Manual Controladoras HP850
Manual Controladoras HP850
About the Web-based configuration guide for HP unified wired-WLAN products ················································· 1
Typical network scenarios ················································································································································ 1
HP 850 unified wired-WLAN appliance network scenario ················································································· 1
HP 11900/10500/7500 20G module network scenario ················································································· 2
HP 830 switch/HP 870 appliance network scenario ·························································································· 2
Feature matrix ···································································································································································· 3
i
Displaying client detailed information ················································································································ 61
Displaying client statistics ····································································································································· 63
Displaying client roaming information ················································································································ 65
Displaying RF ping information ··························································································································· 65
Displaying beacon measurement reports············································································································ 66
ii
Configuring ports for a mirroring group···················································································································· 103
Port mirroring configuration example ························································································································ 104
Network requirements ········································································································································· 104
Configuration procedure ···································································································································· 105
iii
Configuring ARP attack protection························································································································· 157
Overview······································································································································································· 157
ARP detection ······················································································································································· 157
Source MAC address based ARP attack detection ·························································································· 157
ARP active acknowledgement ···························································································································· 157
ARP packet source MAC address consistency check ······················································································ 158
Configuring ARP detection ·········································································································································· 158
Configuring other ARP attack protection functions ··································································································· 159
iv
Basic concepts of link aggregation ··················································································································· 203
Link aggregation modes ····································································································································· 204
Load sharing mode of an aggregation group·································································································· 206
Configuration guidelines ············································································································································· 206
Recommended link aggregation and LACP configuration procedures ·································································· 207
Recommended static aggregation group configuration procedure ······························································· 207
Recommended dynamic aggregation group configuration procedure ························································· 207
Creating a link aggregation group ···························································································································· 208
Displaying aggregate interface information ············································································································· 208
Setting LACP priority ···················································································································································· 210
Displaying LACP-enabled port information ··············································································································· 211
Link aggregation and LACP configuration example································································································· 212
v
Configuring NAT ····················································································································································· 247
Overview······································································································································································· 247
NAT control ·························································································································································· 248
NAT implementation ··········································································································································· 248
Low-priority address pool ··································································································································· 251
Configuration guidelines ············································································································································· 251
Recommended configuration procedure···················································································································· 251
Configuring address translation························································································································· 251
Configuring an internal server ··························································································································· 252
Creating an address pool ··········································································································································· 252
Configuring dynamic NAT ·········································································································································· 254
Creating a static address mapping ···························································································································· 255
Enabling static NAT on an interface ·························································································································· 256
Configuring an internal server ···································································································································· 257
Configuring basic internal server settings ········································································································· 257
Configuring advanced internal server settings ································································································· 258
Configuring a DNS mapping ····································································································································· 260
NAT configuration examples ······································································································································ 261
Address translation configuration example ······································································································ 261
Internal server configuration example ··············································································································· 263
vi
Terminology ························································································································································· 311
Client access ························································································································································ 311
WLAN data security ··········································································································································· 314
Client access authentication ······························································································································· 315
802.11n ······························································································································································· 316
Configuring access service ········································································································································· 317
Recommended configuration procedure ··········································································································· 317
Creating a WLAN service ·································································································································· 317
Configuring clear-type wireless service············································································································· 318
Configuring crypto-type wireless service ·········································································································· 330
Security parameter dependencies ····················································································································· 341
Configuring an authentication mode ················································································································ 342
Configuring source IP address verification ······································································································· 344
Enabling a wireless service ································································································································ 347
Binding an AP radio to a wireless service ········································································································ 347
Enabling a radio ················································································································································· 350
Displaying detailed information about a wireless service ·············································································· 350
Configuring policy-based forwarding ························································································································ 355
Creating a forwarding policy ···························································································································· 355
Applying a forwarding policy to an access service ························································································ 357
Applying a forwarding policy to a user profile ······························································································· 359
Wireless service configuration example ···················································································································· 359
WPA-PSK authentication configuration example ······································································································ 362
Local MAC authentication configuration example ··································································································· 367
Remote MAC authentication configuration example································································································ 372
Remote 802.1X authentication configuration example ··························································································· 378
Dynamic WEP encryption-802.1X authentication configuration example ····························································· 389
Backup client authentication configuration example ································································································ 395
Local client authentication configuration example ··································································································· 403
Policy-based forwarding configuration example ······································································································ 409
vii
Configuring WLAN roaming ····························································································································· 445
Displaying client information······························································································································ 445
WLAN roaming configuration examples··················································································································· 446
Intra-AC roaming configuration example ········································································································· 446
Inter-AC roaming configuration example·········································································································· 449
viii
Configuring the portal service ···································································································································· 511
Configuring advanced parameters for portal authentication ·················································································· 515
Configuring a portal-free rule ····································································································································· 517
Customizing authentication pages ····························································································································· 518
File name rules ····················································································································································· 518
Page request rules ··············································································································································· 519
Post request attribute rules ·································································································································· 519
Page file compression and saving rules ············································································································ 520
File size and content rules ·································································································································· 520
Logging off a user who closes the logon success or online page ·································································· 520
Redirecting authenticated users to a specific webpage ·················································································· 521
Portal authentication configuration example ············································································································· 521
ix
Retrieving and displaying a CRL ································································································································ 591
Certificate management configuration example ······································································································· 591
x
Priority mapping overview ································································································································· 651
Configuring priority mapping ···························································································································· 651
Configuring a QoS policy ··········································································································································· 654
Class ····································································································································································· 654
Traffic behavior ··················································································································································· 654
Policy ···································································································································································· 654
QoS policy configuration procedure ················································································································· 655
Adding a class ····················································································································································· 655
Configuring traffic classification rules ··············································································································· 656
Adding a traffic behavior ··································································································································· 660
Configuring actions for a traffic behavior ········································································································ 660
Adding a policy ··················································································································································· 663
Configuring classifier-behavior associations for the policy ············································································ 663
Applying a policy to a port ································································································································ 664
Applying a QoS policy to a WLAN service ····································································································· 665
ACL and QoS configuration example························································································································ 667
Network requirements ········································································································································· 667
Configuration procedure ···································································································································· 667
Verifying the configuration ································································································································· 676
xi
Verifying the configuration ································································································································· 696
Bandwidth guarantee configuration example ··········································································································· 697
Network requirements ········································································································································· 697
Configuring the wireless services ······················································································································ 697
Configuring bandwidth guaranteeing··············································································································· 697
Verifying the configuration ································································································································· 699
xii
AP provision configuration example ················································································································· 780
Band navigation configuration example··········································································································· 784
VLAN pool configuration example ···················································································································· 786
Multicast optimization configuration example ································································································· 789
Guest access tunnel configuration example ····································································································· 791
Bonjour gateway configuration example·········································································································· 792
xiii
Subscription service ············································································································································ 856
Related information ······················································································································································ 856
Documents ···························································································································································· 856
Websites······························································································································································· 856
Conventions ·································································································································································· 857
xiv
About the Web-based configuration guide for
HP unified wired-WLAN products
The Web-based configuration guide describes the Web functions of the HP 830 series PoE+ unified
wired-WLAN switches, HP 850/870 unified wired-WLAN appliances, and HP 11900/10500/7500
20G unified wired-WLAN modules. The functions include quick start, Web login, wireless service
configuration, security and authentication configurations, QoS configuration, and advanced settings.
The Web-based configuration guide uses the webpages of the HP 11900/10500/7500 20G module in
configuration procedures. For features not available on the module, this book uses the webpages of the
HP 850/870 appliance or HP 830 24-port switch.
The interface types and displayed webpages vary by device model.
If a function or parameter is grayed out, it is either not supported or cannot be modified.
1
HP 11900/10500/7500 20G module network scenario
As shown in Figure 2:
• The HP 11900/10500/7500 20G module is installed on a Layer 2 or Layer 3 switch.
• The switch is connected to APs directly or over an IP network.
• Clients access the network through the APs.
Figure 2 Network diagram
As shown in Figure 3:
• The switch that has both AC and switch functions is connected to APs directly or over an IP network.
• Clients access the network through the APs.
2
Figure 3 Network diagram
Feature matrix
The HP 11900/10500/7500 20G module adopts the OAA architecture. It works as an OAP card on a
switch to exchange data and status and control information with the switch through their internal
interfaces. Do not configure services such as QoS rate limit and 802.1X authentication on the internal
interfaces.
The controller engine and switching engine of an HP 830 switch or HP 870 appliance adopt the OAA
architecture. The switching engine is integrated on the controller engine as OAP software. You actually
log in to the controller engine when you log in to the switch by default.
HP recommends not configuring QoS rate limiting or 802.1X authentication on the internal aggregate
interfaces (BAGG1) between the switching engine and the controller engine on an HP 830 switch or HP
870 appliance. Inappropriate rate limiting or authentication settings on the internal aggregate interfaces
can cause communication problems between the switching engine and the controller engine.
• On the HP 830 24-port switch, the switching engine's internal aggregate interface is formed by
GigabitEthernet 1/0/29 and GigabitEthernet 1/0/30. On the HP 830 8-port switch, the switching
engine's internal aggregate interface is formed by GigabitEthernet 1/0/11 and GigabitEthernet
1/0/12. On all HP 830 switches, the controller engine's internal aggregate interface is formed by
GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2.
• On the HP 870 appliance, the switching engine's internal aggregate interface is formed by
interfaces Ten-GigabitEthernet 1/0/29 through Ten-GigabitEthernet 1/0/32. The controller
engine's internal aggregate interface is formed by interfaces Ten-GigabitEthernet 1/0/1 through
Ten-GigabitEthernet 1/0/4.
This document only describes the feature matrix for the controller engines of HP 830 switches and HP 870
appliances. For feature and configuration information about the switching engines of HP 830 switches
and HP 870 appliances, see related switching engine manuals.
3
Table 1 Feature matrix
HP 830 HP 830
HP 24-port 8-port HP 870
HP 850
11900/105 PoE+ PoE+ unified
Unified
00/7500 unified unified wired-WLA
Module Feature Wired-WLA
20G unified wired-WL wired-WL N appliance
N
wired-WLA AN switch AN switch controller
Appliance
N module controller controller engine
engine engine
Supports 256
Supports 128 Supports 24 Supports 12 Supports 0
concurrent
concurrent concurrent concurrent concurrent
APs by
Licens Enhanc APs by APs by APs by APs by
default, and
e ed default, and default, and default, and default, and
can be
mana license can be can be can be can be
extended to
geme manag extended to extended to extended to extended to
support
nt ement support 1024 support 60 support 24 support 512
1536
concurrent concurrent concurrent concurrent
concurrent
APs. APs. APs. APs.
APs.
CF Flash CF CF CF
Device File management
supported. supported. supported. supported. supported.
OAP
No. Yes. Yes. No. Yes.
management
Link aggregation
No. No. No. Yes. No.
and LACP
4
HP 830 HP 830
HP 24-port 8-port HP 870
HP 850
11900/105 PoE+ PoE+ unified
Unified
00/7500 unified unified wired-WLA
Module Feature Wired-WLA
20G unified wired-WL wired-WL N appliance
N
wired-WLA AN switch AN switch controller
Appliance
N module controller controller engine
engine engine
AC backup Yes. No. No. Yes. Yes.
High
availabili Stateful failover Yes. No. No. Yes. Yes.
ty
5
Web overview
This chapter describes the Web interface, functions available on the Web interface, Web user levels you
must have to perform a function, and common icons and buttons on the Web pages.
Web interface
The Web interface consists of the navigation tree, title area, and body area.
Figure 4 Web-based configuration interface
• Navigation area—Organizes the Web-based NM function menus in the form of a navigation tree,
where you can select function menus as needed. The result is displayed in the body area. The Web
network management functions not supported by the device are not displayed in the navigation
area.
• Body area—The area where you can configure and display a function.
• Title area—On the left, displays the path of the current configuration interface in the navigation
area; on the right, provides the Save button to quickly save the current configuration, the Help button
to display the Web related help information, and the Logout button to log out of the Web interface.
6
Web user level
Web user levels, ranging from low to high, are visitor, monitor, configure, and management. A user with
a higher level has all the operating rights of a user with a lower level.
• Visitor—Users can use the network diagnostic tools ping and Trace Route, but they can neither
access the device data nor configure the device.
• Monitor—Users can only access the device data, but they cannot configure the device.
• Configure—Users can access device data and configure the device, but they cannot upgrade the
host software, add/delete/modify users, or backup/restore configuration files.
• Management—Users of this level can perform any operations to the device.
Web-based NM functions
Support for the configuration items depends on the device model. For more information, see "About the
Web-based configuration guide for HP unified wired-WLAN products."
A user level in Table 2 indicates that users of this level or users of a higher level can perform the
corresponding operations.
Table 2 Web-based NM function description
7
Function menu Description User level
Software Upload the file to be upgraded from the local
Management
Upgrade host to upgrade the system software.
Device
Mainte Reboot Reboot the device. Management
nance
Diagnostic Generate a diagnostic information file, view the
Management
Information file, or save the file to the local host.
8
Function menu Description User level
Configure the password for a lower-level user to
Super
switch from the current access level to the Configure
Password
management level.
Switch To
Switch the current user level to the management
Managemen Monitor
level.
t
9
Function menu Description User level
Display configuration information of gratuitous
Gratuitous Monitor
ARP.
ARP
Configure gratuitous ARP. Management
10
Function menu Description User level
Configure the status of a DHCP service and
advanced configuration information of DHCP
relay, add or delete a DHCP group, and modify Configure
the status of the DHCP relay agent on an
interface.
11
Function menu Description User level
Create, modify, or delete an address pool, and
Configure
configure dynamic address translation.
12
Function menu Description User level
13
Function menu Description User level
Display spectrum analysis status. Monitor
Radio
Enable spectrum analysis. Configure
Interfering
Display and refresh interfering device status. Monitor
Device
Channel
Display and refresh channel quality status. Monitor
Quality
14
Function menu Description User level
Add, modify, and remove guest users. Management
15
Function menu Description User level
Clear dynamic blacklist and static blacklist;
enable dynamic blacklist; add entries to the Configure
static blacklist.
Advanced
Configure a rule for an advanced IPv4 ACL. Configure
ACL IPv4 Setup
Link Setup Create a rule for an Ethernet frame header ACL. Configure
Wireless
Configure a rule for a WLAN-AP ACL. Configure
Setup
QoS Remove Delete an IPv4 ACL or its rules. Configure
16
Function menu Description User level
Display radio statistics, including WMM status
Monitor
and detailed radio information.
Radio
Statistics Display radio statistics, including WMM status
and detailed radio information, and clear the Configure
radio statistics.
Port Policy Summary Display the QoS policy applied to a port. Monitor
17
Function menu Description User level
Setup Apply a QoS policy to a port. Configure
Switch to fat Display the model and IP address of the AP. Monitor
AP Switch to fat AP. Configure
18
Function menu Description User level
Set band navigation parameters. Configure
Global
Display and modify IKE global parameters. Configure
Setting
19
Function menu Description User level
Create, modify, or delete an IPsec security
Configure
policy.
Adds an item.
Selects all the entries in a list, or selects all ports on the device panel.
Clears all the entries in a list, or clears all ports on the device panel.
Restores the values of all the entries on the current page to the default.
Buffers settings you made and proceeds to the next step without applying
the settings.
This button is typically present on the configuration wizard.
Buffers settings you made and returns to the previous step without applying
the settings.
This button is typically present on the configuration wizard.
Applies all settings you made at each step and finishes the configuration
task.
This button is typically present on the configuration wizard.
Deletes an entry.
This icon is typically present in the Operation column in a list,
20
Page display
The Web interface can display contents by pages, as shown in Figure 5. You can set the number of
entries displayed per page, and view the contents on the first, previous, next, and last pages, or go to any
page that you want to check.
NOTE:
A list can contain a maximum of 20000 entries if displayed in pages.
Search function
The Web interface provides you with the basic and advanced search functions to display only the entries
that match specific searching criteria.
• Basic search—As shown in Figure 5, input the keyword in the text box above the list, select a search
item from the list and click Search to display the entries that match the criteria. Figure 6 shows an
example of searching for entries with 00e0 included in the MAC address.
Figure 6 Basic search function example
21
• Advanced search—Advanced search function: As shown in Figure 5, you can click the Advanced
Search link to open the advanced search page, as shown in Figure 7. Specify the search criteria,
and click Apply to display the entries that match the criteria.
Figure 7 Advanced search
Take the ARP table shown in Figure 5 as an example. If you want to search for the ARP entries with 000f
at the beginning of the MAC address, and IP address range being 192.168.100.130 to 192.168.100.140,
follow these steps:
1. Click the Advanced Search link, specify the search criteria on the advanced search page as shown
in Figure 8, and click Apply. The ARP entries with 000f at the beginning of the MAC address are
displayed.
Figure 8 Advanced search function example (1)
2. Click the Advanced Search link, specify the search criteria on the advanced search page as shown
in Figure 9, and click Apply. The ARP entries with 000f at the beginning of the MAC address and
IP address range 192.168.1.130 to 192.168.1.140 are displayed as shown in Figure 10.
22
Figure 9 Advanced search function example (2)
Sort function
The Web interface provides you with the basic functions to display entries in certain orders.
On a list page, you can click the blue heading item of each column to sort the entries based on the
heading item you selected. After your clicking, the heading item is displayed with an arrow beside it as
shown in Figure 11. The upward arrow indicates the ascending order, and the downward arrow indicates
the descending order.
23
Figure 11 Basic sorting function example (based on IP address in the descending order)
24
Logging in to the Web interface
You can log in to the Web interface of the switching engine through HTTP.
Figure 12 Web-based network management environment
25
• If you are using a Mozilla Firefox browser, you must enable JavaScript (see "Enabling JavaScript in
a Firefox browser").
26
Figure 14 Internet Explorer settings (2)
27
Figure 15 Firefox browser settings
Others
• Make sure the management PC and the device can reach each other.
• Do not use the Back, Next, Refresh buttons provided by the browser. Using these buttons might
result in Web page display problems.
• To ensure correct display of Web page contents after software upgrade or downgrade, clear data
cached by the browser before you log in.
• Up to 24 users can concurrently log in to the device through the Web interface.
• After logging in to the Web interface, you can select Device > Users from the navigation tree, create
a new user, and select Wizard or Network > VLAN interface to configure the IP address of the
VLAN interface acting as the management interface.
• You can also log in to the Web interface through HTTPS, but you must enable HTTPS on the device,
and the address you input in the address bar must start with https://. For more information, see
"Configuring service management."
• If you have configured the auto authentication mode for an HTTPS login user by using the web
https-authorization mode command, the user is automatically authenticated by the PKI certificate,
without inputting any username and password. For more information, see Fundamentals
Configuration Guide.
28
Logging in to the Web interface
You can use the following default settings to log in to the Web interface through HTTP:
• Username—admin
• Password—admin
• IP address of VLAN-interface 1 of the device—192.168.0.100.
To log in to the switching engine through HTTP:
1. Connect the GigabitEthernet interface of the device to a PC by using a crossover Ethernet cable.
By default, all interfaces belong to VLAN 1.
The PC in this procedure is used for configuring basic device settings, and it is not necessarily the
PC you use for Web-based management.
2. Configure an IP address for the PC and make sure the PC and device can reach each other.
For example, assign the PC an IP address 192.168.0.0/24 (excluding 192.168.0.100,
192.168.0.2 for example).
3. Open the browser, and input the login information.
a. In the address bar, type the IP address http://192.168.0.100, and press Enter.
The login page of the Web interface (see Figure 16) appears.
b. Enter the username admin and password admin, and click Login.
Figure 16 Logging in to the Web interface
c. Select a country/region code from the Country/Region list, and click Apply.
29
Figure 17 Selecting a country/region code
30
Figure 18 Web-based configuration interface
31
Quick Start
Basic configuration
1. On the home page of the Quick Start wizard, click start.
The basic configuration page appears.
32
Figure 20 Basic configuration page
Item Description
Specify the name of the current device.
System Name
By default, the system name of the device is HP.
Select the code of the country in which you are located. This field defines the
radio frequency characteristics, such as the power and the total number of
Country/Region Code channels for frame transmission. Before configuring the device, you need to
configure the country/region code correctly. If the Country/Region Code field
is grayed out, it cannot be modified.
Admin configuration
1. On the basic configuration page, click Next.
The Admin Configuration page appears.
33
Figure 21 Admin Configuration page
Item Description
Password Specify the password for user Admin to use to log into the device, in cipher text.
IP configuration
1. On the Admin Configuration page, click Next.
The IP Configuration page appears.
34
Figure 22 IP Configuration page
Item Description
Specify the IP address of VLAN-interface 1. This IP address is used for logging in to
IP Address the device.
The default is 192.168.0.100.
Specify the IP address of the default gateway that connects the device to the
Default Gateway network.
By default, the IP address of the default gateway is not specified.
Wireless configuration
1. On the IP Configuration page, click Next.
The wireless configuration page appears.
35
Figure 23 Wireless configuration page
Item Description
Select the authentication type for the wireless service:
Primary Service • None—Performs no authentication.
Authentication type • User authentication (802.1X)—Performs 802.1X authentication.
• Portal—Performs Portal authentication.
Wireless Service Specify the Service Set Identifier (SSID).
RADIUS configuration
1. On the wireless configuration page, select User authentication (802.1X) or Portal for the Primary
Service Authentication Type field.
2. Click Next.
3. The RADIUS Configuration page appears.
36
Figure 24 RADIUS Configuration page
Item Description
Select the type of the RADIUS server:
• extended—Specifies extended RADIUS server, which is usually an IMC
server. In this case, the RADIUS client (access device) and the RADIUS
server exchange packets based on the specifications and packet format
Service Type definitions of a private RADIUS protocol.
• standard—Specifies the standard RADIUS server. In this case, the RADIUS
client (access device) and the RADIUS server exchange packets based on
the specifications and packet format definitions of the standard RADIUS
protocols (RFC 2138, RFC 2139, and the updates).
Authentication UDP Port Enter the port number of the RADIUS authentication server.
Authentication Key Enter the shared key of the RADIUS authentication server.
Accounting UDP Port Enter the port number of the RADIUS accounting server.
Accounting Key Enter the shared key of the RADIUS accounting server.
37
Portal configuration
1. On the wireless configuration page, select Portal for the Primary Service Authentication Type field.
2. Click Next.
The RADIUS Configuration page appears.
3. After you complete RADIUS configuration, click Next.
The Portal Configuration page appears.
Figure 25 Portal configuration page
Item Description
Server-name Specify the system name of the portal server.
38
Item Description
Specify the portal authentication method to be used:
• Direct—Before authentication, a user manually configures an IP address or
directly obtains a public IP address through DHCP, and can access only the
portal server and predefined free websites. After passing authentication,
the user can access the network resources. The authentication process of
direct authentication is simpler than that of the re-DHCP authentication.
Method • Layer3—Layer 3 authentication is similar to direct authentication but allows
Layer 3 forwarding devices to be present between the authentication client
and the access device.
• Redhcp—Before authentication, a user gets a private IP address through
DHCP and can access only the portal server and predefined free websites.
After passing authentication, the user is allocated a public IP address and
can access the network resources.
Encryption configuration
1. To use the encryption service, select the Encrypt option on the wireless configuration page
in Figure 23.
If you have selected portal or 802.1X authentication on that page, you enter the encryption
configuration page (see Figure 26) after completing the authentication configuration. If none of the
authentication methods is selected, you directly enter the encryption configuration page.
Figure 26 Encryption Configuration page
39
Table 10 Configuration items
Item Description
Specify whether to use WEP keys provided automatically or use static WEP keys.
• Enable—Use WEP keys provided automatically.
• Disable—Use static WEP keys.
By default, static WEP keys are used.
Provide Key
Automatically After you select Enable, WEP104 is displayed for WEP.
IMPORTANT:
Automatically provided WEP keys must be used together with 802.1X authentication.
Therefore, this option is available only after you select User authentication (802.1X)
for Primary Service Authentication type on the wireless configuration page.
