trunk allow-pass vlan 100 # capwap source interface vlanif100 # wlan ac protect enable protect-ac 10.23.100.2 priority 1 security-profile name wlan-security security wpa2 psk pass-phrase %^%#m"tz0f>~7.[`^6RWdzwCy16hJj/Mc!,}s`X*B]}A%^%# aes ssid-profile name wlan-ssid ssid wlan-net vap-profile name wlan-vap service-vlan vlan-id 101 ssid-profile wlan-ssid security-profile wlan-security regulatory-domain-profile name domain1 ap-group name ap-group1 regulatory-domain-profile domain1 radio 0 vap-profile wlan-vap wlan 1 radio 1 vap-profile wlan-vap wlan 1 ap-id 0 type-id 19 ap-mac 60de-4476-e360 ap-sn 210235554710CB000042 ap-name area_1 ap-group ap-group1 ap-id 1 type-id 19 ap-mac 60de-4474-9640 ap-sn 210235419610D2000097 ap-name area_2 ap-group ap-group1 # return