Select the key type of the WEP encryption mechanism: WEP40, WEP104, or WEP
WEP
128.
Select the WEP key index: 1, 2, 3, or 4. Each number represents one of the four
static keys of WEP. The selected key index will be used for frame encryption and
decryption.
Key ID
IMPORTANT:
If you select the option to enable Provide Key Automatically, only 1, 2, and 3 are
available for the Key ID option.
Select the key length.
• When the key type is WEP40, the key length can be five alphanumeric
characters or 10 hexadecimal characters.
Key Length • When the key type is WEP104, the key length can be 13 alphanumeric
characters or 26 hexadecimal characters.
• When the key type is WEP128, the key length can be 16 alphanumeric
characters or 32 hexadecimal characters.
AP configuration
1. On the guest service configuration page, click Next.
The AP Configuration page appears.
2. Configure an AP and click Add.
You can configure multiple APs on the page. The section at the bottom of the page displays all
existing APs.
40
Figure 27 AP Configuration page
Item Description
AP Name Enter the name of the AP.
Radio Radio unit of the AP. The radio unit varies depending on the AP model.
Mode Select the radio mode. The radio mode varies depending on the AP model.
41
Item Description
Select the working channel.
The channel list for the radio depends on the country/region code and radio
mode, and it varies with device models.
Channel Auto: Specifies the automatic channel mode. With Auto specified, the AC
evaluates the quality of channels in the wireless network, and selects the best
channel as the working channel.
After the channel is changed, the power list is refreshed.
Configuration summary
1. On the AP Configuration page, click Next.
The configuration summary page appears, displaying all configurations you have made.
Figure 28 Configuration summary page
42
Displaying information summary
Device information
You can view the following information on the Device Info menu:
• Device information
• System resource state
• Device interface information
• Recent system logs (five at most)
After logging in to the Web interface, you enter the Summary > Device Info page.
Figure 29 Device info page
Device info
Table 12 Field description
Field Description
Device Name Display the device model.
43
Field Description
Product Information Display the product information.
Running Time Display the running time after the latest boot of the device.
Field Description
CPU Usage Display the real-time CPU usage.
Memory Usage Display the real-time memory usage and the total memory size.
Field Description
Interface Display interface name and interface number.
For more information about device interfaces, click More below the Device Interface Information area to
enter the Device > Interface page to view and operate the interfaces. For more information, see
"Managing interfaces."
44
Recent system logs
Table 15 Field description
Field Description
Time Display the time when the system logs are generated.
For more information about system logs, click More below the Recent System Operation Logs area to
enter the Device > Syslog > Loglist page to view the logs. For more information, see "Managing logs."
45
Table 16 Field description
Field Description
Service Template Number Service template number.
Binding Interface Name of the interface bound with the service template.
Authentication mode:
• Central—Uses AC central authentication.
Authentication Mode
• Local—Uses AP local authentication.
• Backup—Uses backup authentication.
Beacon-measurement Enable—Enables beacon measurement.
Beacon-measurement Interval Intervals (in seconds) at which beacon measurement requests are sent.
Figure 31 shows the page that displays detailed information about crypto-type WLAN services. Table 17
describes the fields on the page.
46
Figure 31 Displaying detailed information about the WLAN service (crypto type)
Field Description
Service Template Number Service template number.
Binding Interface Name of the interface bound with the service template.
Authentication mode:
• Central—Uses AC centralized authentication.
Authentication Mode
• Local—Uses AP local authentication.
• Backup—Uses backup authentication.
Beacon-measurement Enable—Enables beacon measurement.
Beacon-measurement Interval Intervals (in seconds) at which beacon measurement requests are sent.
47
Field Description
• Disable—The SSID is advertised in beacon frames.
SSID-hide
• Enable—Disables the advertisement of the SSID in beacon frames.
WEP Key Index WEP key index used for encrypting or decrypting frames.
GTK Rekey Method GTK rekey method configured: packet based or time based.
Forwarding mode:
• Local forwarding—Uses local forwarding in the service template.
Bridge Mode
• Remote forwarding—Uses AC remote forwarding in the service
template.
48
Displaying WLAN service statistics
Figure 32 Displaying WLAN service statistics
49
Displaying connection history information for the WLAN
service
Figure 33 Displaying connection history information for the WLAN service
Displaying AP
Displaying WLAN service information for an AP
1. Select Summary > AP from the navigation tree.
2. Click the Wireless Service tab on the page.
3. Click the name of the specified AP to view the WLAN service information for the AP.
50
Figure 34 Displaying WLAN service information
51
Figure 35 Displaying AP connection history information
52
Figure 36 Displaying AP radio information
The Noise Floor item in the table indicates various random electromagnetic waves that occur during the
wireless communication. For an environment with a high noise floor, you can improve the signal-to-noise
ratio (SNR) by increasing the transmit power or reducing the noise floor.
The Service Type item in the table has these options: None, Access, and Mesh.
Resource Usage represents the resource utilization of a radio within a certain period. For example, in a
period of 10 seconds, if a radio has occupied the channel for five seconds, the resource utilization of the
radio is 5 seconds divided by 10 seconds: 50%.
Table 18 Field description
Field Description
AP name Access point name.
53
Field Description
Total number of frames (probe response frames and beacon frames)
transmitted.
Total Frames
Total Frames = Unicast Frames + Broadcast/Multicast Frames +
Others.
Packet Count Statistics Based on Size Packet statistics classified by packet size.
Packet Count Statistics Based on Packet statistics classified by 802.11n rate. The field is not displayed
802.11n Rate if the device does not support 802.11n.
54
Figure 37 Displaying tunnel latency information
55
Table 19 Field description
Field Description
APID Access point identifier.
Time duration for which the AP has been connected to the AC. NA indicates
Up Time(hh:mm:ss)
AP is not connected to the AC.
56
Field Description
Transmitted data packets Number of transmitted data packets.
The tunnel between the AC and the AP is down when one of the following
occurs:
• Neighbor Dead Timer Expire—The AC does not receive an Echo request
from the AP within three times the handshake interval.
• Response Timer Expire—The AC sends a control packet to the AP but
Tunnel Down Reason
does not receive any response within the specified waiting time.
• Reset AP—The AP is rebooted by the execution of a command on the AC.
• AP Config Change—The corresponding configurations are modified on
the AC.
• No Reason—Other reasons.
Connection count between the AP and AC. This field is reset in one of the
following situations:
• AC is rebooted.
Connection Count
• You re-configure an AP template after deleting the old one.
If you click Reboot on this page to reboot the AP, the connection count will
not be reset.
AP Mode Mode supported by the AP. Currently only the split MAC mode is supported.
Interval to detect clients segregated from the system due to various reasons
Client Keep-alive Interval
(such as power failure or crash) and disconnect them from the AP.
If the client is idle for more than the specified interval (if the AP does not
Client Idle Interval(s) receive any data from the client within the specified interval), the client will
be removed from the network.
Broadcast-probe Reply Status Whether the AP is enabled to respond to broadcast probe requests.
57
Field Description
Basic BSSID MAC address of the AP.
Short GI for 40MHz Whether the AP supports short GI when it operates in 40 MHz mode.
Operating channel:
• If the channel is manually configured, the configured channel number is
displayed.
Configured Channel • If the channel is automatically selected, auto(channel) is displayed, where
channel is the optimal channel automatically selected by the AC.
• If the AP operates in 802.11n radio mode and 40 MHz bandwidth mode,
this field displays the primary channel.
58
Field Description
Transmission power on the radio:
• If one-time (transmit power control) is adopted, the configured transmit
power is displayed.
Configured Power(dBm)
• If auto TPC is adopted, two values are displayed, with the first being the
maximum power, and the second auto (number), where number in the
brackets represents the actual power.
Preamble Type Type of preamble that the AP can support: short or long.
59
Figure 39 Displaying AP connection records
Field Description
Connection status:
• Discovery—The AC only receives discovery packets from the AP.
• Join—The AP fails to connect with the AC due to tunnel failure.
Status • Run—The AP has successfully connected with the AC, and the AP
is running.
• Offline—The AP has successfully connected with the AC, but the
AP is offline.
The meaning of this field varies with the connection status of the AP:
• Discovery—Last time the AC received a discovery request.
Time • Join—Last time the AC received a Join packet.
• Run—Time when the AP entered the Run state.
• Offline—Time when the AP went offline.
Displaying clients
Select Summary > Client from the navigation tree.
Figure 40 Displaying clients
Field Description
Refresh Refresh the current page.
60
Field Description
Add the selected client to the static blacklist, which you can display by
Add to Blacklist
selecting Security > Filter from the navigation tree.
Field Description
MAC address MAC address of the client.
61
Field Description
Username of the client.
• The field is displayed as –NA– if the client adopts plain-text
authentication or an authentication method that does not require a
User Name username.
• The field is irrelevant to the portal authentication method. If the client
uses the portal authentication method, the field does not display the
portal username of the client.
Specifies how often the client wakes up to receive frames saved in the
Listen Interval (Beacon Interval)
AP and is expressed in units of beacon intervals.
62
Field Description
Represents the frame transmission/reception rate of the client,
including data, management, and control frames. For the AC + fit AP
Rx/Tx Rate
mode, there is a delay because the Rx Rate is transmitted from AP to AC
periodically depending on the statistics interval.
Up Time Time for which the client has been associated with the AP.
63
Figure 42 Displaying client statistics
Field Description
AP Name Name of the associated access point.
Received signal strength indication. This value indicates the client signal
RSSI
strength detected by the AP.
You can collect statistics of priority queues such as Back Ground, Best Effort, Video and Voice on a QoS
client only. The Best Effort priority queue includes traffic including SVP packets sent and received on a
client where QoS is not enabled. Therefore, the queues collected might be different from the queues
64
actually sent. You can collect statistics of priority queues carried in Dot11E or WMM packets. Otherwise,
statistics collection of priority queues on the receive end might fail.
Field Description
BSSID BSSID of the AP associated with the client.
The IP address of the AC connected with the client. When the configured roaming
AC-IP-address
channel type is IPv6, the IPv6 address of the AC is displayed.
65
2. Click the Link Test Information tab on the page.
3. Click the name of the specified client to view the link test information about the client.
Figure 44 Displaying link test information
Field Description
• Rate number for a non-802.11n client.
No./MCS
• MCS value for an 802.11n client.
Rate(Mbps) Rate at which the radio interface sends wireless ping frames.
TxCnt Number of wireless ping frames that the radio interface sent.
RxCnt Number of wireless ping frames that the radio interface received from the client.
Received signal strength indication. This value indicates the client signal strength
RSSI
detected by the AP.
66
Figure 45 Displaying beacon measurement reports
Field Description
MAC Address MAC address of the client.
Regulatory class: 12 or 5.
Regulatory Class
For more information, see the 802.11k protocols.
67
Managing licenses
Some features can be used only after you register them by using an enhanced license. A license is
purchased. It provides the serial number for registering the features and includes a description for the
features.
Item Description
Select the name of the feature to be registered. The device supports only the AP feature.
Feature Name
AP—Increases the number of allowed APs.
68
Displaying registered enhanced licenses
1. Select Device > License from the navigation tree.
2. Click the Enhanced License tab.
The page in Figure 46 appears.
3. View the registered enhanced licenses at the lower part of the page.
Table 28 Field description
Field Description
Feature Name Name of the feature registered.
Time left for the license. After the time elapses, the license expires.
Available Time Left
The value Forever means that the license is an official license.
69
Configuring basic device settings
The device basic information feature allows you to:
• Set the system name of the device. The configured system name will be displayed at the top of the
navigation bar.
• Set the idle timeout period for a logged-in user. The system logs an idle user off the Web for security
purposes after the configured period.
70
3. Set the Web idle timeout for a logged-in user.
4. Click Apply.
71
Maintaining devices
Upgrading software
IMPORTANT:
During a software upgrade, avoid performing any operation on the Web interface. Otherwise, the
upgrade operation might be interrupted.
A boot file, also known as the system software or device software, is an application file used to boot the
device. Software upgrade allows you to obtain a target application file from the local host and set the file
as the boot file to be used at the next reboot. You can keep the original filename after you obtain the
target application file from the local host. In addition, you can select whether to reboot the device to
make the upgrade software take effect.
To upgrade software:
1. Select Device > Device Maintenance from the navigation tree.
The software upgrade configuration page appears.
Figure 49 Software upgrade configuration page
Item Description
Specify the path of the local application file, which must be
File
with the extension .app or .bin.
72
Item Description
Specify the type of the boot file for the next boot:
• Main—Boots the device.
File Type
• Backup—Boots the device when the main boot file is
unavailable.
3. Clear the box before "Check whether the current configuration is saved in the next startup
configuration file" or keep it selected.
4. Click Apply.
A confirmation dialog box appears.
5. Click OK.
If you select the box next to Check whether the current configuration is saved in the next startup
configuration file, the system checks the configuration before rebooting the device. If the check
succeeds, the system reboots the device. If the check fails, the system displays a dialog box to
inform you that the current configuration and the saved configuration are inconsistent, and does
not reboot the device. You must save the current configuration manually before you can reboot
the device.
73
If you do not select the box next to Check whether the current configuration is saved in the next
startup configuration file, the system reboots the device automatically.
6. Log in again in to the Web interface after the device reboots.
74
NOTE:
• During the generation of the diagnostic file, do not perform any operation on the Web interface.
• To view this file after the diagnostic file is generated successfully, select Device > File Management, or
download this file to the local host. For more information, see "Managing files."
75
Configuring the system time
Configure a correct system time so that the device can work with other devices correctly. System time
allows you to display and set the device system time, system time zone, and daylight saving time on the
Web interface.
You can set the system time using manual configuration or automatic synchronization of NTP server time.
Changing the system clock on each device within a network is time-consuming and does not guarantee
clock precision.
Defined in RFC 1305, the Network Time Protocol (NTP) synchronizes timekeeping among distributed
time servers and clients.
NTP can keep consistent timekeeping among all clock-dependent devices within the network so that the
devices can provide diverse applications based on consistent time. For a local system running NTP, it can
synchronize, be synchronized by, or mutually synchronize with other clocks.
Configuration guidelines
• A device can act as a server to synchronize the clock of other devices only after its clock has been
synchronized. If a server's clock has a stratum level higher than or equal to that of a client's clock,
the client will not synchronize its clock to the server's clock.
• Because the synchronization process takes a period of time, the clock status may be displayed as
unsynchronized after your configuration. Refresh the page to update the clock status.
• All online Web users are logged out if the following conditions exist:
The system time of the NTP server is ahead of the system time of the device.
The difference between them exceeds the Web idle time specified on the device.
76
Configuring the system time
1. Select Device > System Time from the navigation tree.
The page in Figure 53 appears.
2. Click the System Time Configuration calendar button.
The calendar page appears.
Figure 54 Configuring the system time
3. Modify the system time either in the System Time Configuration field, or through the calendar
page.
You can perform the following operations on the calendar page:
a. Click Today to set the current date on the calendar to the current system date of the local host.
The time is not changed.
b. Set the year, month, date and time, and then click OK.
4. Click Apply in the system time configuration page to save your configuration.
77
Figure 55 Configuring the network time
Item Description
Clock status Display the synchronization status of the system clock.
78
Item Description
Key 1 Set NTP authentication key.
The NTP authentication feature should be enabled for a system
running NTP in a network where there is a high security demand. This
feature enhances the network security by means of client-server key
authentication, which prohibits a client from synchronizing with a
device that has failed authentication.
Key 2
You can set two authentication keys, each of which is composed of a
key ID and key string.
• ID is the ID of a key.
• Key string is a character string for MD5 authentication key.
NTP Server Specify the IP address of an NTP server, and configure the
1/Reference authentication key ID used for the association with the NTP server. The
Key ID device synchronizes its time to the NTP server only if the key provided
by the server is the same with the specified key.
External Reference You can configure two NTP servers. The clients will choose the optimal
Source reference source.
NTP Server
2/Reference IMPORTANT:
Key ID
The IP address of an NTP server is a unicast address, and cannot be a
broadcast or a multicast address, or the IP address of the local clock
source.
3. Configure the time zone and daylight saving time, as described in Table 31.
4. Click Apply.
Table 31 Configuration items
Item Description
Time Zone Set the time zone for the system.
79
Item Description
Adjust the system clock for daylight saving time changes, which means adding one
hour to the current system time.
Click Adjust clock for daylight saving time changes to expand the option, as shown
in Figure 57. You can configure the daylight saving time changes in either of the
following ways:
Adjust clock for • Specify that the daylight saving time starts on a specific date and ends on a
daylight saving time specific date. The time range must be greater than one day and smaller than one
changes year. For example, configure the daylight saving time to start on August 1st, 2006
at 06:00:00 a.m., and end on September 1st, 2006 at 06:00:00 a.m.
• Specify that the daylight saving time starts and ends on the corresponding
specified days every year. The time range must be greater than one day and
smaller than one year. For example, configure the daylight saving time to start on
the first Monday in August at 06:00:00 a.m., and end on the last Sunday in
September at 06:00:00 a.m.
Configuring the AC
To configure the switch as the NTP server of the AC:
1. Select Device > System Time from the navigation tree.
80
2. Click the Net Time tab.
The Net Time tab page appears.
Figure 59 Configuring the switch as the NTP server of the AC
3. Enter 24 for the ID of key 1, and aNiceKey for the key string. Enter 1.0.1.12 in the NTP Server 1
box and 24 in the Reference Key ID box.
4. Click Apply.
81
Managing logs
System logs contain a large amount of network and device information, including running status and
configuration changes. System logs allow administrators to monitor network and device operation. With
system logs, administrators can take corresponding actions against network and security problems.
The system sends system logs to the following destinations:
• Console.
• Monitor terminal, which is a user terminal that has login connections through the AUX, VTY, or TTY
user interface.
• Log buffer.
• Loghost.
• Web interface.
Displaying syslog
The Web interface provides abundant search and sorting functions for viewing logs.
To display syslog:
1. Select Device > Syslog from the navigation tree.
The page for displaying syslog appears.
Figure 60 Displaying syslogs
TIP:
• You can click Reset to clear all system logs saved in the log buffer on the Web interface.
• You can click Refresh to manually refresh the page, or set the refresh interval on the Log Setup page
to enable the system to automatically refresh the page. For more information, see "Setting buffer
capacity and refresh interval."
82
2. View system logs.
Table 32 Field description
Field Description
Time/Date Display the time/date when system logs are generated.
Display the system information levels. The information is classified into eight
levels depending on severity:
• Emergency—The system is unusable.
• Alert—Action must be taken immediately.
• Critical—Critical conditions.
Level
• Error—Error conditions.
• Warning—Warning conditions.
• Notification—Normal but significant condition.
• Information—Informational messages.
• Debug—Debug-level messages.
83
Figure 61 Setting the loghost
Item Description
IPv4/Domain
Set the IPv4 address, domain name, or IPv6 address of the log host.
IPv6
You can specify up to four log hosts.
Loghost IP/Domain
84
Figure 62 Syslog configuration page
Item Description
Buffer Capacity Set the number of logs that can be stored in the log buffer of the Web interface.
Set the refresh period on the log information displayed on the Web interface.
You can select manual refresh or automatic refresh:
Refresh Interval • Manual—Click Refresh to refresh the Web interface when displaying log
information.
• Automatic—You can select to refresh the Web interface every 1, 5, or 10 minutes.
85
Managing the configuration
Configuration restore can upload the .cfg file on the host of the current user to the device for the next
startup.
To restore the configuration:
1. Select Device > Configuration from the navigation tree.
2. Click the Restore tab.
The page for restoring configuration appears.
86
Figure 64 Restoring the configuration
The save configuration module provides the function to save the current configuration to the configuration
file (.cfg file) to be used at the next startup. You can save the configuration by using one of the following
ways: fast or common.
Fast
Click the Save button at the upper right of the auxiliary area, and you can save the configuration to the
configuration file.
Figure 65 Saving the configuration
Common
1. Select Device > Configuration from the navigation tree.
2. Click the Save tab.
The page in Figure 65 appears.
3. Click Save Current Settings to save the current configuration to the configuration file.
87
Initializing the configuration
This operation restores the system to factory defaults, delete the current configuration file, and reboot the
device.
To initialize the configuration:
1. Select Device > Configuration from the navigation tree.
2. Click the Initialize tab.
The initialize confirmation page appears.
Figure 66 Initializing the configuration
88
Managing files
The device saves critical files, such as host, software and configuration files, into the storage device, and
the system provides file management for users to manage those files.
There are different types of storage media, such as flash and compact flash (CF). Different devices
support different types of storage devices. For more information, see "About the Web-based
configuration guide for HP unified wired-WLAN products."
2. Select a disk from the Please select disk list on the top of the page.
3. View the used space, free space and capacity of the disk at the right of the list.
4. View all files saved in this disk (in the format of path + filename), file sizes, and the boot file types.
For example, Main or Backup is displayed if the file is an application file with the extension of .bin
or .app.
Downloading a file
1. Select Device > File Management from the navigation tree.
The page in Figure 67 appears.
89
2. Select a file from the list.
You can select one file at a time.
3. Click Download File.
The File Download dialog box appears. You can select to open the file or to save the file to a
specified path.
Uploading a file
IMPORTANT:
HP recommends that you do not perform any operation on the Web interface during the upgrade
procedure.
Removing a file
1. Select Device > File Management from the navigation tree.
The page in Figure 67 appears.
2. Select one or multiple files from the file list,
3. Click Remove File.
NOTE:
You can also remove a file by clicking the icon.
90
Managing interfaces
91
Figure 68 Displaying interface information
2. Click an interface name in the Name column to display the statistics of that interface.
The page for displaying interface statistics appears.
Figure 69 Displaying interface statistics
Creating an interface
1. Select Device > Interface from the navigation tree.
The page in Figure 68 appears.
92
2. Click Add.
The page for creating an interface appears.
Figure 70 Creating an interface
Item Description
Interface Name Set the type and number of a logical interface.
If you are creating a Layer 3 Ethernet subinterface, set the VLANs associated with
the subinterface.
This parameter is available only for Layer 3 Ethernet subinterfaces.
VID
IMPORTANT:
This configuration item is not configurable because the device does not support Layer
3 Ethernet subinterfaces.
Set the maximum transmit unit (MTU) that is allowed to pass the interface.
The MTU value affects fragmentation and reassembly of IP packets.
MTU
Support for this configuration item depends on the interface type. All Layer 3
interfaces support MTU.
93
Item Description
Set the maximum segment size (MSS) for IP packets on the interface.
TCP MSS Support for this configuration item depends on the interface type. All Layer 3
interfaces support MTU
IP Address/Mask After selecting the Static Address option for IP Config, you need to set the primary
IP address and mask, and secondary IP addresses and masks for the interface.
IMPORTANT:
Secondary IP • The primary and secondary IP addresses cannot be 0.0.0.0.
Address/Mask • For a loopback interface, the mask is fixed to 32 bits and is not configurable.
• The number of secondary IP addresses supported by the device depends on the
device model.
If the Unnumbered option is selected as the way for the interface to obtain an IP
Unnumbered Interface
address, you must set the interface whose IP address is to be borrowed.
Set the option for the interface to obtain an IPv6 link-local address, include.
• None—Select this option if you do not want to assign an IPv6 link-local address
to the interface.
IPv6 Config • Auto—Select this option for the system to automatically assign an IPv6 link-local
address to the interface.
• Manual—Select this option to manually assign an IPv6 link-local address to the
interface. If this option is selected, you must set the IPv6 Link Local Address field.
If the Manual option is selected for the interface to obtain an IPv6 link-local address,
IPv6 Link Local Address
you must set an IPv6 link-local address for the interface.
94
The page for modifying a Layer 2 interface appears.
Figure 71 Modifying a Layer 2 physical interface
3. Modify the information about the Layer 2 physical interface, as described in Table 36.
4. Click Apply.
Table 36 Configuration items
Item Description
Enable or disable the interface.
Port State In some cases, modification to the interface parameters does not take effect
immediately. You need to shut down and then bring up the interface to make the
modification take effect.
95
Item Description
Set the duplex mode of the interface.
• Auto—Auto-negotiation.
Duplex
• Full—Full duplex.
• Half—Half duplex.
Set the link type of the current interface, which can be access, hybrid, or trunk. For
more information, see Table 37.
Link Type IMPORTANT:
To change the link type of a port from trunk to hybrid or vice versa, you must first set
its link type to access.
Set the default VLAN ID of the hybrid or trunk port.
PVID IMPORTANT:
The trunk ports at the two ends of a link must have the same PVID.
Set the Medium Dependent Interface (MDI) mode for the interface.
Two types of Ethernet cables can be used to connect Ethernet devices: crossover
and straight-through. To accommodate these two types of cables, an Ethernet
interface on the device can operate in one of the following MDI modes:
• Across mode.
• Normal mode.
• Auto mode.
An Ethernet interface is composed of eight pins. By default, each pin has its
particular role. For example, pin 1 and pin 2 are used for transmitting signals; pin
3 and pin 6 are used for receiving signals. Pin roles are set as a result of how you
set the MDI mode:
MDI • In across mode, pin 1 and pin 2 are used for transmitting signals, and pin 3 and
pin 6 are used for receiving signals.
• In auto mode, the pin roles are determined through auto negotiation.
• In normal mode, pin 1 and pin 2 are used for receiving signals while pin 3 and
pin 6 are used for transmitting signals.
Configure the MDI mode depending on the cable types:
• Typically, the auto mode is recommended. The other two modes are useful only
when the device cannot determine the cable types.
• When straight-through cables are used, the local MDI mode must be different
from the remote MDI mode.
• When crossover cables are used, the local MDI mode must be the same as the
remote MDI mode, or the MDI mode of at least one end must be set to auto.
IMPORTANT:
Flow control can be realized only when it is enabled on both ends.
Jumbo Frame
Enable or disable the forwarding of jumbo frames.
Forwarding
96
Item Description
Set the maximum number of MAC addresses the interface can learn. Available
options include:
Max MAC Count
• User Defined—Select this option to set the limit manually.
• No Limited—Select this option to set no limit.
Set broadcast suppression. You can suppress broadcast traffic by percentage or by
PPS:
• ratio—Sets the maximum percentage of broadcast traffic to the total transmission
capability of an Ethernet interface. When this option is selected, you need to
Broadcast Suppression
enter a percentage in the box below this option.
• pps—Sets the maximum number of broadcast packets that can be forwarded on
an Ethernet interface every second. When this option is selected, you need to
enter a number in the box below this option.
Set unicast suppression. You can suppress unicast traffic by percentage or by PPS:
• ratio—Sets the maximum percentage of unicast traffic to the total transmission
capability of an Ethernet interface. When this option is selected, you need to
Unicast Suppression enter a percentage in the box below this option.
• pps—Sets the maximum number of unicast packets that can be forwarded on an
Ethernet interface every second. When this option is selected, you need to enter
a number in the box below this option.
A hybrid port can be assigned to multiple VLANs to receive and send packets for the
Hybrid VLANs. A hybrid port allows packets of multiple VLANs to pass through untagged.
Hybrid ports can be used to connect network devices and user devices.
A trunk port can be assigned to multiple VLANs to receive and send packets for the
VLANS. A trunk port allows only packets of the default VLAN to pass through
Trunk untagged.
Trunk ports are typically used to connect network devices.
97
The page for modifying a Layer 3 interface appears.
Figure 72 Modifying a Layer 3 physical interface
Item Description
Interface Type Set the interface type, which can be Electrical port, Optical port, or None.
98
Item Description
Display and set the interface status.
• Connected indicates that the current status of the interface is up and connected.
You can click Disable to shut down the interface.
• Not connected indicates that the current status of the interface is up but not
connected. You can click Disable to shut down the interface.
Interface Status • Administratively Down indicates that the interface is shut down by the
administrator. You can click Enable to bring up the interface.
After you click Enable or Disable, the page displaying interface information appears.
IMPORTANT:
For an interface whose status cannot be changed, the Enable or Disable button is not
available.
Working Mode Set the interface to work in bridge mode or router mode.
Configuration procedure
1. Create VLAN 100:
a. Select Network > VLAN from the navigation tree.
The VLAN tab page appears.
b. Click Add.
The page for creating VLANs appears.
Figure 73 Creating VLAN 100
99
Figure 74 Creating VLAN-interface 100
c. Select Vlan-interface from the Interface Name list, and enter the interface ID 100.
d. Select the Static Address option for IP Config, enter the IP address 10.1.1.2, and select 24
(255.255.255.0) from the Mask list.
e. Click Apply.
100
Configuring port mirroring
Port mirroring includes local port mirroring and remote port mirroring. Unless otherwise specified, port
mirroring described in this chapter refers to local port mirroring.
Support for port mirroring depends on the device model. For more information, see "About the
Web-based configuration guide for HP unified wired-WLAN products."
Overview
Port mirroring is to copy the packets passing through one or multiple ports (called mirroring ports) to a
port (called the monitor port) on the local device. The monitor port is connected to a monitoring device.
By using the monitoring device to analyze the packets mirrored to the monitor port, you can monitor the
network and troubleshoot possible network problems.
Figure 75 A port mirroring implementation
IP network
Monitor port
Mirroring port
Data monitoring
device
PC
Port mirroring is implemented through mirroring groups. The mirroring ports and the monitor port are in
the same mirroring group. With port mirroring enabled, the device copies packets passing through the
mirroring ports to the monitor port.
Configuration guidelines
When you configure port mirroring, follow these guidelines:
• Depending on the device model, you can assign the following types of ports to a mirroring group
as mirroring ports:
Layer 2 Ethernet
Layer 3 Ethernet
101
POS
CPOS
Serial
MP-group
• Depending on the device model, you can configure the following types of ports as the monitor port:
Layer 2 Ethernet
Layer 3 Ethernet
Tunnel
• To ensure normal operation of your device, do not enable STP, MSTP, or RSTP on the monitor port.
• On some types of devices, you can configure a member port in link aggregation as the monitor
port.
• Other restrictions on the monitor port depend on the device model.
• You can configure multiple mirroring ports, but only one monitor port for a mirroring group.
• A port can be assigned to only one mirroring group.
Required.
Configure the mirroring ports During configuration, select the port type Mirror Port.
For more information, see "Configuring ports for a mirroring group."
Required.
Configure the monitor port During configuration, select the port type Monitor Port.
For more information, see "Configuring ports for a mirroring group."
102
Figure 76 Adding a mirroring group
Item Description
Mirroring Group ID ID of the mirroring group.
103
Figure 77 Configuring ports for a mirroring group
3. Configure port information for the mirroring group, as described in Table 40.
4. Click Apply and the progress bar appears.
5. Click Close when the progress bar prompts that the configuration is complete.
Table 40 Configuration items
Item Description
Mirroring Group ID ID of the mirroring group to be configured.
104
• Packets from the AP access the AC through GigabitEthernet 1/0/1.
• The server is connected to GigabitEthernet 1/0/2 of the AC.
Configure port mirroring to monitor the bidirectional traffic on GigabitEthernet 1/0/1 of the AC on the
server.
To meet the network requirements, perform the following tasks on the AC:
• Configure GigabitEthernet 1/0/1 of the AC as a mirroring port.
• Configure GigabitEthernet 1/0/2 of the AC as the monitor port.
Figure 78 Network diagram
Configuration procedure
1. Add a mirroring group:
a. Select Device > Port Mirroring from the navigation tree.
b. Click Add.
c. Enter 1 for Mirroring Group ID, and select Local from the Type list.
d. Click Apply.
Figure 79 Adding a mirroring group
105
a. Click the Modify Port tab.
b. Select 1 – Local for Mirroring Group ID, Mirror Port for Port Type, both for Stream Orientation,
and GigabitEthernet 1/0/1 from the interface name list.
c. Click Apply.
The progress bar appears.
d. Click Close when the progress bar prompts that the configuration is complete.
Figure 80 Configuring a mirroring port
106
Figure 81 Configuring the monitor port
107
Managing users
In the user management part, you can perform the following configuration:
• Create a local user, and set the password, access level, and service type for the user.
• Set the super password for switching the current Web user level to the management level.
• Switch the current Web user access level to the management level.
Creating a user
1. Select Device > Users from the navigation tree.
2. Click the Create tab.
The page for creating local users appears.
Figure 82 Creating a user
Item Description
Username Set the username for a user.
108
Item Description
Set the access level for a user. Users of different levels can perform different
operations.
The following Web user levels, from low to high, are available:.
• Visitor—Users of this level can perform the ping and traceroute operations, but they
cannot access the device data or configure the device.
Access Level • Monitor—Users of this level can only access the device data but cannot configure
the device.
• Configure—Users of this level can access data on the device and configure the
device. They cannot upgrade the host software, add/delete/modify users, or back
up/restore the application file.
• Management—Users of this level can perform any operations on the device.
Password Set the password for a user.
Enter the same password again. Otherwise, the system prompts that the two
Confirm Password
passwords are not consistent when you apply the configuration.
109
3. Set the super password, as described in Table 42.
4. Click Apply.
Table 42 Configuration items
Item Description
Set the operation type:
Create/Remove • Create—Configure or modify the super password.
• Remove—Remove the current super password.
Password Set the password for a user to switch to the management level.
Enter the same password again. Otherwise, the system prompts that the two
Confirm Password
passwords are not consistent when you apply the configuration.
110
Configuring SNMP
SNMP overview
Simple Network Management Protocol (SNMP) is an Internet standard protocol widely used for a
management station to access and manage the devices on a network. SNMP shields the physical
differences between various devices and realizes automatic management of products from different
manufacturers.
An SNMP enabled network comprises the network management system (NMS) and agents.
The NMS manages agents by exchanging management information through SNMP. The NMS and
managed agents must use the same SNMP version to communicate with each other.
SNMP agents support SNMPv1, SNMPv2c, and SNMPv3.
• SNMPv1—Uses community names for authentication. Like the password, a community name is
used to restrict the communication between the NMS and the Agent. To access an SNMP agent, an
NMS must use the same community name as the name that is set on the SNMP agent. If the
community name used by the NMS is different from that set on the agent, the NMS cannot establish
an SNMP session to access the agent. Also, the NMS cannot receive traps or notifications from the
agent.
• SNMPv2c—Uses community names for authentication. SNMPv2c is compatible with SNMPv1 and
supports more operation modes, data types, and error codes.
• SNMPv3—Uses a user-based security model (USM) to secure SNMP communication. You can
configure authentication and privacy mechanisms to authenticate and encrypt SNMP packets for
integrity, authenticity, and confidentiality.
For more information about SNMP, see Network Management and Monitoring Configuration Guide.
Task Remarks
Required.
The SNMP agent function is disabled by default.
Enabling SNMP agent
IMPORTANT:
If SNMP agent is disabled, all SNMP agent-related configurations are
removed.
111
Task Remarks
Optional.
Configuring an SNMP view After creating SNMP views, you can specify an SNMP view for an
SNMP group to limit the MIB objects that can be accessed by the
SNMP group.
Optional.
Allows you to configure that the agent can send SNMP traps to the
Configuring SNMP trap function NMS, and configure information about the target host of the SNMP
traps.
By default, an agent is allowed to send SNMP traps to the NMS.
Task Remarks
Required.
The SNMP agent function is disabled by default.
Enabling SNMP agent
IMPORTANT:
If SNMP agent is disabled, all SNMP agent-related configurations are
removed.
Optional.
Configuring an SNMP view After creating SNMP views, you can specify an SNMP view for an SNMP
group to limit the MIB objects that can be accessed by the SNMP group.
Required.
Configuring an SNMP group After creating an SNMP group, you can add SNMP users to the group
when creating the users. Therefore, you can realize centralized
management of users in the group through the management of the group.
Required.
Configuring an SNMP user Before creating an SNMP user, you need to create the SNMP group to
which the user belongs.
Optional.
Allows you to configure that the agent can send SNMP traps to the NMS,
Configuring SNMP trap function
and configure information about the target host of the SNMP traps
By default, an agent is allowed to send SNMP traps to the NMS.
112
The SNMP configuration page appears.
Figure 85 Configuring SNMP settings
2. Configure SNMP settings on the upper part of the page, as described in Table 45.
3. Click Apply.
Table 45 Configuration items
Item Description
SNMP Specify to enable or disable SNMP agent.
113
Item Description
Configure the local engine ID.
Local Engine ID The validity of a user after it is created depends on the engine ID of the SNMP
agent. If the engine ID when the user is created is not identical to the current
engine ID, the user is invalid.
Configure the maximum size of an SNMP packet that the agent can
Maximum Packet Size
receive/send.
Location Set a character string to describe the physical location of the device.
3. Click Add.
The Add View window appears.
114
Figure 87 Creating an SNMP view (1)
Item Description
View Name Set the SNMP view name.
Select to exclude or include the objects in the view range determined by the
Rule
MIB subtree OID and subtree mask.
Set the MIB subtree OID (such as 1.4.5.3.1) or name (such as system).
MIB Subtree OID MIB subtree OID identifies the position of a node in the MIB tree, and it can
uniquely identify a MIB subtree.
115
Adding rules to an SNMP view
1. Select Device > SNMP from the navigation tree.
2. Click the View tab.
The page in Figure 89 appears.
NOTE:
You can modify the rules of a view in the page you enter by clicking the icon of that view.
3. Click Add.
The Add SNMP Community page appears.
116
Figure 91 Creating an SNMP Community
Item Description
Community Name Set the SNMP community name.
Specify the view associated with the community to limit the MIB objects that
View
can be accessed by the NMS.
Associate the community with a basic ACL to allow or prohibit the access to
ACL
the agent from the NMS with the specified source IP address.
117
Figure 92 SNMP group
3. Click Add.
The Add SNMP Group page appears.
Figure 93 Creating an SNMP group
Item Description
Group Name Set the SNMP group name.
118
Item Description
Select the notify view of the SNMP group. The notify view can send trap messages.
Notify View
If no notify view is configured, the agent does not send traps to the NMS.
Associate a basic ACL with the group to restrict the source IP address of SNMP
ACL packets. You can configure to allow or prohibit SNMP packets with a specific source
IP address to restrict the intercommunication between the NMS and the agent.
3. Click Add.
The Add SNMP User page appears.
119
Figure 95 Creating an SNMP user
Item Description
User Name Set the SNMP user name.
Group Name
• When the security level is Auth/NoPriv, you can select an SNMP
group with no authentication no privacy or authentication without
privacy.
• When the security level is Auth/Priv, you can select an SNMP group
of any security level.
120
Item Description
Authentication Password Set the authentication password when the security level is Auth/NoPriv
or Auth/Priv.
Confirm Authentication Password The confirm authentication password must be the same as the
authentication password.
Select a privacy mode (including DES56, AES128, and 3DES) when the
Privacy Mode
security level is Auth/Priv.
Privacy Password Set the privacy password when the security level is Auth/Priv.
The confirm privacy password must be the same as the privacy
Confirm Privacy Password
password.
Associate a basic ACL with the user to restrict the source IP address of
SNMP packets. You can configure to allow or prohibit SNMP packets
ACL
with a specific source IP address to allow or prohibit the specified NMS
to access the agent by using name of the associated user.
121
Figure 97 Adding a target host of SNMP traps
6. Configure the settings for the target host, as described in Table 50.
7. Click Apply.
Table 50 Configuration items
Item Description
Set the destination IP address or domain.
Destination IP Address Select the IP address type: IPv4/Domain or IPv6, and then type the
corresponding IP address or domain in the field according to the IP
address type.
IMPORTANT:
The default port number is 162, which is the SNMP-specified port used
UDP Port
for receiving traps on the NMS. Typically (such as using IMC or MIB
Browser as the NMS), you can use the default port number. To change
this parameter to another value, you need to make sure that the
configuration is the same as the configuration on the NMS.
Select the security model, which is the SNMP version. The model
Security Model must be the same as the model running on the NMS. Otherwise, the
NMS cannot receive any trap.
Set the authentication and privacy mode for SNMP traps when the
security model is selected as v3. The available security levels are: no
Security Level
authentication no privacy, authentication but no privacy, and
authentication and privacy.
122
Displaying SNMP packet statistics
1. Select Device > SNMP from the navigation tree.
The page for displaying SNMP packet statistics appears.
Figure 98 SNMP packet statistics
AC
NMS
Agent
1.1.1.2/24
123
c. Select the v1 and v2c boxes, as shown in Figure 100.
d. Click Apply.
Figure 100 Enabling SNMP agent
124
Figure 102 Creating an SNMP read/write community
125
Figure 104 Adding an SNMP trap target host
IMPORTANT:
The configuration on the NMS must be consistent with the configuration on the agent. Otherwise, you
cannot perform corresponding operations.
126
Figure 105 Network diagram
Vlan-int2
1.1.1.1/24
AC
NMS
Agent
1.1.1.2/24
127
Figure 107 Creating an SNMP view (1)
128
Figure 109 Creating an SNMP group
129
Figure 110 Creating an SNMP user
130
6. Add target hosts of SNMP traps:
a. Click Add on the Trap tab.
The page in Figure 112 appears.
b. Select the destination IP address type as IPv4/Domain, enter the destination address 1.1.1.2.
c. Enter the user name user1, select v3 from the Security Model list, and select Auth/Priv from the
Security Level list.
d. Click Apply.
Figure 112 Adding target hosts of SNMP traps
IMPORTANT:
The configuration on the NMS must be consistent with the configuration on the agent. Otherwise, you
cannot perform corresponding operations.
131
Configuring loopback
You can check whether an Ethernet port works correctly by performing the Ethernet port loopback test.
During the test the port cannot correctly forward data packets.
Ethernet port loopback test can be an internal loopback test or an external loopback test.
• In an internal loopback test, self loop is established in the switching chip to check whether there is
a chip failure related to the functions of the port.
• In an external loopback test, a self-loop header is used on the port. Packets forwarded by the port
will be received by itself through the self-loop header. The external loopback test can be used to
check whether there is a hardware failure on the port.
Support of Ethernet ports for internal or external loopback test depends on the device model. For more
information, see "About the Web-based configuration guide for HP unified wired-WLAN products."
Configuration guidelines
When you perform a loopback test, follow these guidelines:
• You can perform an internal loopback test but not an external loopback test on a port that is
physically down. However, you can perform neither test on a port that is manually shut down.
• The system does not allow Rate, Duplex, Cable Type, and Port Status configuration on a port under
a loopback test.
• An Ethernet port operates in full duplex mode when the loopback test is performed, and restores its
original duplex mode after the loopback test.
Loopback operation
1. Select Device > Loopback from the navigation tree.
The loopback test configuration page appears.
132
Figure 113 Loopback test configuration page
Item Description
133
Figure 114 Loopback test result (for internal loopback test)
134
OAP management
Overview
An Open Application Platform (OAP) module can work in synergy with a device within OAA. For an
NMS that is based on SNMP UDP domain, the device and the OAP module are separate SNMP agents.
Physically, the two SNMP agents are at the same managed object. Logically, the two SNMP agents
belong to different systems and manage their own MIB objects independently. To manage the device and
the OAP module through the same interface, the NMS must first obtain their management IP addresses
and relationships between them. You can configure a management IP address for an OAP module
through the Web interface.
Support for OAP management depends on the device model. For more information, see "About the
Web-based configuration guide for HP unified wired-WLAN products."
2. Enter an IP address for the Management IP address field, as shown in Figure 115.
3. Click Apply.
135
Configuring MAC addresses
MAC address configurations related to interfaces apply only to Layer 2 Ethernet interfaces.
This chapter provides information about the management of static and dynamic MAC address entries. It
does not provide information about multicast MAC address entries.
Overview
A device maintains a MAC address table for frame forwarding. Each entry in this table indicates the
MAC address of a connected device, to which interface this device is connected and to which VLAN the
interface belongs. A MAC address table consists of two types of entries: static and dynamic. Static
entries are manually configured and never age out. Dynamic entries can be manually configured or
dynamically learned and will age out.
When a frame arrives at a port, Port A for example, the device performs the following tasks:
1. Checks the frame for the source MAC address (MAC-SOURCE for example).
2. Looks up the MAC address in the MAC address table.
If an entry is found, updates the entry.
If no entry is found, adds an entry for the MAC address and the receiving port (Port A) to the
MAC address table.
When receiving a frame destined for MAC-SOURCE, the device looks up the MAC address in the MAC
address table and forwards the frame from port A.
NOTE:
Dynamically learned MAC addresses cannot overwrite static MAC address entries, but the static MAC
address entries can overwrite dynamically learned MAC addresses.
When forwarding a frame, the device uses the following forwarding modes based on the MAC address
table:
• Unicast mode—If an entry matching the destination MAC address exists, the device forwards the
frame directly from the outgoing port recorded in the entry.
• Broadcast mode—The device broadcasts the frame to all the ports except the receiving port if either
of the following conditions exist:
The device receives a frame with a destination address of all Fs.
No entry matches the destination MAC address.
136
Figure 116 MAC address table of the device
MAC A 1
MAC B 1
MAC C 2
MAC D 2
MAC A MAC C
MAC B MAC D
Port 1 Port 2
2. Click Add in the bottom to enter the page for creating MAC address entries.
137
Figure 118 Creating a MAC address entry
Item Description
MAC Set the MAC address to be added.
138
Figure 119 Setting the aging time for MAC address entries
Item Description
No-aging Specify that the MAC address entry never ages out.
Aging Time Set the aging time for the MAC address entry.
Configuration procedure
Create a static MAC address entry:
1. Select Network > MAC from the navigation tree to enter the MAC tab.
2. Click Add.
The page shown in Figure 120 appears.
3. Enter MAC address 00e0-fc35-dc71, select static from the Type list, select 1 from the VLAN list,
and select Ten-GigabitEthernet1/0/1 from the Port list.
4. Click Apply.
139
Figure 120 Creating a static MAC address entry
140
Configuring VLANs
Overview
Ethernet is a network technology based on the Carrier Sense Multiple Access/Collision Detect
(CSMA/CD) mechanism. The medium is shared, so collisions and excessive broadcasts are common on
an Ethernet. To address this issue, virtual LAN (VLAN) was introduced to break a LAN down into
separate VLANs. VLANs are isolated from each other at Layer 2. A VLAN is a bridging domain, and all
broadcast traffic is contained within it, as shown in Figure 121.
Figure 121 A VLAN diagram
You can implement VLANs based on a variety of criteria. However, the Web interface is available only
for port-based VLANs, which group VLAN members by port. A port forwards traffic for a VLAN only after
it is assigned to the VLAN.
For more information about VLAN, see Layer 2 Configuration Guide.
Configuration guidelines
When you configure a VLAN, follow these guidelines:
• VLAN 1 is the default VLAN, which cannot be manually created or removed.
• Some VLANs are reserved for special purposes. You cannot manually create or remove them.
• Dynamic VLANs cannot be manually removed.
• By default, an access port is not a tagged member of a VLAN, and a hybrid or trunk port is a
tagged member of VLAN 2 to VLAN 4049.
141
Recommended configuration procedure
Step Remarks
1. Creating a VLAN Required.
2. Modifying a VLAN Required.
Select either task.
3. Modifying a port Configure the untagged member ports and tagged member ports
of the VLAN, or remove ports from the VLAN.
Creating a VLAN
1. Select Network > VLAN from the navigation tree. The system automatically selects the VLAN tab
and enters the page shown in Figure 122.
Figure 122 VLAN configuration page
TIP:
To easily configure a specific range of VLANs, enter a VLAN range in the VLAN Range field and click
Select, and all undesired VLANs will be filtered out. If you click Remove, all VLANs within this range
will be deleted.
142
Figure 123 Creating a VLAN
Modifying a VLAN
1. Select Network > VLAN from the navigation tree. The system automatically selects the VLAN tab
and enters the page shown in Figure 122.
2. Click the icon of the VLAN you want to modify to enter the page shown in Figure 124.
Figure 124 Modifying a VLAN
3. Configure the description and port members for the VLAN, as described in Table 54.
4. Click Apply.
Table 54 Configuration items
Item Description
ID Display the ID of the VLAN to be modified.
143
Item Description
Find the port to be modified and select the Untagged Member, Tagged
Member, or Not a Member option for the port:
Untagged Member
• Untagged—Indicates that the port sends the traffic of the VLAN with the
VLAN tag removed.
• Tagged—Indicates that the port sends the traffic of the VLAN without
Port removing the VLAN tag.
Tagged Member • Not a Member—Removes the port from the VLAN.
IMPORTANT:
Not a Member When you configure an access port as a tagged member of a VLAN, the link
type of the port is automatically changed into hybrid.
Modifying a port
1. Select Network > VLAN from the navigation tree
2. Click the Port tab.
Figure 125 Port configuration page
144
Table 55 Configuration items
Item Description
Port Display the port to be modified.
Untagged Member Display the VLAN(s) to which the port belongs as an untagged member.
Tagged Member Display the VLAN(s) to which the port belongs as a tagged member.
Member IMPORTANT:
Type • You cannot configure an access port as an untagged member of a nonexistent
Not a VLAN.
Member • The link type of the port is automatically changed into hybrid when either of the
following conditions exist:
You configure an access port as a tagged member of a VLAN.
You configure a trunk port as an untagged member of multiple VLANs in bulk.
• You can configure a hybrid port as a tagged or untagged member of a VLAN
only if the VLAN is an existing, static VLAN.
AC Switch
Configuring the AC
1. Create VLAN 2, VLAN 6 through VLAN 50, and VLAN 100:
a. Select Network > VLAN from the navigation tree to enter the VLAN tab.
b. Click Add.
145
c. Enter VLAN IDs 2,6-50,100.
d. Click Apply.
Figure 128 Creating a VLAN
146
Figure 129 Selecting a VLAN
147
Figure 130 Modifying a VLAN
d. Click Apply. A dialog box appears asking you to confirm the operation.
e. Click Apply in the dialog box.
148
Figure 132 Confirmation dialog box
149
Configuring ARP
Overview
Introduction to ARP
The Address Resolution Protocol (ARP) is used to resolve an IP address into an Ethernet MAC address (or
physical address).
In an Ethernet LAN, a device uses ARP to resolve the IP address of the next hop to the corresponding
MAC address.
For more information about ARP, see Layer 3 Configuration Guide.
150
Figure 133 Displaying ARP entries
Item Description
IP Address Enter an IP address for the static ARP entry.
151
Item Description
MAC Address Enter a MAC address for the static ARP entry.
Enter a VLAN ID and specify a port for the static ARP entry.
VLAN ID
Advanced The VLAN ID must be the ID of the VLAN that has already been created,
Options and the port must belong to the VLAN. The corresponding VLAN
Port interface must have been created.
Item Description
Disable gratuitous ARP packets Disable learning of ARP entries according to gratuitous ARP packets.
learning function Enabled by default.
Send gratuitous ARP packets when Enable the device to send gratuitous ARP packets when it receives ARP
receiving ARP requests from another requests from another network segment.
network segment Disabled by default.
152
Static ARP configuration example
Network requirements
As shown in Figure 136:
• The switch is installed with the HP 11900/10500/7500 20G Unified Wired-WLAN module to act
as the AC.
• GigabitEthernet 3/0/1 of the AC is connected to the router, and belongs to VLAN 100.
To enhance communication security between the AC and the router, configure a static ARP entry on the
AC.
Figure 136 Network diagram
Configuration procedure
1. Create VLAN 100:
a. Select Network > VLAN from the navigation tree to enter the default VLAN page.
b. Click Add.
c. Enter 100 for VLAN ID.
d. Click Apply.
Figure 137 Creating VLAN 100
153
Figure 138 Adding Ten-GigabitEthernet 1/0/1 to VLAN 100
154
Figure 139 Configuring VLAN-interface 100
155
Figure 140 Creating a static ARP entry
156
Configuring ARP attack protection
Overview
Although ARP is easy to implement, it does not provide any security mechanism and is prone to network
attacks and viruses, which threaten LAN security. This chapter describes features that a device can use to
detect and prevent attacks.
ARP detection
The ARP detection feature enables access devices to block ARP packets from unauthorized clients to
prevent user spoofing and gateway spoofing attacks.
ARP detection provides the following functions:
• User validity check—The device compares the sender IP and MAC addresses of a received ARP
packet against the static IP source guard binding entries, DHCP snooping entries, 802.1X security
entries, or OUI MAC addresses. If no match is found, the ARP packet is discarded.
• ARP packet validity check—The device does not check ARP packets received from an ARP trusted
port. Upon receiving an ARP packet from an ARP untrusted port, the device checks the ARP packet
based on source MAC address, destination MAC address, or source and destination IP addresses.
ARP packets that fail the check are discarded.
For more information about ARP detection, see Security Configuration Guide.
157
ARP active acknowledgement works before the gateway creates or modifies an ARP entry to avoid
generating any incorrect ARP entry. For more information about its working mechanism, see ARP Attack
Protection Technology White Paper.
1. Select Network > ARP Anti-Attack from the navigation tree to enter the default ARP Detection page
shown in Figure 141.
Figure 141 ARP Detection configuration page
Item Description
Select VLANs on which ARP detection is to be enabled.
To add VLANs to the Enabled VLANs list box, select one or multiple VLANs from the
VLAN Settings Disabled VLANs list box and click the << button.
To remove VLANs from the Enabled VLANs list box, select one or multiple VLANs from the
list box and click the >> button.
158
Item Description
Select trusted ports and untrusted ports.
To add ports to the Trusted Ports list box, select one or multiple ports from the Untrusted
Trusted Ports Ports list box and click the << button.
To remove ports from the Trusted Ports list box, select one or multiple ports from the list box
and click the >> button.
159
Table 59 Configuration items
Item Description
Select the detection mode for source MAC address based ARP attack
detection:
• Disable—The source MAC address attack detection is disabled.
• Filter Mode—The device generates an alarm and filters out ARP packets
Detection Mode sourced from a MAC address if the number of matching ARP packets
exceeds the specified value within 5 seconds.
• Monitor Mode—The device only generates an alarm if the number of
ARP packets sent from a MAC address exceeds the specified value within
5 seconds.
Source
MAC Enter the aging time of the source MAC address based ARP attack detection
Address Aging Time
entries.
Attack
Detection Threshold Enter the threshold of source MAC address based ARP attack detection.
160
Configuring IGMP snooping
Overview
IGMP snooping runs on a Layer 2 switch as a multicast constraining mechanism to improve multicast
forwarding efficiency. It creates Layer 2 multicast forwarding entries from IGMP packets that are
exchanged between the hosts and the router.
As shown in Figure 144, when IGMP snooping is not enabled, the Layer 2 switch floods multicast packets
to all hosts. When IGMP snooping is enabled, the Layer 2 switch forwards multicast packets of known
multicast groups to only the receivers.
Figure 144 Multicast forwarding before and after IGMP snooping runs
For more information about IGMP snooping, see IP Multicast Configuration Guide.
161
Step Remarks
Required.
Enable IGMP snooping in the VLAN and configure the IGMP
snooping version and querier feature.
By default, IGMP snooping is disabled in a VLAN.
Optional.
Configure the maximum number of multicast groups allowed and the
fast leave function for ports in the specified VLAN.
162
Figure 145 Basic IGMP snooping configurations
163
Figure 146 Configuring IGMP snooping in the VLAN
Item Description
VLAN ID This field displays the ID of the VLAN to be configured.
IMPORTANT:
If you change IGMPv3 snooping to IGMPv2 snooping, the system clears all IGMP
snooping forwarding entries that are dynamically added.
Enable or disable the function of dropping unknown multicast packets.
Unknown multicast data refers to multicast data for which no entries exist in the
IGMP snooping forwarding table.
Drop Unknown • With the function of dropping unknown multicast data enabled, the device
drops all the received unknown multicast data.
• With the function of dropping unknown multicast data disabled, the device
floods unknown multicast data in the VLAN to which the unknown multicast
data belong.
164
Item Description
Enable or disable the IGMP snooping querier function.
On an IP multicast network that runs IGMP, a Layer 3 device acts as an IGMP
querier. It sends IGMP queries, establishes and maintains multicast forwarding
entries for correct multicast traffic forwarding at the network layer.
Querier On a network without Layer 3 multicast devices, no IGMP querier-related
function can be implemented because a Layer 2 device does not support
IGMP. To implement IGMP querier-related function, you can enable IGMP
snooping querier on a Layer 2 device so that the device can generate and
maintain multicast forwarding entries at data link layer.
165
Table 61 Configuration items
Item Description
Select the port on which advanced IGMP snooping features are to be configured.
Port After a port is selected, advanced features configured on this port are displayed at
the lower part of the page.
Specify a VLAN in which you can configure the fast leave function for the port or the
VLAN ID
maximum number of multicast groups allowed on the port.
Configure the maximum number of multicast groups that the port can join.
With this feature, you can regulate multicast traffic on the port.
IMPORTANT:
When the number of multicast groups a port has joined reaches the configured
Group Limit
threshold, the system deletes all the forwarding entries persistent on that port from the
IGMP snooping forwarding table. The hosts on the port must join the multicast groups
again.
Support for the group limit depends on the device model. For more information, see
"About the Web-based configuration guide for HP unified wired-WLAN products."
Enable or disable the fast leave function for the port.
With fast-leave enabled on a port, the device, when receiving an IGMP leave
message on the port, immediately deletes that port from the outgoing port list of the
corresponding forwarding entry. Then, when receiving IGMP group-specific queries
for that multicast group, the device will not forward them to that port.
You can enable IGMP snooping fast-leave processing on a port that has only one
Fast Leave receiver host attached to save bandwidth and resources. You should not enable
IGMP snooping fast-leave processing on a port if the following conditions exist:
• The port has multiple hosts attached.
• The function of dropping unknown multicast packets has been enabled on the
switch or in the VLAN where the port resides.
Otherwise, other hosts attached to this port in the same multicast group cannot
receive the multicast data for the group.
166
Figure 148 Displaying entry information
3. Click the icon corresponding to an entry to display the detailed information of the entry, as
shown in Figure 149.
Figure 149 Detailed information of an entry
Field Description
VLAN ID ID of the VLAN to which the entry belongs.
Source Multicast source address, where 0.0.0.0 indicates all multicast sources.
167
Figure 150 Network diagram
Configuring Router A
Enable IP multicast routing, enable PIM-DM on each interface, and enable IGMP on Ethernet 1/1.
(Details not shown.)
Configuring the AC
1. Create VLAN 100:
a. Select Network > VLAN from the navigation tree to enter the VLAN displaying page.
b. Click Add.
c. Enter the VLAN ID 100.
d. Click Apply.
Figure 151 Creating VLAN 100
168
Figure 152 Adding a port to the VLAN
4. Enable IGMP snooping and the function for dropping unknown multicast data on VLAN 100:
a. Click the icon corresponding to VLAN 100.
b. On the page that appears, select the Enable option for IGMP Snooping, select the 2 option for
Version, and select the Enable option for Drop Unknown.
c. Click Apply.
169
Figure 154 Configuring the VLAN
3. Click the icon corresponding to the multicast entry to view information about this entry, as
shown in Figure 156.
The page shows that Ten-GigabitEthernet 1/0/2 of AC is added to multicast group 224.1.1.1.
170
Figure 156 Information about an IGMP snooping multicast entry
171
Configuring IPv4 and IPv6 routing
The term router in this document refers to routers, access controllers, unified switches, and access
controller modules.
Overview
Upon receiving a packet, a router determines the optimal route based on the destination address and
forwards the packet to the next router in the path. When the packet reaches the last router, it forwards the
packet to the destination host. Routing provides the path information that guides the forwarding of
packets.
A router selects optimal routes from the routing table, and sends them to the forwarding information base
(FIB) table to guide packet forwarding. Each router maintains a routing table and a FIB table.
Static routes are manually configured. If a network's topology is simple, you only need to configure static
routes for the network to work correctly. Static routes cannot adapt to network topology changes. If a fault
or a topological change occurs in the network, the network administrator must modify the static routes
manually.
For more information about routing table and static routing, see Layer 3 Configuration Guide.
Configuration guidelines
When you configure a static route, follow these guidelines:
• If you do not specify the preference when you configure a static route, the default preference is used.
Reconfiguration of the default preference applies only to newly created static routes. The Web
interface does not support configuration of the default preference.
• Do not configure the next hop address of a static route as the IP address of a local interface, such
as an Ethernet interface or VLAN interface. Otherwise, the static route does not take effect.
• When specifying the output interface, note that the following guidelines:
If NULL 0 or a loopback interface is specified as the output interface, you do not need to
configure the next hop address.
If a point-to-point interface is specified as the output interface, you do not need to specify the
next hop or change the configuration after the peer address has changed. For example, a PPP
interface obtains the peer's IP address through PPP negotiation, and you only need to specify it
as the output interface.
A broadcast interface (such as an Ethernet interface, virtual template, or VLAN interface) might
have multiple next hops. If you want to specify a broadcast interface as the output interface, you
must specify the next hop at the same time.
172
Figure 157 IPv4 active route table
Field Description
Destination IP Address
Destination IP address and subnet mask of the IPv4 route.
Mask
Outgoing interface of the IPv4 route. Packets destined for the specified
Interface
network segment will be sent out of the interface.
173
Figure 158 Creating an IPv4 static route
Item Description
Destination IP Address Enter the destination host or network IP address, in dotted decimal notation.
Set a preference value for the static route. The smaller the number, the higher the
preference.
Preference For example, specifying the same preference for multiple static routes to the
same destination enables load sharing on the routes, while specifying different
preferences enables route backup.
Next Hop Enter the next hop IP address in dotted decimal notation.
174
Figure 159 Displaying the IPv6 active route table
Field Description
Destination IP Address
Destination IP address and prefix length of the IPv6 route.
Prefix Length
175
Figure 160 Creating an IPv6 static route
Item Description
Enter the destination host or network IP address, in the X:X::X:X format. The
128-bit destination IPv6 address is a hexadecimal address with eight parts
Destination IP Address
separated by colons (:). Each part is represented by a 4-digit hexadecimal
integer.
Prefix Length Enter the prefix length of the destination IPv6 address.
Set a preference value for the static route. The smaller the number, the higher the
preference.
Preference For example, specifying the same preference for multiple static routes to the
same destination enables load sharing on the routes, while specifying different
priorities for them enables route backup.
Next Hop Enter the next hop address, in the same format as the destination IP address.
176
Figure 161 Network diagram
Configuration outlines
1. On Switch A, configure a default route with Switch B as the next hop.
2. On Switch B, configure one static route with Switch A as the next hop and the other with AC as the
next hop.
3. On AC, configure a default route with Switch B as the next hop.
Configuration procedure
1. Configure a default route with the next hop address 1.1.4.2 on Switch A.
2. Configure two static routes on Switch B: one with destination address 1.1.2.0/24 and next hop
address 1.1.4.1, and the other with destination address 1.1.3.0/24 and next hop address
1.1.5.6.
3. Configure a default route on AC:
a. Select Network > IPv4 Routing from the navigation tree.
b. Click the Create tab to enter the IPv4 static route configuration page, as shown in Figure 162.
c. Enter 0.0.0.0 for Destination IP Address, 0 for Mask, and 1.1.5.5 for Next Hop.
d. Click Apply.
Figure 162 Configuring a default route
177
Verifying the configuration
1. Display the route table:
Enter the IPv4 route page of Switch A, Switch B, and AC, respectively, to verify that the newly
configured static routes are displayed as active routes on the page.
2. Ping Host B from Host A (assuming both hosts run Windows XP):
C:\Documents and Settings\Administrator>ping 1.1.3.2
Configuration outlines
1. On Switch A, configure a default route with Switch B as the next hop.
2. On Switch B, configure one static route with Switch A as the next hop and the other with AC as the
next hop.
3. On AC, configure a default route with Switch B as the next hop.
Configuration procedure
1. Configure a default route with the next hop address 4::2 on Switch A.
2. Configure two static routes on Switch B: one with destination address 1::/64 and next hop
address 4::1, and the other with destination address 3::/64 and next hop address 5::1.
3. Configure a default route on AC:
178
a. Select Network > IPv6 Routing from the navigation tree.
b. Click the Create tab to enter the IPv6 static route configuration page, as shown in Figure 164.
c. Enter :: for Destination IP Address, select 0 for Prefix Length, and enter 5::2 for Next Hop.
d. Click Apply.
Figure 164 Configuring a default route
179
Configuring DHCP
DHCP overview
After the DHCP client is enabled on an interface, the interface can dynamically obtain an IP address and
other configuration parameters from the DHCP server. This facilitates configuration and centralized
management. For more information about the DHCP client configuration, see "Managing interfaces."
For more information about DHCP, see Layer 3 Configuration Guide.
The Dynamic Host Configuration Protocol (DHCP) provides a framework to assign configuration
information to network devices.
DHCP uses the client/server model. Figure 165 shows a typical a DHCP application.
Figure 165 A typical DHCP application
A DHCP client can obtain an IP address and other configuration parameters from a DHCP server on
another subnet through a DHCP relay agent.
Figure 166 DHCP relay agent application
180
DHCP snooping overview
IMPORTANT:
The DHCP snooping-enabled device must be between the DHCP client and relay agent, or between the
DHCP client and server. It does not work if it is between the DHCP relay agent and DHCP server.
As a DHCP security feature, DHCP snooping can implement the following functionality:
• Records IP-to-MAC mappings of DHCP clients.
• Ensures DHCP clients to obtain IP addresses from authorized DHCP servers.
181
Step Remarks
Required.
Use at least one method.
IMPORTANT:
2. Creating an address pool for the DHCP server • If the DHCP server and DHCP clients are on the
same subnet, make sure the address pool is on the
Creating a static address pool for the DHCP
same network segment as the DHCP server
server
enabled-interface. Otherwise, the clients will fail to
Creating a dynamic address pool for the DHCP
obtain IP addresses.
server
• If a DHCP client obtains an IP address via a DHCP
relay agent, an IP address pool on the same
network segment as the DHCP relay agent
interface must be configured. Otherwise, the client
will fail to obtain an IP address.
Optional.
When receiving a client's request on an interface with
the DHCP server enabled, the DHCP server will assign
an IP address from its address pool to the DHCP client.
With DHCP enabled, interfaces operate in DHCP
server mode.
3. Enabling the DHCP server on an interface
IMPORTANT:
• An interface cannot serve as both the DHCP server
and the DHCP relay agent. The most recent
configuration takes effect.
• The DHCP server works on interfaces with IP
addresses manually configured only.
4. Displaying information about assigned IP
Optional.
addresses
Enabling DHCP
1. Select Network > DHCP from the navigation tree to enter the default DHCP Server page shown
in Figure 167.
2. Select the Enable option on the upper part of the page to enable DHCP globally.
182
Figure 167 Enabling DHCP
183
Figure 168 Creating a static address pool
Item Description
IP Pool Name Enter the name of a static address pool.
IP Address Enter an IP address and select a subnet mask for the static address pool.
The IP address cannot be the IP address of any interface on the DHCP server.
Otherwise, an IP address conflict may occur and the bound client cannot obtain an
Mask IP address correctly.
You can enter a mask length or a mask in dotted decimal notation..
Client MAC Address Configure the client MAC address or the client ID for the static address pool.
IMPORTANT:
Client ID The client ID must be identical to the ID of the client to be bound. Otherwise, the client
cannot obtain an IP address.
Enter the domain name suffix for the client.
Client Domain Name With the suffix assigned, the client only needs to enter part of a domain name, and
the system adds the domain name suffix for name resolution.
184
Item Description
Enter the DNS server addresses for the client.
To allow the client to access a host on the Internet through DNS, you need to specify
DNS Server Address a DNS server address.
Up to eight DNS servers can be specified in a DHCP address pool, separated by
commas.
NetBIOS Node Type Select the NetBIOS node type for the client.
Item Description
IP Pool Name Enter the name of a dynamic address pool.
185
Item Description
Enter an IP address segment for dynamic allocation.
IP Address
To avoid address conflicts, the DHCP server excludes the IP
addresses used by gateways or FTP servers from dynamic
allocation.
Mask You can enter a mask length or a mask in dotted decimal
notation.
Lease Unlimited. Configure the address lease duration for the address pool.
Duration days/hours/minutes/seconds. Unlimited indicates the infinite duration.
Client Domain Name With the suffix assigned, the client only needs to enter part of a
domain name, and the system will add the domain name suffix
for name resolution.
NetBIOS Node Type Select the NetBIOS node type for the client.
186
Figure 170 Configuring a DHCP server interface
Field Description
IP Address Assigned IP address.
Client MAC Address/Client ID Client MAC address or client ID bound to the IP address.
Pool Name Name of the DHCP address pool where the IP address belongs.
187
Recommended configuration procedure (for DHCP
relay agent)
Step Remarks
Required.
To improve reliability, you can specify several DHCP servers as a
2. Creating a DHCP server group group on the DHCP relay agent and correlate a relay agent interface
with the server group. When the interface receives requesting
messages from clients, the relay agent will forward them to all the
DHCP servers of the group.
Required.
Enable the DHCP relay agent on an interface, and correlate the
interface with a DHCP server group.
With DHCP enabled, interfaces work in the DHCP server mode by
default.
IMPORTANT:
• An interface cannot serve as both the DHCP server and the DHCP
3. Enabling the DHCP relay agent relay agent. The most recent configuration takes effect.
on an interface • If the DHCP relay agent is enabled on an Ethernet subinterface, a
packet received from a client on this interface must contain a VLAN
tag. The VLAN tag must be the same as the VLAN ID of the
subinterface. Otherwise, the packet is discarded.
• The DHCP relay agent works on interfaces with only IP addresses
manually configured.
• If an Ethernet subinterface serves as a DHCP relay agent, it conveys
IP addresses only to subinterfaces of DHCP clients. In this case, a
PC cannot obtain an IP address as a DHCP client.
Optional.
Create a static IP-to-MAC binding, and view static and dynamic
bindings.
4. Configuring and displaying The DHCP relay agent can dynamically record clients' IP-to-MAC
clients' IP-to-MAC bindings bindings after clients get IP addresses. It also supports static bindings.
You can manually configure IP-to-MAC bindings on the DHCP relay
agent so that users can access external network using fixed IP
addresses.
By default, no static binding is created.
188
Enabling DHCP and configuring advanced parameters for the
DHCP relay agent
1. Select Network > DHCP from the navigation tree.
2. Click the DHCP Relay tab.
Figure 172 DHCP relay agent configuration page
189
Figure 173 Advanced DHCP relay agent configuration field
5. Configure the advanced DHCP relay agent parameters, as described in Table 70.
6. Click Apply. You must also click Apply for enabling the DHCP service.
Table 70 Configuration items
Item Description
Enable or disable unauthorized DHCP server detection.
There are unauthorized DHCP servers on networks, which reply to DHCP clients with
incorrect IP addresses.
When this feature is enabled, the DHCP relay agent will record the following
information:
Unauthorized Server • IP address of any DHCP server that assigned an IP address to the DHCP client.
Detect
• Interfaces through which the DHCP relay agent receive DHCP requests.
The administrator can use this information to monitor and performs subsequent
actions for DHCP unauthorized servers. The device creates a record once for each
DHCP server for the administrator to determine unauthorized DHCP servers. After the
information of recorded DHCP servers is cleared, the relay agent will record server
information again.
Enable or disable periodic refresh of dynamic client entries, and set the refresh
interval.
Through the DHCP relay agent, a DHCP client sends a DHCP-RELEASE unicast
Dynamic Bindings message to the DHCP server to relinquish its IP address. The DHCP relay agent
Refresh conveys the message to the DHCP server, but does not remove the IP address from
dynamic client entries. To solve this problem, use the periodic refresh of dynamic
client entries feature.
When this feature is enabled, the DHCP relay agent uses the IP address of a client
and the MAC address of the DHCP relay agent interface to periodically send a
DHCP-REQUEST message to the DHCP server.
• If the server returns a DHCP-ACK message or does not return any message within
a specified interval, which means that the IP address is assignable, the DHCP
relay agent will age out the client entry.
Track Timer Interval
• If the server returns a DHCP-NAK message, which means the IP address is still in
use, the relay agent will not age it out.
If the Auto option is selected, the refresh interval is calculated by the relay agent
according to the number of client entries.
190
2. Click the DHCP Relay tab to enter the page shown in Figure 172.
3. In the Server Group field, click Add to enter the page shown in Figure 174.
Figure 174 Creating a server group
Item Description
Enter the ID of a DHCP server group.
Server Group ID
You can create up to 20 DHCP server groups.
191
Table 72 Configuration items
Item Description
Interface Name This field displays the name of a specific interface.
192
Table 73 Configuration items
Item Description
IP Address Enter the IP address of a DHCP client.
Required.
Specify an interface as trusted and configure DHCP snooping to support
Option 82.
By default, an interface is untrusted and DHCP snooping does not support
2. Configuring DHCP snooping
Option 82.
functions on an interface
IMPORTANT:
You need to specify the ports connected to the authorized DHCP servers as
trusted to make sure DHCP clients can obtain valid IP addresses. The trusted
port and the port connected to the DHCP client must be in the same VLAN.
3. Displaying clients' IP-to-MAC Optional.
bindings Display clients' IP-to-MAC bindings recorded by DHCP snooping.
193
Figure 178 Enabling DHCP snooping
Item Description
Interface Name This field displays the name of a specific interface.
194
Item Description
Interface State Configure the interface as trusted or untrusted.
Select the handling strategy for DHCP requests containing Option 82. The strategies
include:
• Drop—The message is discarded if it contains Option 82.
Option 82 Strategy
• Keep—The message is forwarded without its Option 82 being changed.
• Replace—The message is forwarded after its original Option 82 is replaced with
the Option 82 padded in normal format.
4. View clients' IP-to-MAC bindings recorded by DHCP snooping, as described in Table 75.
Table 75 Configuration items
Item Description
IP Address This field displays the IP address assigned by the DHCP server to the client.
MAC Address This field displays the MAC address of the client.
Interface Name This field displays the device interface to which the client is connected.
VLAN This field displays the VLAN to which the device belongs.
Remaining Lease Time This field displays the remaining lease time of the IP address.
195
DHCP configuration examples
DHCP server configuration example
Network requirements
As shown in Figure 181, the DHCP client on subnet 10.1.1.0/24 obtains an IP address dynamically from
the DHCP server (AC). The IP address of VLAN-interface 2 of the AC is 10.1.1.1/24.
In subnet 10.1.1.0/24, the address lease duration is ten days and twelve hours and the gateway address
is 10.1.1.1.
Figure 181 Network diagram
Configuration procedure
1. Enable DHCP:
a. Select Network > DHCP from the navigation tree to enter the default DHCP Server page.
b. Select the Enable option for DHCP Service.
196
Figure 182 Enabling DHCP
2. Enable the DHCP server on VLAN-interface 2: (This operation can be omitted because the DHCP
server is enabled on the interface by default.)
a. In the Interface Config field, click the icon of VLAN-interface 2.
b. Select the Enable option for DHCP Server.
c. Click Apply.
Figure 183 Enabling the DHCP server on VLAN-interface 2
197
c. Enter 10 days 12 hours 0 minutes 0 seconds for Lease Duration, and enter 10.1.1.1 for
Gateway Address.
d. Click Apply.
Figure 184 Configuring a dynamic address pool for the DHCP server
Configuration procedure
Because the DHCP relay agent and server are on different subnets, you must configure a static route or
dynamic routing protocol so they can communicate.
1. Enable DHCP:
a. Select Network > DHCP from the navigation tree.
b. Click the DHCP Relay tab.
c. Select the Enable option for DHCP Service.
198
d. Click Apply.
Figure 186 Enabling DHCP
199
b. Select the Enable option for DHCP Relay, and select 1 for Server Group ID.
c. Click Apply.
Figure 188 Enabling the DHCP relay agent on an interface and correlate it with a server group
GE3/0/1 GE3/0/2
Host AP AC
DHCP server
DHCP client DHCP client DHCP snooping
Configuration procedure
1. Enable DHCP snooping:
a. Select Network > DHCP from the navigation tree.
b. Click the DHCP Snooping tab.
c. Select the Enable option for DHCP Snooping.
200
Figure 190 Enabling DHCP snooping
201
Figure 192 Displaying clients' IP-to-MAC bindings
202
Configuring link aggregation and LACP
Overview
Link aggregation aggregates multiple physical Ethernet ports into one logical link, also called an
aggregation group.
It allows you to increase bandwidth by distributing traffic across the member ports in the aggregation
group. In addition, it provides reliable connectivity because these member ports can dynamically back
up each other.
Support for link aggregation depends on the device model. For more information, see "About the
Web-based configuration guide for HP unified wired-WLAN products."
Aggregation group
An aggregation group is a collection of Ethernet interfaces. When you create an aggregate interface, an
aggregation group numbered the same is automatically created.
The creation of a Layer 2 aggregate interface leads to the creation of a Layer 2 aggregation group. You
can assign only Layer 2 Ethernet interfaces to the group.
LACP protocol
The Link Aggregation Control Protocol (LACP) is defined in IEEE 802.3ad. It uses LACPDUs for
information exchange between LACP-enabled devices.
LACP is automatically enabled on interfaces in a dynamic aggregation group. An LACP-enabled
interface sends LACPDUs to notify the remote system (the partner) of its system LACP priority, system MAC
address, LACP port priority, port number, and operational key. Upon receiving an LACPDU, the partner
compares the received information with the information received on other interfaces, and then
determines the interfaces that can operate as Selected interfaces. This allows the two systems to reach an
agreement on which link aggregation member ports should be placed in Selected state.
203
Operational key
An operational port is a configuration set that link aggregation control automatically assigns each port
based on port attributes when aggregating ports. The configuration set contains the port rate, duplex
mode, and link state configuration.
In an aggregation group, all Selected ports are assigned the same operational key.
Class-two configurations
The contents of class-two configurations are listed in Table 76. In an aggregation group, if the class-two
configurations of a member port are different than those of the aggregate interface, the member port
cannot be a Selected port.
Table 76 Class-two configurations
Type Considerations
Whether a port has joined an isolation group, and the isolation group to which the
Port isolation
port belongs.
Permitted VLAN IDs, default VLAN, link type (trunk, hybrid, or access), IP
VLAN
subnet-based VLAN configuration, protocol-based VLAN configuration, tag mode.
MAC address learning capability, MAC address learning limit, forwarding of frames
MAC address learning with unknown destination MAC addresses after the upper limit of the MAC address
table is reached.
Some configurations are called class-one configurations. Such configurations, for example, MSTP, can
be configured on aggregate interfaces and member ports. However, these configurations are not
involved in operational key calculation.
Changing class-two configuration might affect the Select state of link aggregation member ports and the
ongoing service. To prevent unconsidered changes, the system displays a warning when you attempt to
change a class-two setting. You can decide whether to continue your change operation.
204
• Static aggregation limits the number of Selected ports in an aggregation group. When the upper
limit is not reached, all the candidate selected ports become Selected ports. When the upper limit
is exceeded, the system sets the candidate selected ports with larger port numbers to Unselected
state to keep the number of Selected ports in the correct range.
• If all member ports are down, the system sets their states to Unselected.
• The system sets the ports that cannot aggregate with the reference port due to hardware constraints
to the Unselected state. An example of hardware constraints is inter-board aggregation restriction.
When the number of Selected ports reaches the upper limit, a port joining the aggregation group will not
be placed in Selected state. This can prevent the ongoing traffic on the current Selected ports from being
interrupted. However, you should avoid the situation because this might cause the Selected/Unselected
state of a port to change after a reboot.
Guidelines
The following guidelines apply to static and dynamic aggregation modes:
• The maximum number of Selected ports allowed in an aggregation group depends on the device
model.
205
• In an aggregation group, a candidate Selected port must have the same port attributes and
class-two configurations as the reference port. To keep these configurations consistent, you should
configure the port correctly.
• Changing port attributes or class-two configuration for a port might change the Select state of the
port and other member ports. This might affect services. HP recommends that you do change
operations with caution.
Configuration guidelines
When you configure a link aggregation group, follow these guidelines:
• In an aggregation group, a candidate Selected port must have the same port attributes and
class-two configurations as the reference port. To keep these configurations consistent, you should
configure the port correctly.
• For a reference port, it is selected from the up ports that have the same class-two configurations as
the associated aggregate interface. These ports are selected in the order of full duplex/high speed,
full duplex/low speed, half duplex/high speed, and half duplex/low speed. If two ports have the
same duplex mode/speed pair, the one with the lower port number wins.
• Port attributes contain port rate, duplex mode, and link state. For more information about class-two
configurations, see "Class-two configurations."
• To provide successful static aggregation, make sure the ports at the two ends of each aggregated
link have the same Selected/Unselected state. To provide successful dynamic aggregation, make
sure the local ports and peer ports are both aggregated. In dynamic aggregation, the two ends can
automatically negotiate the Select state of the ports.
• Removing a Layer 2 aggregate interface also removes the associated aggregation group.
Meanwhile, the member ports of the aggregation group, if any, are also removed from the
aggregation group.
• When a load-sharing aggregation group becomes a non-load-sharing aggregation group because
of insufficient load sharing resources, one of the following problems might have occurred:
The number of Selected ports of the actor is inconsistent with that of the partner, which might
result in incorrect traffic forwarding.
206
The peer port of a Selected port is an Unselected port, which might result in exceptions in
upper-layer protocol and traffic forwarding.
Optional.
Displaying aggregate interface information. Perform this task to view detailed information of an existing
aggregation group.
Optional.
Displaying aggregate interface information. Perform this task to view detailed information of an existing
aggregation group.
Optional.
Perform this task to set LACP priority for the local system and link
aggregation member ports.
Setting LACP priority. Changes of LACP priorities affect the Selected/Unselected state
of link aggregation member ports.
The default port LACP priority and system LACP priority are both
32768.
207
Task Remarks
Optional.
Displaying LACP-enabled port information. Perform this task to view detailed information of LACP-enabled
ports and the corresponding remote (partner) ports.
Item Description
Enter Link Aggregation Assign an ID to the link aggregation group to be created.
Interface ID You can view the result in the Summary area at the bottom of the page.
208
The Summary tab is displayed by default. The list on the upper part of the page displays
information about all the aggregate interfaces.
2. Select an aggregate interface from the list.
The list on the lower part of the page displays detailed information about the member ports of the
associated link aggregation group.
Figure 194 Displaying aggregate interface information
Field Description
Type and ID of the aggregate interface.
Aggregation interface
Bridge-Aggregation represents a Layer 2 aggregate interface.
209
Field Description
Reason why the state of a member port is Unselected. For a selected member
Reason for being Unselected
port, this field displays a hyphen (-).
3. In the Set LACP enabled port(s) parameters area, set the port priority, and select the desired ports.
4. Click Apply in the area.
Table 79 Configuration items
Item Description
Port Priority Set the LACP priority.
Select port(s) to Select the ports for which you want to set the LACP priority.
apply Port Priority You can set the LACP priority for both LACP-enabled ports and LACP-disabled ports.
5. In the Set global LACP parameters area, set the system priority.
6. Click Apply in the area.
210
Displaying LACP-enabled port information
1. Select Network > LACP from the navigation tree.
The Summary tab is displayed by default. The upper part of the page displays a list of all
LACP-enabled ports on the device and information about them. Table 80 describes the fields.
2. Select a port on the port list.
3. Click View Details.
Detailed information about the peer port appears on the lower part of the page. Table 81
describes the fields.
Figure 196 Displaying LACP-enabled port information
Field Description
Unit Member device ID in an IRF.
211
Field Description
Port Port where LACP is enabled.
Active state of the port. If a port is Selected, its state is active and the ID of the
State
aggregation group it belongs to will be displayed.
Field Description
Unit Number of the partner system.
212
Figure 197 Network diagram
Configuration procedure
You can create a static or dynamic link aggregation group to achieve load balancing.
Method 1: Create a static link aggregation group
1. Select Network > Link Aggregation from the navigation tree.
2. Click Create.
3. Configure static link aggregation group 1:
a. Enter link aggregation interface ID 1.
b. Select the Static (LACP Disabled) option for the aggregate interface type.
c. Select GigabitEthernet 1/0/1, GigabitEthernet 1/0/2, and GigabitEthernet 1/0/3.
4. Click Apply.
Figure 198 Creating static link aggregation group 1
213
7. Configure dynamic aggregation group 1:
a. Enter link aggregation interface ID 1.
b. Select the Dynamic (LACP Enabled) option for aggregate interface type.
c. Select GigabitEthernet 1/0/1, GigabitEthernet 1/0/2, and GigabitEthernet 1/0/3.
8. Click Apply.
Figure 199 Creating dynamic link aggregation group 1
214
Configuring DNS
Overview
Domain Name System (DNS) is a distributed database used by TCP/IP applications to translate domain
names into corresponding IP addresses. With DNS, you can use simple domain names in some
applications and the DNS server translates them into correct IP addresses.
There are two types of DNS services: static and dynamic. After a user specifies a name, the device checks
the local static name resolution table for an IP address. If no IP address is available, it contacts the DNS
server for dynamic name resolution, which takes more time than static name resolution. Therefore, to
improve efficiency, frequently queried name-to-IP address mappings are stored in the local static name
resolution table.
DNS proxy
A DNS proxy forwards DNS requests and replies between DNS clients and a DNS server.
A DNS client considers the DNS proxy as the DNS server and sends a DNS request to the DNS proxy.
The DNS proxy forwards the request to the designated DNS server, and conveys the reply from the DNS
server to the client.
The DNS proxy simplifies network management. When the DNS server address is changed, you only
need to change the configuration on the DNS proxy, instead of on each DNS client.
For more information about DNS, see Layer 3 Configuration Guide.
215
Recommended configuration procedure
Configuring static name resolution table
Step Remarks
Required.
Configuring static name resolution table By default, no host name-to-IP address mappings are
configured in the static domain name resolution table.
Required.
2. Adding a DNS server address
Not configured by default.
Optional.
3. Adding a domain name suffix
Not configured by default.
4. Clearing dynamic DNS cache Optional.
Required.
2. Adding a DNS server address
Not configured by default.
216
Figure 200 Static domain name resolution configuration page
2. Click Add.
Figure 201 Creating a static domain name resolution entry
Item Description
Host Name Configure the mapping between a host name and an IP address in the static domain
mane table.
Each host name corresponds to only one IP address. If you configure multiple IP
Host IP Address
addresses for a host name, the most recently configured IP address takes effect..
217
Figure 202 Dynamic domain name resolution configuration page
218
Figure 203 Adding a DNS server address
219
DNS configuration example
Network requirements
As shown in Figure 205:
• The IP address of the DNS server is 2.1.1.2/16 and the DNS server has a com zone, which stores the
mapping between domain name host and IP address 3.1.1.1/16.
• The AC serves as a DNS client, and uses dynamic domain name resolution.
Configure the AC so that the AC can access the host by using a simple domain name rather than an IP
address.
Figure 205 Network diagram
NOTE:
• Before performing the following configuration, make sure the AC and the host are reachable to each
another, and the IP addresses of the interfaces are configured. See Figure 205.
• This configuration might vary with DNS servers. The following configuration is performed on a PC
running Windows Server 2000.
220
Figure 206 Creating a zone
b. In the dialog box shown in Figure 208, enter host name host and IP address 3.1.1.1.
c. Click Add Host.
221
Figure 208 Adding a mapping between domain name and IP address
Configuring the AC
1. Enable dynamic domain name resolution.
a. Select Network > DNS from the navigation tree.
b. Click the Dynamic tab
c. Select the Enable option for Dynamic DNS.
d. Click Apply.
Figure 209 Enabling dynamic domain name resolution
222
a. Click Add IP in Figure 209 to enter the page for adding a DNS server IP address.
b. Enter 2.1.1.2 for DNS Server IP Address.
c. Click Apply.
Figure 210 Adding a DNS server address
223
Figure 212 Ping operation
224
Configuring DDNS
Support for DDNS depends on the device model. For more information, see "About the Web-based
configuration guide for HP unified wired-WLAN products."
Overview
DNS allows you to access nodes in networks using their domain names. However, it provides only the
static mappings between domain names and IP addresses. When you use a domain name to access a
node whose IP address has changed, your access fails because DNS leads you to the IP address where
the node no longer resides.
Dynamic Domain Name System (DDNS) dynamically updates the mappings between domain names
and IP addresses for DNS servers. Through DDNS, you can always access the latest IP address
corresponding to a domain name.
As shown in Figure 213, DDNS works on the client-server model.
• DDNS client—A device that needs the DNS server to update the mapping between the domain
name and IP address of the device dynamically. An Internet user typically uses a domain name to
access a server that provides application layer services, such as an HTTP server or an FTP server.
When the IP address of such a server changes, the server runs as a DDNS client. The DDNS client
sends a request to the DDNS server for updating the mapping between the domain name and the
IP address.
• DDNS server—Informs the DNS server of latest mappings. After receiving the mapping update
request from a DDNS client, the DDNS server tells the DNS server to re-map between the domain
name and the DDNS client's IP address. Therefore, the Internet users can use the same domain
name to access the DDNS client even if the IP address of the DDNS client has changed.
Figure 213 DDNS networking application
The DDNS update process does not have a unified standard and depends on the DDNS server that the
DDNS client contacts. The well-known DDNS service providers include www.3322.org, www.oray.cn
(also known as the PeanutHull server), and www.dyndns.com.
225
With the DDNS client configured, a device can dynamically update the latest mapping between its
domain name and IP address on the DNS server through DDNS servers at www.3322.org or
www.oray.cn for example.
Configuration prerequisites
• Visit the website of a DDNS service provider, register an account, and apply for a domain name for
the DDNS client. When the DDNS client updates the mapping between the domain name and the
IP address through the DDNS server, the DDNS server checks the following information:
Whether the account information is correct.
Whether the domain name to be updated belongs to the account.
• Specify the primary IP address and security zone for the interface configured with DDNS and make
sure the DDNS server and the interface can reach each other.
• Configure static or dynamic domain name resolution to translate the domain name of the DDNS
server into an IP address.
Configuration procedure
1. Select Network > DNS > DDNS from the navigation tree.
The DDNS configuration page appears, as shown in Figure 214.
Figure 214 DDNS configuration page
2. Click Add.
The page for creating a DDNS entry appears, as shown in Figure 215.
226
Figure 215 Creating a DDNS entry
Item Description
Domain Name Specify the DDNS entry name, which uniquely identifies the DDNS entry.
Server
Select the DDNS server provider, which can be 3322.org or PeanutHull.
Provider
227
Item Description
Specify the interval for sending DDNS update requests after DDNS update is
enabled.
IMPORTANT:
• A DDNS update request is immediately initiated when the primary IP address
Interval of the interface changes or the link state of the interface changes from Down
to Up, no matter whether the interval expires.
• If you specify the interval as 0 day-0 hour-0 minute, your device does not
periodically initiate any DDNS update request, but initiate a DDNS update
request when the primary IP address of the interface is changed or when the
link state of the interface changes from Down to Up.
Account Username Specify the username used for logging in to the DDNS server.
settings Password Specify the password used for logging in to the DDNS server.
228
Figure 216 Network diagram
www.3322.org
DDNS server
Dialer 1
IP network
AC
DDNS client
1.1.1.1
DNS server
Configuration prerequisite
Before configuring DDNS on the AC, complete the following tasks:
• Create an account at http://www.3322.org/ (account name: steven and password: nevets).
• Add the AC's host name-to-IP address mapping to the DNS server.
• Make sure the devices are reachable to each other.
Configuring the AC
1. Enable dynamic domain name resolution:
a. Select Network > DNS > Dynamic from the navigation tree.
b. Select the Enable option for Dynamic DNS, as shown in Figure 217.
c. Click Apply.
Figure 217 Enabling dynamic domain name resolution
229
2. Configure the DNS server IP address:
a. Select Network > DNS > Dynamic from the navigation tree.
The page for enabling dynamic domain name resolution appears, as shown in Figure 217.
b. Click Add IP.
c. Enter 1.1.1.1 for DNS Server IP Address, as shown in Figure 218.
d. Click Apply.
Figure 218 Configuring the DNS server IP address
3. Configure DDNS:
a. Select Network > DNS > DDNS from the navigation tree.
b. Click Add.
The page for configuring DDNS appears.
c. Enter 3322 for Domain Name, and select 3322.org from the Server Provider list.
d. Enter steven for Username, and enter nevets for Password.
e. Select Dialer 1 from the Associated Interface list, and enter whatever.3322.org for FQDN.
f. Click Apply.
230
Figure 219 Configuring DDNS
231
Configuring PPPoE
Support for PPPoE depends on the device model. For more information, see "About the Web-based
configuration guide for HP unified wired-WLAN products."
Overview
Point-to-Point Protocol over Ethernet (PPPoE) uses the client/server model. It establishes point-to-point links
over Ethernet, and encapsulates PPP packets in Ethernet frames.
APs configured as PPPoE clients can be connected to the Internet through a remote access device, and
access control and accounting can be implemented on a per-AP basis.
PPPoE undergoes two phases:
• Discovery phase—Where a PPPoE session is initiated. In this phase, the client obtains the MAC
address of the access end and generates the PPPoE session ID.
• PPP session phase—Where PPP packets are encapsulated in Ethernet frames before being sent to
the peer.
In the frame, the session ID must be the one determined in the discovery phase. The MAC address
must be that of the peer. The PPP packet section begins from the Protocol ID field. In the session
phase, either end of the link can terminate the session by sending PPPoE Active Discovery
Terminate (PADT) packets.
For more information about PPPoE, see RFC 2516.
Figure 220 PPPoE application scenario
Configuration guidelines
The dialer interfaces that you create on the page by selecting Device > Interface Management can also
be displayed on the PPPoE client page. On this page, you can modify or remove these dialer interfaces
as well. However, you cannot establish PPPoE sessions for them.
232
Configuring a PPPoE client
1. Select Network > PPPoE from the navigation tree.
The system automatically enters the Client page.
Figure 221 PPPoE client information
3. Configure the parameters for the PPPoE client, as described in Table 84.
4. Click Apply.
233
Table 84 Configuration items
Task Remarks
Dialer Interface Configure the number of the dialer interface.
Username Configure the username and password used by the PPPoE client in authentication.
Password The username and password must be configured together, or not configured at all.
234
Figure 223 Statistics
Field Description
Ethernet interface where the PPPoE session belongs. This field is null when the
Interface
PPPoE session is bundled with a VLAN interface.
Dropped Packets
Number of dropped packets which are received in the PPPoE session.
(Received)
Dropped Packets (Sent) Number of dropped packets which are transmitted in the PPPoE session.
235
Figure 224 Summary
Field Description
Session Number PPPoE session ID.
Dialer Interface
Number of the dialer interface corresponding to the PPPoE session.
Number
Ethernet interface where the PPPoE session belongs. This field is null when the PPPoE
Interface
session is bundled with a VLAN interface.
236
Configuring the PPPoE client
1. Configure the PPPoE client:
a. Select Network > PPPoE from the navigation tree. The system automatically enters the Client
page.
b. Click Add.
The page for creating a PPPoE client appears, as shown in Figure 226.
c. Enter 1 as the dialer interface name.
d. Enter user1 as the username.
e. Enter hello as the password.
f. Select PPP Negotiate for IP config.
g. Select Vlan-interface1 for Bundled Interface.
h. Select Always Online for Session Type.
i. Click Apply.
Figure 226 Creating a PPPoE client
237
1. Select Network > PPPoE from the navigation tree of the AC, and click the Session tab.
2. Select Summary Information for Information Type.
Figure 227 shows that the PPP session is completed.
Figure 227 Displaying the summary information of PPPoE of sessions
238
Managing services
Overview
The service management module provides the following types of services: FTP, Telnet, SSH, SFTP, HTTP
and HTTPS. You can enable or disable the services as needed to enhance the performance and security
of the system, and achieve secure management of the device.
To prevent attacks of illegal users on services, the service management module allows you to do the
following configurations:
• Modify HTTP and HTTPS port numbers.
• Associate the FTP, HTTP, or HTTPS service with an ACL.
FTP service
The File Transfer Protocol (FTP) is an application-layer protocol for sharing files between server and client
over a TCP/IP network.
Telnet service
The Telnet protocol is an application layer protocol that provides remote login and virtual terminal
functions on the network.
SSH service
Secure Shell (SSH) offers an approach to securely log in to a remote device. It protects devices against
attacks such as IP spoofing and plain text password interception using encryption and authentication.
SFTP service
The secure file transfer protocol (SFTP) is a new feature in SSH2.0. SFTP uses the SSH connection to
provide secure data transfer. The device can serve as the SFTP server, allowing a remote user to log in to
the SFTP server for secure file management and transfer. The device can also serve as an SFTP client,
enabling a user to login from the device to a remote device for secure file transfer.
HTTP service
The Hypertext Transfer Protocol (HTTP) is used for transferring Web page information across the Internet.
It is an application-layer protocol in the TCP/IP protocol suite.
You can log in to the device using the HTTP protocol with HTTP service enabled, accessing and
controlling the device with Web-based network management.
HTTPS service
The Hypertext Transfer Protocol Secure (HTTPS) refers to the HTTP protocol that supports the Security
Socket Layer (SSL) protocol.
The SSL protocol of HTTPS enhances the security of the device in the following ways:
• Uses the SSL protocol to ensure legal clients' secure access to the device and prohibit illegal clients.
• Encrypts the data exchanged between the HTTPS client and the device to ensure the data security
and integrity.
239
• Defines certificate attribute-based access control policy for the device to control the access right of
the client, to avoid attacks from illegal clients.
Item Description
Enable FTP Specify whether to enable the FTP service.
service The FTP service is disabled by default.
FTP Associate the FTP service with an ACL. Only the clients that pass the ACL
filtering are permitted to use the FTP service.
ACL
You can view this configuration item by clicking the expanding button in
front of FTP.
240
Item Description
Set the port number for HTTP service.
You can view this configuration item by clicking the expanding button in
Port Number front of HTTP.
IMPORTANT:
When you modify a port, make sure the port is not used by another service.
Associate the HTTP service with an ACL. Only the clients that pass the ACL
filtering are permitted to use the HTTP service.
ACL
You can view this configuration item by clicking the expanding button in
front of HTTP.
Select a local certificate for the HTTPS service from the Certificate
dropdown list.
You can configure the certificates available in the dropdown list in
Authentication > Certificate Management. For more information, see
"Managing certificates."
Certificate IMPORTANT:
• The service management, portal authentication, and local EAP service
modules always reference the same PKI domain. Changing the
referenced PKI domain in any of the three modules also changes the PKI
HTTPS domain referenced in the other two modules.
• If no certificate is specified, the HTTPS service generates its own
certificate.
IMPORTANT:
When you modify a port, make sure the port is not used by another service.
Associate the HTTPS service with an ACL. Only the clients that pass the ACL
filtering are permitted to use the HTTPS service.
ACL
You can view this configuration item by clicking the expanding button in
front of HTTPS.
241
Using diagnostic tools
Ping
You can use the ping function to check whether a device with a specified address is reachable, and to
examine network connectivity.
A successful execution of the ping command includes the following steps:
1. The source device sends an ICMP echo request (ECHO-REQUEST) to the destination device.
2. The destination device responds by sending an ICMP echo reply (ECHO-REPLY) to the source
device after receiving the ICMP echo request.
3. The source device displays related statistics after receiving the reply.
Output of the ping command includes the following:
• The ping command can be applied to the destination's host name or IP address. If the destination's
host name is unknown, the prompt information is displayed.
• If the source device does not receive an ICMP echo reply when the timeout timer expires, it displays
the prompt information and the statistics during the ping operation. Otherwise, it displays the
number of bytes of the echo reply, the message sequence number, Time to Live (TTL), the response
time, and the statistics during the ping operation. Statistics displayed during the ping operation
include number of packets sent, number of echo reply messages received, percentage of messages
not received, and the minimum, average, and maximum response time.
Trace route
By using the trace route command, you can display the Layer 3 devices involved in delivering a packet
from source to destination. In the event of network failure, this function can identify failed nodes.
The trace route command includes the following steps in its execution:
1. The source device sends a packet with a TTL value of 1 to the destination device.
2. The first hop (the Layer 3 device that first receives the packet) responds by sending a TTL-expired
ICMP message to the source, with its IP address encapsulated. In this way, the source device can
obtain the address of the first Layer 3 device.
3. The source device sends a packet with a TTL value of 2 to the destination device.
4. The second hop responds with a TTL-expired ICMP message, which gives the source device the
address of the second Layer 3 device.
5. This process continues until the ultimate destination device is reached. In this way, the source
device can trace the addresses of all the Layer 3 devices involved in reaching the destination
device.
The traceroute command can be applied to the destination's host name or IP address. If the destination's
host name is unknown, the prompt information is displayed.
242
Ping operation
IPv4 ping operation
1. Select Diagnostic Tools > Ping from the navigation tree to enter the IPv4 Ping configuration page.
2. Click the expansion button before Advanced Setup to display the configurations of the advanced
parameters of IPv4 ping operation.
Figure 229 IPv4 ping configuration page
3. Enter the IPv4 address or host name of the destination device in the Destination IP address or host
name field.
4. Set the advanced parameters for the IPv4 ping operation.
5. Click Start to execute the ping command.
6. View the result in the Summary field.
243
Figure 230 IPv4 ping operation results
244
4. Enter the IPv6 address or host name of the destination device in the Destination IP address or host
name field.
5. Set the advanced parameters for the IPv6 ping operation.
6. Click Start to execute the ping command.
7. View the result in the Summary field.
Figure 232 IPv6 ping operation results
245
Figure 233 Trace Route configuration page
246
Configuring NAT
Overview
Network Address Translation (NAT) provides a way to translate an IP address in the IP packet header to
another IP address. NAT enables a large number of private users to access the Internet by using a small
number of public IP addresses. NAT effectively alleviates the depletion of IP addresses.
A private IP address is used only in an internal network, and a public or external IP address is used on
the Internet and is globally unique.
According to RFC 1918, three blocks of IP addresses are reserved for private networks:
• Class A—10.0.0.0 through 10.255.255.255.
• Class B—172.16.0.0 through 172.31.255.255.
• Class C—192.168.0.0 through 192.168.255.255.
No host with an IP address in the above three ranges exists on the Internet. You can use those IP
addresses in an enterprise network freely without requesting them from an ISP or registration center.
In addition to translating private addresses to public addresses, NAT also performs address translation
between any two networks. In this document, the two networks refer to an internal network and an
external network. Generally a private network is an internal network, and a public network is an external
network.
Figure 235 shows the NAT operation.
Figure 235 NAT operation
Intranet Internet
192.168.1.3 1.1.1.2
Src : 1.1.1.2 Src : 1.1.1.2
Dst : 192.168.1.3 Dst : 20.1.1.1
1. The internal host at 192.168.1.3 sends an IP packet to the external server at 1.1.1.2 through the
NAT device.
2. After receiving the packet, the NAT device checks the IP header. Finding that the packet is destined
to the external network, the NAT device translates the private source IP address 192.168.1.3 to
the globally unique IP address 20.1.1.1. Then, it forwards the packet to the external server.
Meanwhile, the NAT device records the mapping between the two addresses in its NAT table.
3. The external server responds to the internal host with an IP packet whose destination IP address is
20.1.1.1. After receiving the packet, the NAT device performs the following actions:
a. Checks the IP header.
247
b. Looks up its NAT table for the mapping.
c. Replaces the destination address with the private address of 192.168.1.3.
d. Sends the new packet to the internal host.
The NAT operation is transparent to the terminals involved. The external server believes that the IP
address of the internal PC is 20.1.1.1 and is unaware of the private address 192.168.1.3. As a result, NAT
hides the private network from external networks.
Despite the advantages of allowing internal hosts to access external resources and providing privacy,
NAT has the following disadvantages:
• Because NAT involves translation of IP addresses, the IP headers cannot be encrypted. This is also
true to the application protocol packets when the contained IP address or port number needs to be
translated. For example, you cannot encrypt an FTP connection. Otherwise, its port command
cannot work correctly.
• Network debugging becomes more difficult. For example, when a host in a private network tries to
attack other networks, it is harder to pinpoint the attacking host because its internal IP address is
hidden.
NAT control
Typically, an enterprise allows some hosts in the internal network to access external networks and
prohibits others. The enterprise can achieve this through the NAT control mechanism. If a source IP
address is in the denied address list, the NAT device does not translate the address. In addition, the NAT
device only translates private addresses to specified public addresses.
You can achieve NAT control through an access control list (ACL) and an address pool.
• Only packets matching the ACL rules are served by NAT.
• An address pool is a collection of consecutive public IP addresses for address translation. You can
specify an address pool based on the number of available public IP addresses, the number of
internal hosts, and network requirements. The NAT device selects an address from the address pool
as the public address of an IP packet.
NAT implementation
Basic NAT
When an internal host accesses an external network, NAT uses an external or public IP address to
replace the original internal IP address. As shown in Figure 235, NAT uses the IP address of the outbound
interface on the NAT device. All internal hosts use the same external IP address to access external
networks and only one host can access external networks at a given time.
A NAT device can also hold multiple public IP addresses to support concurrent access requests.
Whenever a new external network access request comes from the internal network, NAT performs the
following actions:
1. Chooses an available public IP address (if any) to replace the source IP address.
2. Forwards the packet.
3. Records the mapping between the two addresses.
In this way, multiple internal hosts can access external networks simultaneously.
248
The number of public IP addresses that a NAT device needs is usually less than the number of internal
hosts because not all internal hosts access external networks simultaneously. The number of public IP
addresses is related to the number of internal hosts that might access external networks simultaneously
during peak hours.
NAPT
Network Address Port Translation (NAPT) is a variation of basic NAT. It allows multiple internal addresses
to be mapped to the same public IP address, which is called multiple-to-one NAT.
NAPT mapping is based on both the IP address and the port number. With NAPT, packets from multiple
internal hosts are mapped to the same external IP address with different port numbers.
Figure 236 NAPT operation
192.168.1.3
As shown in Figure 236, three IP packets arrive at the NAT device. Packets 1 and 2 are from the same
internal address but have different source port numbers. Packets 1 and 3 are from different internal
addresses but have the same source port number. NAPT maps their source IP addresses to the same
external address but with different source port numbers. Therefore, the packets can still be discriminated.
When response packets arrive, the NAT device can forward them to corresponding hosts based on the
destination addresses and port numbers.
NAPT can better utilize IP address resources, enabling more internal hosts to access the external network
at the same time.
Easy IP
Easy IP uses the public IP address of an interface on the device as the translated source address to save
IP address resources. It also uses ACLs to permit only certain internal IP addresses to be NATed.
Internal server
NAT hides the internal network structure and the identities of internal hosts. However, some internal hosts
such as an internal Web server or FTP server might need to be accessed by external hosts. NAT satisfies
this need by supporting internal servers.
You can configure an internal server on the NAT device by mapping a public IP address and port number
to the internal server's private IP address and port number. For example, you can configure an address
like 20.1.1.12:8080 as an internal Web server's external address and port number.
249
In Figure 237, when the NAT device receives a packet destined for the public IP address of the internal
server, it performs the following actions:
1. Looks up the NAT entries.
2. Translates the destination address and port number in the packet to the private IP address and port
number of the internal server.
When the NAT device receives a response packet from the internal server, it translates the source private
IP address and port number of the packet into the public IP address and port number of the internal
server.
Figure 237 Internal server operation
Intranet Internet
192.168.1.3 1.1.1.2
Src : 192.168.1.3:8080 Src : 20.1.1.1:8080
DNS mapping
Generally, the DNS server and users that need to access internal servers reside on the public network.
You can specify an external IP address and a port number for an internal server on the public network
interface of a NAT device. Thus, external users can access the internal server using its domain name or
pubic IP address. As shown in Figure 238, an internal host wants to access an internal Web server by
using its domain name, and the DNS server is located on the public network. Typically, the DNS server
replies with the public address of the internal server to the host and thus the host cannot access the
internal server. The DNS mapping feature can solve the problem.
Figure 238 Diagram for NAT DNS mapping operation
A DNS mapping entry records the domain name, public address, public port number, and protocol type
of an internal server. After receiving a DNS reply, the NAT-enabled interface matches the domain name
in the message against the DNS mapping entries. If a match is found, the interface replaces the public
IP address in the reply with the private IP address of the internal server. Then, the host can use the private
address to access the internal server.
250
Low-priority address pool
An address pool is a set of consecutive public IP addresses used for dynamic NAT. A NAT gateway
selects addresses from the address pool and uses them as the translated source IP addresses.
To implement NAT for stateful failover (asymmetric-path), you must configure the same address pool on
both devices so that one device can take over when the other device fails. However, if the two devices
select the same IP address from their address pool and assign the same port number, reverse sessions on
the two devices are the same. As a result, they cannot back up session data.
To solve the problem, the low-priority address pool attribute is introduced to NAT. Configure a
non-low-priority address pool on a device and configure a low-priority address pool on the other device.
The two address pools have the same address range, but have different port number ranges so that the
devices can back up session data.
For more information about stateful failover, see "Configuring stateful failover."
Configuration guidelines
When you configure address pools, follow these guidelines:
• On certain types of devices, an address pool cannot include the following IP addresses:
IP addresses in other address pools.
IP addresses of interfaces with Easy IP enabled.
Public IP addresses of internal servers.
• Low-priority address pools cannot include IP addresses in non low-priority address pools, external
IP addresses for one-to-one NAT, and public IP addresses of internal servers.
• The address pool, dynamic NAT, static NAT, and internal server configurations can be modified
through Web pages. The modification you make takes effect after the former configuration is
removed by the system.
Dynamic NAT
A dynamic NAT entry is generated dynamically. Dynamic NAT is implemented by associating an ACL
with an address pool (or the address of an interface in the case of Easy IP). This association defines what
packets can use the addresses in the address pool (or the interface's address) to access the external
network. Dynamic NAT is applicable when a large number of internal users must access external
networks. An IP address is selected from the associated address pool to translate an outgoing packet.
After the session terminates, the selected IP address is released.
251
Table 88 Dynamic NAT configuration task list
Task Remarks
Creating an address pool Required for configuring NAPT and many-to-many NAT.
Required.
Configuring dynamic NAT
Configure dynamic NAT on an interface.
Static NAT
Mappings between external and internal network addresses are manually configured. Static NAT can
meet fixed access requirements of a few users.
Table 89 Static NAT configuration task list
Task Remarks
Required.
Creating a static address mapping
Static NAT supports two modes, one-to-one and net-to-net.
Required.
Enabling static NAT on an interface
Configure static NAT on an interface.
Configuring an internal server After you map the private IP address/port number of an internal server to a
public IP address/port number, hosts in external networks can access the
server located in the private network.
Optional.
Configuring a DNS mapping The DNS mapping feature enables an internal host to use the domain name
to access an internal server located on the same private network, while the
DNS server resides on the public network.
252
Figure 239 Dynamic NAT
TIP:
You can click the ID link of an ACL to view details about the ACL, and create and delete ACL rules. For
more information about ACL configuration, see "Configuring ACLs."
Item Description
Index Specify the index of an address pool.
253
Item Description
Configure the address pool as a low-priority or a non low-priority address pool.
Item Description
Interface Specify an interface on which dynamic NAT is to be enabled.
ACL IMPORTANT:
On some devices, the rules of an ACL applied to an interface cannot conflict with one
another. Rules with the same source IP address, destination IP address, and VPN instance
are considered as a conflict. In a basic ACL (numbering 2000 to 2999), rules with the
same source IP address and VPN instance are considered as a conflict.
254
Item Description
Select an address translation mode:
• PAT—Refers to NAPT. In this mode, associating an ACL with an address pool
translates both IP addresses and port numbers.
• No-PAT—Refers to many-to-many NAT. In this mode, associating an ACL with an
Address Transfer
address pool translates only IP addresses.
• Easy IP—In this mode, the NAT gateway directly uses an interface's public IP address
as the translated IP address, and uses an ACL to match IP packets.
Only one mode can be selected for an address pool.
255
2. Click Add in the Static Address Mapping area.
The Add Static Address Mapping page appears.
Figure 243 Adding static address mapping
Item Description
Internal IP Address Enter an internal IP address for the static address mapping.
Global IP Address Enter a public IP address for the static address mapping.
256
3. Enable static NAT on an interface, as described in Table 93.
4. Click Apply.
Table 93 Configuration items
Item Description
Interface Name Select an interface to which static NAT is applied.
Enable track to VRRP Configure whether to associate static NAT on an interface with a VRRP group, and
specify the VRRP group to be associated.
When two network devices implement both stateful failover and dynamic NAT, to
VRRP Group
ensure normal switchovers between the two devices, you need to add the devices to
the same VRRP group, and associate dynamic NAT with the VRRP group.
257
Figure 246 Adding an internal server
258
3. Click Apply.
Table 94 Configuration items
Item Description
Interface Specify an interface to which the internal server policy is applied.
Specify the internal port number of the internal server. (Only available in advanced
configuration.)
Internal Port This option is available when 6(TCP) or 17(UDP) is selected for the protocol type. If you
enter 0 in the field, all types of services are provided. This configuration indicates a
static connection between internal addresses and external addresses.
259
Item Description
Configure whether to associate the internal server on an interface with a VRRP group,
Enable track to VRRP and specify the VRRP group to be associated.
When two network devices deliver both stateful failover and dynamic NAT, follow these
guidelines:
• Make sure the public address of an internal server on an interface is associated with
only one VRRP group. Otherwise, the system associates the public address with the
VRRP Group VRRP group having the highest group ID.
• To ensure normal switchovers between the two devices, you need to add the devices
to the same VRRP group, and associate dynamic NAT with the VRRP group.
Item Description
Protocol Select the protocol supported by an internal server.
260
NAT configuration examples
Address translation configuration example
Network requirements
As shown in Figure 249, a company has three public IP addresses ranging from 202.38.1.1/24 to
202.38.1.3/24, and a private network segment of 10.110.0.0/16. Specifically, the company requires
that the internal users on subnet 10.110.10.0/24 can access the Internet through NAT.
Figure 249 Network diagram
Configuring the AC
1. Configure an ACL 2001 to permit internal users in subnet 10.110.10.0/24 to access the Internet:
a. Select QoS > ACL IPv4 from the navigation tree.
b. Click Add.
c. Enter 2001 for ACL Number, as shown in Figure 250.
d. Click Apply.
Figure 250 Defining ACL 2001
261
Figure 251 Configuring ACL 2001 to permit users on network 10.110.10.0/24 to access the
Internet
2. Configure a NAT address pool 0, including public addresses of 202.38.1.2 and 202.38.1.3.
a. Select Network > NAT from the navigation tree.
The Dynamic NAT page appears.
b. Click Add in Address Pool.
The Add NAT Address Pool page appears, as shown in Figure 253.
c. Enter 0 for Index, enter 202.38.1.2 for Start IP Address, and enter 202.38.1.3 for End IP
Address.
d. Click Apply.
262
Figure 253 Configuring NAT address pool 0
263
• External hosts can access internal servers using public address 202.38.1.1/24.
• Port 8080 is used for Web server 2.
Figure 255 Network diagram
264
2. Configure Web server 1:
a. Click Add in the Internal Server area.
The Add Internal Server page appears.
b. Select Vlan-interface2 for Interface
c. Select the Assign IP Address option, and enter 202.38.1.1.
d. Select the first option for Global Port and enter 80.
e. Enter 10.110.10.1 for Internal IP.
f. Select www for Service Type.
g. Click Apply.
Figure 257 Configuring internal Web server 1
265
Figure 258 Configuring internal Web server 2
266
Configuring ALG
Application Level Gateway (ALG) processes the payload information of application layer packets to
make sure data connections can be established.
Usually, NAT translates only IP address and port information in packet headers and does not analyze
fields in application layer payloads. However, the packet payloads of some protocols may contain IP
address or port information, which might cause problems if not translated. For example, an FTP
application involves both data connection and control connection, and data connection establishment
dynamically depends on the payload information of the control connection.
ALG can work with NAT and ASPF to implement the following functions:
• Address translation—Resolves the source IP address, port, protocol type (TCP or UDP), and remote
IP address information in packet payloads.
• Data connection detection—Extracts information required for data connection establishment and
establishing data connections for data exchange.
• Application layer status checking—Inspects the status of the application layer protocol in packets.
Packets with correct states have their status updated and are sent for further processing, whereas
packets with incorrect states are dropped.
Support for these functions depends on the application layer protocol.
ALG can process the following protocol packets:
• DNS
• FTP
• ILS
• MSN/QQ
• NBT
• PPTP
• RTSP
• SCCP
• SIP
• SQLNET, a language in Oracle
• TFTP
ALG process
The following example describes the FTP operation of an ALG-enabled device.
As shown in Figure 259, the host on the external network accesses the FTP server on the internal network
in passive mode through the ALG-enabled device.
267
Figure 259 ALG-enabled FTP application in passive mode
Inside network Outside network
NAT
FTP_CMD(“PASV”)
FTP_CMD(“PASV”)
FTP_EnterPassive(“IP1, Port1”)
ALG
IP1, Port1-------> IP2, Port2
FTP_EnterPassive(“IP2, Port2”)
FTP_Connet(IP2, Port2)
FTP_Connet(IP1, Port1)
268
Configuration procedure
By default, ALG is enabled for all protocols.
To enable ALG for protocols:
1. Select Network > ALG from the navigation tree.
The Application Layer Inspection page appears.
Figure 260 ALG configuration
2. Add target application protocols to the Selected Application Protocols list to enable ALG for them.
3. Click Apply.
269
Figure 261 Network diagram
Internet
192.168.1.1/24 Vlan-int1
5.5.5.1/24
FTP server AC Host
Local: 192.168.1.2
Global: 5.5.5.10
Configuration procedure
1. Enable ALG for FTP. (By default, ALG is enabled for FTP, and this step can be skipped.)
a. Select Network > ALG from the navigation tree.
b. Add ftp to the Selected Application Protocols list, as shown in Figure 262.
c. Click Apply.
Figure 262 Enabling ALG for FTP
270
Figure 263 Adding basic ACL
271
Figure 265 Adding a NAT address pool
272
g. Enter 192.168.1.2 for Internal IP.
h. Select ftp for Service Type.
i. Click Apply.
Figure 267 Adding an internal FTP server
Configuration procedure
1. Enable ALG for SIP. (By default, ALG is enabled for SIP, and this step can be skipped.)
a. Select Network > ALG from the navigation tree.
b. Add sip to the Selected Application Protocols list, as shown in Figure 269.
273
c. Click Apply.
Figure 269 Enabling ALG for SIP
274
Figure 271 Configuring an ACL rule to permit packets sourced from 192.168.1.0/24
275
Figure 273 Adding a NAT address pool
276
• The WINS server uses 5.5.5.10 as its external IP address.
• Host B can access the WINS server and Host A by using host names.
Figure 275 Network diagram
Configuration procedure
1. Enable ALG for NBT. (By default, ALG is enabled for NBT, and this step can be skipped.)
a. Select Network > ALG from the navigation tree.
b. Add nbt to the Selected Application Protocols list.
c. Click Apply.
Figure 276 Enabling ALG for NBT
277
e. Enter 5.5.5.9 for Global IP Address.
f. Click Apply.
Figure 277 Adding a static address mapping
278
Figure 279 Configuring an internal WINS server
j. Click Add in the Internal Server area. Configure an interval WINS server, which is similar to
the configuration shown in Figure 279.
k. Click Advanced Configuration.
l. Select Vlan-interface2 for Interface.
m. Select 17(UDP) as the protocol type.
n. Enter 5.5.5.10 as the external IP address and 138 as the global port.
o. Enter 192.168.1.2 as the internal IP address and 138 as the internal port.
p. Click Apply.
q. Click Add in the Internal Server area. Configure an interval WINS server, which is similar to
the configuration shown in Figure 279.
r. Click Advanced Configuration.
s. Select Vlan-interface2 for Interface.
t. Select 6(UDP) as the protocol type.
u. Enter 5.5.5.10 as the external IP address, and 139 as the global port.
v. Enter 192.168.1.2 as the internal IP address, and 138 as the internal port.
w. Click Apply.
279
Configuring APs
AC-AP tunnel
As shown in Figure 280, an AC and an AP establish a data tunnel to forward data packets and a control
tunnel to forward control packets used for AP configuration and management. The AC can automatically
configure and manage APs based on the information provided by the administrator.
Figure 280 Network diagram
Auto AP
The auto AP feature enables an AC to automatically associate with APs. It can greatly reduce your
workload when you deploy a wireless network with many APs.
You can enable auto AP in the following ways:
• Specify an auto-AP template and enable the auto-AP function.
After you create an auto-AP template on the AP > AP Setup page and enable the auto-AP function,
the AC automatically associates with the APs of the model specified in the template, names the APs
by using their MAC addresses, and assigns configurations in the template to APs. Clients can
associate with auto APs but the administrator cannot change the configuration of auto APs.
• Enable the auto-AP function.
After you enable the auto-AP function, the AC automatically associates with all APs and names the
APs by using their MAC addresses. Clients can associate with the auto APs but the administrator
cannot change the configuration of the auto APs.
AP group
Overview
AP group enables you to configure multiple APs at a time, which reduces your workload.
If you do not create any AP groups, the system takes the AP group named default_group as the default
AP group. All APs created belong to the default AP group by default. You can modify but not delete the
default AP group.
You can add APs with the same configurations or in the same subnet to the same AP group. The APs use
the configuration of the AP group. If you add an auto AP template into a non-default AP group, the auto
APs getting online through the template belong to the group. The auto APs use the configuration of the AP
group to which the auto AP template belongs.
280
When you delete an AP from an AP group (equal to adding the AP to the default AP group) or add an
AP to an AP group, the AP restarts, and clears its configuration except the serial number. After the AP is
added to the new AP group, the AP uses the configuration of the new AP group.
The following operations might fail on some member APs:
• Select 5 GHz wireless services.
• Select 2.4 GHz wireless services.
• Enable a 5 GHz radio.
• Enable a 2.4 GHz radio.
• Set a working mode.
• Set a country/region code.
RADIUS server
AP 1 Client 1
Internet AP 2 Client 2
AC
AP 3
Client 3
Configuring an AP
Creating an AP
1. Select AP > AP Setup from the navigation tree.
2. Click Add.
281
Figure 282 Adding an AP
Item Description
AP Name Set the AP name.
Model AP model.
Setting AP parameters
1. Select AP > AP Setup from the navigation tree.
282
Figure 283 AP setup
Item Description
AP Name Rename the AP.
IMPORTANT:
Country/Region Some ACs and APs have fixed country/region codes, whichever is used is determined as
Code follows:
• An AC's fixed country/region code cannot be changed, and all managed APs
whose country/region codes are not fixed must use the AC's fixed country/region
code.
• An AP's fixed country/region code cannot be changed and the AP can only use the
country/region code.
If an AC and a managed AP use different fixed country/region codes, the AP uses its
own fixed country/region code.
Radio Number Select the number of the radios on the AP. The value depends on the AP model.
283
Item Description
Select the radio type, which can be one of the following values:
• 802.11a.
• 802.11b.
Radio Type • 802.11g.
• 802.11n (2.4 GHz)
• 802.11n (5 GHz)
The value depends on the AP model and radio type.
284
Figure 284 Advanced setup
Item Description
AP connection priority.
AP Connection Specify the AP connection priority on the AC. A greater value represents a high priority.
Priority This option needs to be used together with the AC backup function. For more
information about AC backup, see "Configuring advanced settings."
• Enable—Enable the AP to respond to broadcast probe requests. The AP will respond
to broadcast probe requests with the SSID null.
Broadcast Probe
• Disable—Disable the AP from responding to broadcast probe requests. The AP will
reply
respond to broadcast probe requests with the specified SSID.
By default, this option is enabled.
285
Item Description
Specify a name for the configuration file (the file must exist in the storage medium of the
AC) and map the specified configuration file to the AP. The configuration file takes effect
when the tunnel is in Run state. When the configuration file takes effect, the AP uses the
commands in the configuration file, but does not save the configuration.
When local forwarding is enabled, you can use the configuration file to configure the
Configuration File AP. For example, when you configure a user profile when local forwarding is enabled,
you must write the user profile, QoS policy, and ACL commands to the configuration
file, and download the configuration file to the AP. For more information about local
forwarding, see "Configuring access service."
IMPORTANT:
The commands in the configuration file must be in their complete form.
Allow the AP to send jumbo frames to the AC and set the maximum size of jumbo
frames.
When this function is enabled, the AP can send frames whose size does not exceed the
Jumbo Frame Size
maximum size to the AC. If this field is not specified, the AP cannot send jumbo frames
to the AC.
By default, the AP cannot send jumbo frames to the AC.
Maximum interval for which the link between the AP and a client can be idle. A
Client Free Time
connection that remains idle for the specified period of time is removed.
Backup AC IPv4 Set the IPv4 address of the backup AC • You can set both the IPv4 and IPv6
Address for the AP. addresses of the backup AC for the AP.
• If you configure the global backup AC
information both in Advanced Setup > AC
Backup and AP > AP Setup, the
Backup AC IPv6 Set the IPv6 address of the backup AC configuration in AP > AP Setup takes
Address for the AP. precedence. For more information about
AC backup, see "Configuring advanced
settings."
286
Item Description
Remote AP provides a wireless solution for remote branches and offices. It enables you
to configure and control remote APs from the headquarters over the Internet without
deploying an AC in each office or branch.
As shown in the figure below, the AC manages the remote APs over the Internet. The AP
automatically enables local forwarding (whether or not local forwarding is configured
on the AC) to provide wireless access for logged-in clients when the tunnel between the
AP and AC is terminated. However, it does not allow new clients. When a tunnel is
established between the AP and AC again, the AP automatically switches to centralized
forwarding mode and logs off all clients on the remote AP.
Remote AP
IMPORTANT:
• If an AP establishes tunnels with both the primary AC and a backup AC, it uses the
backup tunnel to provide wireless access for logged-in clients when the primary
tunnel fails. For more information about AC backup, see "Configuring advanced
settings."
• The remote AP and mesh functions cannot be used simultaneously.
• Enable—Enable band navigation.
Band Navigation • Disable—Disable band navigation.
By default, band navigation is disabled.
Enable CAR for the AP to avoid frequent reboots caused by excessive traffic.
AP CAR Select this box to configure the CIR and CBS for the AP.
By default, CAR is not enabled for an AP.
287
Item Description
• Enable—Enable Bonjour gateway for the AP.
• Disable—Disable Bonjour gateway for the AP.
By default, Bonjour gateway is enabled for the AP.
Bonjour Gateway
Bonjour gateway takes effect only after you enable it both globally and for an AP. You
can enable Bonjour gateway for the AP on the AP > AP Setup or AP > AP Group page,
and enable Bonjour gateway globally on the Advanced Setup > Bonjour Gateway
page.
Apply the specified Bonjour policy. For more information, see "Configuring advanced
Bonjour Policy
settings."
Configuring auto AP
You can enable an AP to connect to an AC by configuring the serial ID of the AP, specifying an auto-AP
template, or enabling the auto AP function. The priorities of these configurations are in descending order.
For example, if you configure the serial ID of an AP and enable the auto AP function, the AP gets online
as a configured AP.
Enabling auto AP
You can enable auto AP in the following ways:
• Specify an auto-AP template and enable the auto-AP function.
a. On the page for adding an AP, select the AP model and select Auto from the Serial ID list.
Do not use the MAC address of an AP as the AP name because the AC names auto APs by
using their MAC addresses.
b. Enable the auto AP function.
• Enable the auto-AP function.
a. Select AP > Auto AP from the navigation tree.
288
Figure 285 Configuring auto AP
Item Description
• Enable—Enable the auto AP function. You must also select Auto
from the Serial ID list on the AP setup page to use the auto AP
function.
• Disable—Disable the auto AP function.
Auto AP By default, the auto AP function is disabled.
IMPORTANT:
For network security, disable the auto-AP function when all APs have
connected to the AC.
Clients can associate with the auto APs, but you cannot change the configuration of an auto AP.
289
• Local auto-AP authentication
In local authentication mode, the AC directly authenticates APs by serial ID or by MAC address,
and uses the ACL option to specify the ACL rules for authenticating auto APs.
Assume you adopt local authentication by serial ID. When an auto AP connects to the AC, the AC
uses the serial ID of the AP to match ACL rules. If the serial ID matches a permit rule, the auto AP
passes the authentication and connects to the AC. If the serial ID matches a deny rule, the auto AP
fails the authentication and cannot connect to the AC. If the serial ID does not match any rule, the
AP is an unauthenticated AP. The ACL can be manually configured or imported from a file.
• Remote auto-AP authentication
In remote authentication mode, the AC contacts a remote authentication server to authenticate
auto APs. The AC uses the serial ID or MAC address of an auto AP as the username and password
and sends them to the authentication server. If the remote authentication succeeds, the AC accepts
the AP. If not, the AC denies the AP.
The "unauthenticated AP" status is only available for local authentication. For remote authentication, the
authentication result can only be "authentication failed" or "authentication succeeded."
To configure auto-AP authentication:
1. Select AP > Auto AP from the navigation tree.
Figure 286 Configuring auto-AP authentication
290
Table 100 Configuration items
Item Description
• Enable—Enable the auto-AP authentication function.
• Disable—Disable the auto-AP authentication function.
By default, auto APs are not authenticated.
AP Authentication
IMPORTANT:
• Auto-AP authentication only takes effect on auto APs.
• Auto-AP authentication does not take effect on online auto APs.
• MAC Address—The AC authenticates APs by MAC address.
Authenticate Method • Serial ID—The AC authenticates APs by serial ID.
By default, the AC authenticates APs by MAC address.
• If you select this option, the AC accepts unauthenticated auto APs, but
the auto APs cannot provide WLAN services.
Allow Unauthenticated AP
• If you do not select this option, the AC denies unauthenticated auto APs.
Connect
By default, the AC accepts unauthenticated auto APs, but the auto APs
cannot provide WLAN services.
Import a file for auto-AP authentication, and the system then generates
corresponding ACL rules.
• In the file, the MAC addresses must be in the format of
HH-HH-HH-HH-HH-HH, separated by commas. The serial IDs must be in
the format of serial-id1, serial-id2, serial-id3, separated by commas.
Local • Before you execute this command, use the wlan ap-authentication acl
Authentication command to specify an ACL number. The ACL rules generated will be
Import
added to the specified ACL.
Authenticate
File • When generating ACL rules, the system automatically assigns a rule ID.
This rule ID is the nearest higher multiple of the numbering step to the
current highest rule ID, starting from 0. For example, if the rule
numbering step is 5 and the current highest rule ID is 28, the rule is
numbered 30. The value range for a WLAN-AP ACL rule number is 0 to
65534. A number exceeding 65534 causes error and operation
failure.
• The file must have an extension of .txt.
Remote Authenticate
Specify an authentication domain for auto-AP authentication.
Authentication Domain
To re-authenticate an online auto AP, click Reset on the page shown in Figure 288 to log off the auto AP.
Enabling unauthenticated auto APs to pass authentication and provide WLAN services
Whether an unauthenticated AP can connect to the AC is determined by the Allow Unauthenticated AP
Connect option. If you select this option, you can click Accept to enable the unauthenticated AP to pass
authentication and provide WLAN services, or click Reject to disable the unauthenticated AP from
passing authentication and providing WLAN services.
291
Figure 287 Enabling unauthenticated auto APs to pass authentication and provide WLAN services
• Click Accept to change the status of an auto AP to Permitted and add the MAC address or serial ID
of the auto AP to the specified ACL number. The system generates a permit rule.
• Click Reject to deny the access of an unauthenticated auto AP and add the MAC address or serial
ID of the auto AP to the specified ACL number. The system generates a deny rule.
You can only perform the Accept or Reject operation on unauthenticated auto APs.
Renaming an AP
1. To modify the auto AP name, click the icon in the Operation column.
292
Figure 289 Renaming an AP
293
Table 101 Configuration items
Item Description
• Enable—Enable the function.
• Disable—Disable the function.
Auto Persistent By default, this function is disabled.
This option takes effect only for auto APs that go online. To convert APs that have been
online to configured APs, you can only use the previous two methods.
Configuring an AP group
Creating an AP group
1. Select AP > AP Group from the navigation tree.
2. Click Add.
Figure 292 Creating an AP group
Configuration guidelines
• The IP address match criteria take effect when an AP requests to associate with the AC. Any change
of the criteria does not affect associated APs.
• An AP that associates with the AC by matching IP address does not support VRRP even if it
disassociates and then associates with the AC again. To enable the AP to support VRRP, manually
add it to another AP group where the members are not in the same subnet as the AP.
• An AP (configured or auto) that has been manually added to an AP group is always in the group
even if its IP address matches the subnet of another AP group.
294
• For an auto AP that is already in the default group default_group, if its IP address matches the
subnet of a non-default AP group, the AC adds it to this AP group.
Configuration procedure
1. Select AP > AP Group from the navigation tree.
2. Click the icon for the target AP group.
Figure 293 Configuring the IP address match criteria for an AP group
Item Description
IPv4 Address /Mask Length When an AP requests to associate with the AC, the AC matches the IP address
of the AP against the subnets of the AP groups. If its IP address matches the
subnet of a group, the AP is added into the group.
IPv6 Address/Prefix Length
IMPORTANT:
The IP address ranges of different AP groups cannot overlap.
295
Figure 294 Adding an AP into an AP group
Item Description
AP Group Name Display the name of the selected AP group.
Configuring an AP group
You can configure an AP on the AP > AP Setup page, or configure multiple APs on the AP > AP Group
page. New configurations override the existing ones.
296
The following operations might fail on some member APs:
• Select 5 GHz wireless services.
• Select 2.4 GHz wireless services.
• Enable a 5 GHz radio.
• Enable a 2.4 GHz radio.
• Set a working mode.
• Set a country/region code
297
Figure 295 Configuring basic settings
Item Description
AP Group Name Name of the specified AP group.
298
Item Description
Bind a wireless service to the 5 GHz radio.
Selected 5GHz You can bind a wireless service to the radio of the AP on the AP > AP Group page and
Wireless Service then on the Wireless Service > Access Service page. However, the total number of
List wireless services bound to the radio on the two pages cannot exceed the maximum
number of wireless services allowed by the radio.
299
Configuring advanced settings
Figure 296 Configuring advanced settings
Item Description
For more information about the configurations of items not listed in the table, see Table 97 and Table 98.
A member AP uses the country/region code of the AP group even if the AP does not support the code. In such
cases, the AP uses the global country/region code.
300
Item Description
Configure the interval at which an AP sends statistics reports.
Statistics Interval
The statistics report covers radio decryption error, radio statistics, and so on.
301
Figure 298 Configuring a user profile
302
6. Configure the user profile as described in Table 106.
7. Click Apply.
For more information about user profile, see "Configuring users."
Table 106 Configuration item
Item Description
Specify the AP groups permitted in the user profile.
Select the AP groups in the AP group list and click the << button to add them to the
AP Group list
Selected AP group list.
permitted
The available AP groups are AP groups you configured on the page you enter by
selecting AP > AP Group. For more information, see "Configuring an AP group".
8. On the user profile management page, select the user profile to be enabled.
9. Click Enable.
AP configuration examples
Auto AP configuration example
Network requirement
To simplify AP configuration, configure the auto AP function to enable the AP with the model
MSM460-WW to automatically connect to the AC. Configure the AP to obtain an IP address through a
DHCP server and to provide clear-type wireless service with the SSID service1.
Figure 299 Network diagram
Configuring the AC
1. Create an AP:
a. Select AP > AP Setup from the navigation tree.
b. Click Add.
c. On the page that appears, set the AP name to ap, select the AP model MSM460-WW, select
the serial ID auto, and click Apply.
303
Figure 300 Creating an AP
304
4. Bind an AP to a wireless service:
a. Select Wireless Service > Access Service from the navigation tree.
b. Click the icon for the wireless service service1 to enter the page for binding an AP.
c. Select the box before ap with radio mode 802.11n (2.4 GHz).
d. Click Bind.
Figure 303 Binding an AP
e. Select AP > AP Setup from the navigation tree. You can see that the AP is in IDLE state.
Figure 304 AP status before auto AP is enabled
305
Figure 305 Enabling 802.11gn radio
6. Enable auto AP
a. Select AP > Auto AP from the navigation tree.
b. Select Enable from the Auto AP list.
c. Click Apply.
Figure 306 Configuring auto AP
d. After enabling auto AP, click Refresh to view the auto AP.
Figure 307 Viewing the auto AP
306
Figure 308 Viewing the online clients
Configuring the AC
1. Create ACL 202:
a. Select QoS > ACL IPv4 from the navigation tree.
b. Click Add.
c. Type ACL ID 202.
d. Click Apply.
307
Figure 310 Creating ACL 202
2. Configure a permit rule to allow AP 1 with the serial ID CN2AD330S7 and a deny rule to deny AP
2 with the serial ID CN2AD330S8.
a. Select QoS > ACL IPv4 from the navigation tree.
b. Click the Wireless Setup tab.
c. Select 202 from the ACL list and add two ACL rules as shown in Figure 311.
d. Click Apply.
Figure 311 Configuring ACL rules
308
Figure 312 Configuring auto AP
5. Enable the unauthenticated auto AP to pass authentication and provide WLAN services:
a. Select the box to the left of the target AP.
b. Click Accept.
309
Figure 314 Enabling the unauthenticated auto AP to pass authentication and provide WLAN
services
310
Configuring access services
Client access
A client access process involves active/passive scanning surrounding wireless services, authentication,
and association, as shown in Figure 315.
Figure 315 Establishing a client access
Scanning
Wireless clients use active scanning and passive scanning to obtain information about surrounding
wireless networks.
1. Active scanning
311
A wireless client periodically sends probe request frames and obtains wireless network
information from received probe response frames. Active scanning includes the following modes:
Active scanning without an SSID—The client periodically sends a probe request frame without
an SSID on each of its supported channels. APs that receive the probe request send a probe
response, which includes the available wireless network information. The client associates with
the AP with the strongest signal. This mode enables the client to find the optimal wireless
network.
Figure 316 Active scanning without an SSID
AP 1 AC 1
)
no SSID
(with
uest
e req
Client Pro b pons
e
r ob e re s
P
Pro b
e req
uest
(with
Pro b no S
e res SI D)
pons
e AP 2 AC 2
Active scanning with an SSID—If the wireless client is configured to access a wireless network
or has associated with a wireless network, the client periodically sends a probe request that
carries the SSID of that wireless network. When the target AP receives the probe request, it
sends a probe response. This mode enables the client to access a specified wireless network.
Figure 317 Active scanning with an SSID
2. Passive scanning
A wireless client listens to the beacon frames periodically sent by APs to discover surrounding
wireless networks. Passive scanning is used when a client wants to save battery power. Typically,
VoIP clients adopt passive scanning.
312
Figure 318 Passive scanning
Authentication
To secure wireless links, APs perform authentication on wireless clients. A wireless client must pass
authentication before it can access a wireless network. 802.11 define two authentication methods: open
system authentication and shared key authentication.
• Open system authentication
Open system authentication is the default authentication algorithm and is the simplest of the
available authentication algorithms. It is a null authentication algorithm. Any client that requests
authentication with this algorithm can become authenticated. Open system authentication is not
required to be successful, because an AP might decline to authenticate the client. Open system
authentication involves a two-step authentication process. In the first step, the wireless client sends
a request for authentication. In the second step, the AP returns the result to the client.
Figure 319 Open system authentication process
Client AP AC
Authentication request
Authentication response
313
Figure 320 Shared key authentication process
Association
To access a wireless network through an AP, a client must associate with that AP. After the client passes
authentication on the AP, the client sends an association request to the AP. The AP verifies the capability
information in the association request to determine the capability supported by the wireless client. Then
it sends an association response to notify the client of the association result. A client can associate with
only one AP at a time, and an association process is always initiated by the client.
314
Temporal key integrity Protocol (TKIP) and WEP both use the RC4 algorithm, but TKIP provides
advantages over WEP, and provides more secure protection for WLAN, as follows:
TKIP provides longer IVs to enhance encryption security. Compared with WEP encryption, TKIP
encryption uses 128–bit RC4 encryption algorithm, and increases the length of IVs from 24 bits
to 48 bits.
TKIP allows for dynamic key negotiation to avoid static key configuration. TKIP replaces a single
static key with a base key generated by an authentication server. TKIP dynamic keys cannot be
easily deciphered.
TKIP offers Message Integrity Check (MIC) and countermeasures. If a packet fails the MIC, the
data might be tampered, and the system might be attacked. If two packets fail the MIC in a
specific period, the AP automatically takes countermeasures. It will not provide services to
prevent attacks while it takes countermeasures.
• AES-CCMP encryption.
CTR with CBC-MAC protocol (CCMP) is based on the CCM of the AES encryption algorithm. CCM
combines CTR for confidentiality and CBC-MAC for authentication and integrity. CCM protects the
integrity of both the MPDU Data field and selected portions of the IEEE 802.11 MPDU header. The
AES block algorithm in CCMP uses a 128-bit key and a 128-bit block size. Similarly, CCMP
contains a dynamic key negotiation and management method, so that each wireless client can
dynamically negotiate a key suite. The key suite can be updated periodically to further enhance
the security of the CCMP encryption mechanism. During the encryption process, CCMP uses a
48-bit packet number (PN) to make sure each encrypted packet uses a different PN, which
improves security.
315
Figure 321 Local MAC authentication
Permitted MAC
address list: Client: 0009-5bcf-cce3
0009-5bcf-cce3
0011-9548-4007
000f-e200-00a2
Client: 0011-9548-4007
AC L2 switch AP
Client: 001a-9228-2d3e
When a RADIUS server is used for MAC authentication, you can specify a domain for each wireless
service, and send MAC authentication information of different SSIDs to different remote RADIUS servers.
802.11n
As the next generation wireless LAN technology, 802.11n supports both 2.4GHz and 5GHz bands. It
provides higher throughput to customers by using the following methods:
• Increasing bandwidth
802.11n can bond two adjacent 20-MHz channels together to form a 40-MHz channel. During
data forwarding, the two 20-MHz channels can work separately with one acting as the primary
316
channel and the other acting as the secondary channel. They can also work together as a 40-MHz
channel, which provides a simple way to double the data rate.
• Improving channel utilization
802.11n introduces the A-MPDU frame format. By using only one PHY header, each A-MPDU
can accommodate multiple Message Protocol Data Units (MPDUs) which have their PHY
headers removed. This reduces the overhead in transmission and the number of ACK frames to
be used, and improves network throughput.
Multiple MAC Service Data Units (MSDU) can be aggregated into a single A-MSDU. This
reduces the MAC header overhead and thus improves MAC layer forwarding efficiency.
To improve physical layer performance, 802.11n introduces the short GI function, which
shortens the GI interval of 800 ns in 802.11a/g to 400 ns. This can increase the data rate by
10 percent.
317
Figure 323 Configuring access service
2. Click Add.
Figure 324 Creating a wireless service
Item Description
Set the SSID, a case-sensitive string of 1 to 32 characters, which can
contain letters, digits, underlines, and spaces.
Set an SSID as unique as possible. For security, the company name
Wireless Service Name should not be contained in the SSID. Meanwhile, HP recommends
that you not use a long random string as the SSID, because a long
random string only adds payload to the header field, and does not
improve wireless security.
318
Figure 325 Configuring clear-type wireless service
3. Configure basic settings for the clear-type wireless service as described in Table 108.
4. Click Apply.
Table 108 Configuration items
Item Description
WLAN ID Display the selected WLAN ID.
Enter the ID of the VLAN whose packets are to be sent untagged. VLAN
VLAN (Untagged) (Untagged) indicates that the port sends the traffic of the VLAN with the
VLAN tag removed.
Default VLAN By default, the default VLAN of all ports is VLAN 1. After you set the
new default VLAN, VLAN 1 is the ID of the VLAN whose packets are to
be sent untagged.
Remove the IDs of the VLANs whose packets are to be sent untagged
Delete VLAN
and tagged.
319
Item Description
• Enable—Disable the advertisement of the SSID in beacon frames.
• Disable—Enable the advertisement of the SSID in beacon frames.
By default, the SSID is advertised in beacon frames.
IMPORTANT:
SSID Hide • If the advertisement of the SSID in beacon frames is disabled, the
SSID must be configured for the clients to associate with the AP.
• Disabling the advertisement of the SSID in beacon frames does not
improve wireless security.
• Enabling the advertisement of the SSID in beacon frames allows a
client to discover an AP more easily.
320
Figure 326 Configuring advanced settings for the clear-type wireless service
3. Configure advanced settings for the clear-type wireless service as described in Table 109.
4. Click Apply.
321
Table 109 Configuration items
Item Description
• Remote Forwarding—The AC performs data forwarding. Centralized
forwarding includes 802.3 centralized forwarding and 802.11 centralized
forwarding. With 802.3 centralized forwarding, APs change incoming
802.11 frames to 802.3 frames and tunnel the 802.3 frames to the AC. With
802.11 centralized forwarding, APs directly tunnel incoming 802.11 frames
to the AC.
• Local Forwarding—APs directly forward data frames. The AC still performs
authentication on clients. This forwarding mode reduces the workload of
the AC and retains the security and management advantages of the AC/fit
Forwarding Mode AP architecture.
• Forwarding Policy Based —Based on the forwarding policy that matches
the packets from clients, the AC chooses centralized forwarding mode or
local forwarding mode. This forwarding mode reduces the workload of the
AC (see "Configuring policy-based forwarding").
By default, the centralized forwarding mode is adopted.
IMPORTANT:
Forwarding policies can only take effect on packets sent by clients.
Clients using the same SSID might belong to different VLANs. You can
Local Forwarding VLAN configure a local forwarding VLAN when configuring a local forwarding
policy.
Enable the policy-based forwarding mode and apply the forwarding policy to
Forwarding Policy
the access service.
• 802.11—Packets are encapsulated in 802.11 format and forwarded by the
AC.
• 802.3—Packets are encapsulated in 802.3 format and forwarded by the
Packet Format AC.
This configuration only applies to a CAPWAP tunnel. For an LWAPP tunnel,
data frames can only be encapsulated in 802.11 format.
• Enable—Enable the beacon measurement function.
• Disable—Disable the beacon measurement function.
By default, the beacon measurement function is disabled.
Beacon Measurement Beacon measurement, defined by 802.11k, provides a mechanism for APs
and clients to measure the available radio resources. When this function is
enabled, an AP periodically sends beacon requests to clients. Clients respond
with beacon reports to inform the AP of the beacon measurement information
they have collected.
322
Item Description
• Active—The AP sends a beacon measurement requests to the client. Upon
receiving the request, the client broadcasts probe requests on all supported
channels and sets a measurement duration timer. At the end of the
measurement duration, the client compiles all received beacons and probe
responses into a measurement report.
• Beacon-table—The AP sends a beacon measurement request to a client.
Beacon-measurement Type Upon receiving the request, the client measures beacons and returns a
report to the AP. The report contains all beacon information stored on the
client. The client does not perform any additional measurements.
• Passive—The AP sends a beacon measurement request to a client. Upon
receiving the request, the client sets a measurement duration timer, and, at
the end of the measurement duration, compiles all received beacons and
probe responses into a measurement report.
Beacon-measurement Interval The interval at which the AP sends beacon requests to clients.
323
Configuring security settings for a clear-type wireless service
1. Select Wireless Service > Access Service from the navigation tree.
2. Click the icon for the target clear-type wireless service.
Figure 327 Configuring security settings for the clear-type wireless service
3. Configure security settings for the clear-type wireless service as described in Table 110.
4. Click Apply.
Table 110 Configuration items
Item Description
Authentication Type For the clear-type wireless service, you can select Open-System only.
324
Item Description
TIP:
There are multiple security modes. The following rules explain the port security
mode names:
• userLogin indicates port-based 802.1X authentication.
• mac indicates MAC address authentication.
• The authentication mode before Else is used preferentially. If the
authentication fails, the authentication after Else might be used depending
on the protocol type of the packets to be authenticated.
• The authentication modes before Or and after Or have the same priority.
The device determines the authentication mode according to the protocol
type of the packets to be authenticated. For wireless users, the 802.1X
authentication mode is used preferentially.
• userLogin together with Secure indicates MAC-based 802.1X
authentication.
• A security mode with Ext allows multiple 802.1X users to pass the
authentication. A security mode without Ext allows only one 802.1X user to
pass the authentication.
a. Configure mac-authentication:
Figure 328 Configuring mac-authentication port security
Item Description
mac-authentication—MAC-based authentication is performed on access
users.
Port Mode
Select Wireless Service > Access Service from the navigation tree, click
MAC Authentication List, and enter the MAC address of the client.
325
Item Description
MAC Authentication Select MAC Authentication.
b. Configure userlogin-secure/userlogin-secure-ext:
Figure 329 Configuring userlogin-secure/userlogin-secure-ext port security (userlogin-secure
is taken for example)
Item Description
• userlogin-secure—Perform MAC-based 802.1X authentication for access
users. In this mode, multiple 802.1X authenticated users can access the
Port Mode port, but only one user can be online.
• userlogin-secure-ext—Perform MAC-based 802.1X authentication for
access users. In this mode, the port supports multiple 802.1X users.
326
Item Description
Select an existing domain from the list.
The default domain is system. To create a domain, select Authentication >
AAA from the navigation tree, click the Domain Setup tab, and enter a new
domain name in the Domain Name field.
Mandatory Domain • The selected domain name applies to only the current wireless service,
and all clients accessing the wireless service use this domain for
authentication and authorization.
• Do not delete a domain name in use. Otherwise, the clients that access
the wireless service will be logged out.
• EAP—Use the Extensible Authentication Protocol (EAP). With EAP
authentication, the authenticator encapsulates 802.1X user information
in the EAP attributes of RADIUS packets and sends the packets to the
RADIUS server for authentication. It is not required to repackage the EAP
packets into standard RADIUS packets for authentication.
Authentication
• CHAP—Use the Challenge Handshake Authentication Protocol (CHAP).
Method
By default, CHAP is used. CHAP transmits usernames in simple text and
passwords in cipher text over the network. This method is safer than the
other two methods.
• PAP—Use the Password Authentication Protocol (PAP). PAP transmits
passwords in plain text.
• Enable—Enable the online user handshake function so that the device
can periodically send handshake messages to a user to identify whether
Handshake the user is online. By default, the function is enabled.
• Disable—Disable the online user handshake function.
• Enable—Enable the multicast trigger function of 802.1X to send multicast
trigger messages to the clients periodically for initiating authentication.
By default, the multicast trigger function is enabled.
• Disable—Disable the 802.1X multicast trigger function.
327
Figure 330 Configuring port security for the other four security modes
(mac-else-userlogin-secure is taken for example)
Item Description
• mac-else-userlogin-secure—This mode is the combination of the
mac-authentication and userlogin-secure modes. MAC authentication
has a higher priority than the userlogin-secure mode. Upon receiving
a non-802.1X frame, a port in this mode performs only MAC
authentication. When it receives an 802.1X frame, the port performs
MAC authentication and if MAC authentication fails, the port
performs 802.1X authentication.
• mac-else-userlogin-secure-ext—This mode is similar to the
mac-else-userlogin-secure mode, except that it supports multiple
802.1X and MAC authentication users on the port.
Port Mode
• userlogin-secure-or-mac—This mode is the combination of the
userlogin-secure and mac-authentication modes, with 802.1X
authentication having a higher priority. For a wireless user, 802.1X
authentication is performed first. If 802.1X authentication fails, MAC
authentication is performed.
• userlogin-secure-or-mac-ext—This mode is similar to the
userlogin-secure-or-mac mode, except that it supports multiple 802.1X
and MAC authentication users on the port.
Select Wireless Service > Access Service from the navigation tree, click
MAC Authentication List, and enter the MAC address of the client.
328
Item Description
The default domain is system. To create a domain, select
Authentication > AAA from the navigation tree, click the Domain Setup
tab, and enter a new domain name in the Domain Name field.
• EAP—Use the Extensible Authentication Protocol (EAP). With EAP
authentication, the authenticator encapsulates 802.1X user
information in the EAP attributes of RADIUS packets and sends the
packets to the RADIUS server for authentication. It is not required to
repackage the EAP packets into standard RADIUS packets for
authentication.
Authentication Method
• CHAP—Use the Challenge Handshake Authentication Protocol
(CHAP). By default, CHAP is used. CHAP transmits usernames in
simple text and passwords in cipher text over the network. This method
is safer than the other two methods.
• PAP—Use the Password Authentication Protocol (PAP). PAP transmits
passwords in plain text.
• Enable—Enable the online user handshake function. With this
function enabled, the device can periodically send handshake
Handshake messages to a user to identify whether the user is online. By default,
the function is enabled.
• Disable—Disable the online user handshake function.
• Enable—Enable the multicast trigger function of 802.1X to send
multicast trigger messages to the clients periodically to initiate
authentication. By default, the multicast trigger function is enabled.
• Disable—Disable the 802.1X multicast trigger function.
IMPORTANT:
Multicast Trigger
For a WLAN, the clients can actively initiate authentication, or the AP can
discover users and trigger authentication. Therefore, the ports do not need
to send 802.1X multicast trigger messages periodically for initiating
authentication. HP recommends that you disable the multicast trigger
function in a WLAN because the multicast trigger messages consume
bandwidth.
• Enable—Enable 802.1X support for the stateful failover function. You
need to select High Availability > Stateful Failover and configure the
stateful failover function (see "Configuring stateful failover").
Stateful Failover • Disable—Disable 802.1X support for the stateful failover function.
Whether a device supports the stateful failover function varies with the
device model. For more information, see "About the Web-based
configuration guide for HP unified wired-WLAN products."
329
Configuring crypto-type wireless service
Configuring basic settings for a crypto-type wireless service
1. Select Wireless Service > Access Service from the navigation tree.
2. Click the icon for the target crypto-type wireless service.
Figure 331 Configuring crypto-type wireless service
3. Configure basic settings for the crypto-type wireless service as described in Table 108.
4. Click Apply.
330
Figure 332 Configuring advanced settings for the crypto-type wireless service
3. Configure advanced settings for the crypto-type wireless service as described in Table 114.
4. Click Apply.
331
Table 114 Configuration items
Item Description
• Remote Forwarding—The AC performs data forwarding.
Centralized forwarding comprises 802.3 centralized forwarding
and 802.11 centralized forwarding. With 802.3 centralized
forwarding, APs change incoming 802.11 frames to 802.3 frames
and tunnel the 802.3 frames to the AC. With 802.11 centralized
forwarding, APs directly tunnel incoming 802.11 frames to the AC.
• Local Forwarding—APs directly forward data frames. The AC still
performs authentication on clients. This forwarding mode reduces
the workload of the AC and retains the security and management
Forwarding Mode advantages of the AC/fit AP architecture.
• Forwarding Policy Based —Based on the forwarding policy that
matches the packets from clients, the AC chooses centralized
forwarding mode or local forwarding mode. This forwarding
mode reduces the workload of the AC. For more information, see
"Configuring policy-based forwarding".
By default, the centralized forwarding mode is adopted.
IMPORTANT:
Forwarding policies are only available to packets sent by clients.
Clients using the same SSID might belong to different VLANs. You
Local Forwarding VLAN can configure a local forwarding VLAN when configuring a local
forwarding policy.
332
Item Description
• Active—The AP sends a beacon measurement requests to the
client. Upon receiving the request, the client broadcasts probe
requests on all supported channels and sets a measurement
duration timer. At the end of the measurement duration, compiles
all received beacons and probe responses into a measurement
report.
• Beacon-table—The AP sends a beacon measurement request to a
client. Upon receiving the request, the client measures beacons
Beacon-measurement Type
and returns a report to the AP. The report contains all beacon
information stored on the client. The client does not perform any
additional measurements.
• Passive—The AP sends a beacon measurement request to a client.
Upon receiving the request, the client sets a measurement duration
timer, and, at the end of the measurement duration, compiles all
received beacons and probe responses into a measurement
report.
Beacon-measurement Interval The interval at which the AP sends beacon requests to clients.
Bonjour Policy Apply the specified Bonjour policy to the wireless service.
333
Item Description
• Enable—Enable fast association.
• Disable—Disable fast association.
Fast Association By default, fast association is disabled.
When fast association is enabled, the device does not perform band
navigation and load balancing calculations for associated clients.
334
a. The client sends an association or a reassociation request to the AP.
b. Upon receiving the request, the AP sends a response to inform the client that the request is
denied and the client can associate later. The response contains an association comeback time
specified by the pmf association-comeback command.
c. The AP sends an SA Query request to the client.
− If the AP receives an SA Query response within the timeout time, it determines that the client
is online.
− If the AP receives no SA Query response within the timeout time, it resends the request. If the
AP receives an SA Query response within the retransmission time, it determines that the
client is online.
If the client is online, the AP does not respond to any association or reassociation request
from the client within the association comeback time.
− If the AP receives no SA Query response within the retransmission time, it determines that
the client is offline. The AP allows the client to reassociate.
Figure 333 Active SA Query
• Passive SA Query.
If a client receives unencrypted deassociation or deauthentication frames with failure code 6 or 7,
this mechanism can prevent the client from going offline abnormally.
As shown in Figure 334, the passive SA Query operates as follows:
a. The client triggers the SA Query mechanism upon receiving an unencrypted deassociation or
deauthentication frame.
b. The client sends an SA Query request to the AP.
c. The AP responds with an SA Query response.
d. The client determines the AP is online because it receives the SA Query response. The client
does not go offline.
335
Figure 334 Passive SA Query
3. Configure management frame protection for a crypto-type wireless service as described in Table
115.
4. Click Apply.
Table 115 Configuration items
Item Description
Management frame protection status:
• Disabled—All clients can associate with the AP. The AP does not protect
management frames in communications.
• Optional—All clients can associate with the AP. The AP protects management
frames from clients supporting PMF.
• Mandatory—Clients supporting PMF can associate with the AP. The AP protects
management frames from these clients. Clients not supporting PMF cannot
associate with the AP.
PMF
By default, PMF is disabled.
NOTE:
You can only configure management frame protection on a service template
whose:
• Authentication type is PSK or 802.1X.
• Cipher suite is AES-CCMP.
• Security IE is RSN.
The AP does not respond to any association or reassociation request from the client
Association Comeback
within the association comeback time.
336
Item Description
If the AP receives no SA Query response within the timeout time, it resends the
SA Query Timeout
request.
3. Configure security settings for the crypto-type wireless service as described in Table 116.
4. Click Apply.
337
Table 116 Configuration items
Item Description
• Open-System—No authentication. With this authentication mode enabled, all
the clients will pass the authentication.
• Shared-Key—The two parties need to have the same shared key configured for
this authentication mode. You can select this option only when the WEP
encryption mode is used.
• Open-System and Shared-Key—You can select both open-system and
shared-key authentication.
IMPORTANT:
Authentication Type
WEP encryption can be used together with open system and shared-key
authentication.
• Open system authentication—When this authentication mode is used, a WEP
key is used for encryption only. If the two parties do not use the same key, a
wireless link can still be established, but all data will be discarded.
• Shared-key authentication—When this authentication mode is used, a WEP
key is used for both authentication and encryption. If the two parties do not use
the same key, the client cannot pass the authentication, and cannot access the
wireless network.
338
Item Description
• Enable—A WEP key is dynamically assigned.
• Disable—A static WEP key is used.
By default, a static WEP key is used.
When you enable this function, the WEP option is automatically set to wep104.
Provide Key
IMPORTANT:
Automatically
• This function must be used together with 802.1X authentication.
• When dynamic WEP encryption is configured, the WEP key used to encrypt
unicast frames is negotiated between client and server. If the WEP default key is
configured, the WEP default key is used to encrypt multicast frames. If not, the
device randomly generates a multicast WEP key.
• wep40—WEP40 key option.
WEP • wep104—WEP104 key option.
• wep128—WEP128 key option.
• 1—Key index 1.
• 2—Key index 2.
• 3—Key index 3.
Key ID • 4—Key index 4.
There are four static keys in WEP. The key index can be 1, 2, 3, or 4. The key for
the specified key index will be used for encrypting and decrypting broadcast and
multicast frames.
• For wep40, the key is a string of five alphanumeric characters or a 10-digit
hexadecimal number.
• For wep104, the key is a string of 13 alphanumeric characters or a 26-digit
Key Length
hexadecimal number.
• For wep128, the key is a string of 16 alphanumeric characters or a 32-digit
hexadecimal number.
339
Figure 337 Configuring mac and psk port security
Item Description
mac and psk: MAC-based authentication must be performed on
access users first. If MAC-based authentication succeeds, an
access user is required to use the pre-configured PSK to
negotiate with the device. Access to the port is allowed only
Port Mode after the negotiation succeeds.
Select Wireless Service > Access Service from the navigation
tree, click MAC Authentication List, and enter the MAC address
of the client.
b. Configure psk.
340
Figure 338 Configuring psk port security
Item Description
psk: An access user must use the pre-shared key (PSK) that is pre-configured
Port Mode to negotiate with the device. The access to the port is allowed only after the
negotiation succeeds.
Control the maximum number of users allowed to access the network through
Max User
the port.
c. Configure userlogin-secure-ext:
Perform the configurations shown in Table 112.
341
Service Authenticati Encryption WEP
Security IE Port mode
type on mode type encryption/key ID
WEP encryption is
• mac and psk
available
Selected Required • psk
The key ID can be 2,
• userlogin-secure-ext
3, or 4.
Open-System
WEP encryption is
• mac-authentication
required
Unselected Unavailable • userlogin-secure
The key ID can be 1,
• userlogin-secure-ext
2, 3 or 4.
WEP encryption is
required
Crypto Shared-Key Unavailable Unavailable mac-authentication
The key ID can be 1,
2, 3 or 4.
WEP encryption is
• mac and psk
required
Selected Required • psk
The key ID can be 1,
Open-System • userlogin-secure-ext
2, 3 or 4.
and
Shared-Key WEP encryption is
• mac-authentication
required
Unselected Unavailable • userlogin-secure
The key ID can be 1,
• userlogin-secure-ext
2, 3 or 4.
Configuration guidelines
• If clients are authenticated remotely, make sure the AP is still connected to the authentication server
when the AC-AP connection fails. Otherwise, the existing clients go offline. You can deploy the
authentication server at the AP side (see "Configuring clear-type wireless service").
• Portal authentication is not supported.
• Clients authenticated by the AP do not support roaming.
• Locally authenticated clients do not support roaming and client information backup. For more
information about client information backup, see "Configuring advanced settings."
342
• You can click Disconnect on the Summary > Client page on the AC to log off locally authenticated
clients.
• For the local authentication mode and backup authentication mode, if the AC-AP connection fails,
do not modify the configuration on the AC before the connection recovers because the AC verifies
the configuration after the connection recovers. If the configuration is inconsistent, online clients
might be logged off.
Networking mode
For the local authentication mode and backup authentication mode, you can use the following
networking modes if an authentication server is needed. The networking mode shown in Figure 340 is
recommended. In this mode, the authentication server is deployed at the AP side so that online clients are
not logged off if the AC-AP connection fails.
Figure 339 Network diagram
Internet
AC AP Client
Configuration prerequisites
1. Enable the remote AP function on the AP > AP Setup page before you configure the backup or
local authentication mode.
2. If you configure the backup or local authentication mode and clients use 802.1X or MAC
authentication, edit the configuration file of the AP on the AC and then download the file to the AP
on the AP > AP Setup page. The configuration file of the AP must contain the following contents:
If clients use local 802.1X or local MAC authentication, the configuration file must contain port
security, ISP domain, and local user configurations.
If clients use remote 802.1X or remote MAC authentication, the configuration file must contain
port security, ISP domain, and RADIUS scheme configurations.
343
Figure 341 Configuring an authentication mode
344
For a client using an IPv4 address, the AP can obtain the IP address assigned to the client in the DHCPv4
packets exchanged between the DHCP server and the client, and bind the IP address with the MAC
address of the client.
For a client using an IPv6 address, the AP can generate binding entries in either of the following ways:
• DHCPv6—The AP obtains the complete IPv6 address assigned to the client in the DHCPv6 packets
exchanged between the DHCP server and the client, and binds the IPv6 address with the MAC
address of the client. If the AP obtains the IPv6 address prefix assigned to the client, it cannot
generate a proper binding entry.
• ND (Neighbor Discovery)—The AP obtains the broadcast IPv6 address prefix in the router
advertisement packets exchanged between the router and the client, and binds the IPv6 address
prefix with the MAC address of the client.
After source IP address verification is enabled, the AP looks up the binding entries for received packets.
If the source MAC address and the source IP address of a packet match a binding entry, the AP forwards
the packets. Otherwise, the AP discards it. Figure 342 shows how source IP address verification works.
Figure 342 Source IP address verification process
NOTE:
• For more information about DHCP, see "DHCP overview."
• For more information about DHCPv6, see Layer 3 Configuration Guide.
• For more information about ND, see Layer 3 Configuration Guide.
345
Figure 343 Configuring source IP address verification
3. Select IPv4 or IPv6 for IP Verify Source. By default, the source IP address verification function is
disabled.
4. Click Apply.
346
NOTE:
• For a client using an SSID configured with source IP address verification, if it accesses the network through AP
local authentication, the source IP address verification feature is effective but the IP-MAC binding entry for the
client cannot be displayed on the AC. For more information about local authentication, see "Configuring an
authentication mode."
• If the client needs to roam to an AP of another AC in the roaming group, the AC to which the client roams must
be configured with source IP address verification for the specified SSID. Otherwise, the client connection is lost.
For more information about AP local authentication and WLAN roaming, see "Configuring WLAN roaming".
347
Figure 345 Binding an AP radio to a wireless service
348
Figure 346 Schematic diagram for WLAN support for AP-based access VLAN recognition
RADIUS server
AC 1 AC 2
HA IACTP tunnel FA
VLAN 3 VLAN 2
VLAN 3 VLAN 3
Intra AC roaming Inter AC roaming
AP 1 AP 2 AP 3 AP 4
As shown in Figure 346, Client 1 goes online through AP 1 and belongs to VLAN 3. When Client 1
roams within an AC or between ACs, Client 1 always belongs to VLAN 3. When Client 1 roams between
ACs, if FA, that is, AC 2, has VLAN-interface 3, AC 2 forwards packets from Client 1. Otherwise, packets
from Client 1 are sent to HA (AC 1) through the data tunnel and then HA forwards these packets.
Client 2 goes online through AP 4 and belongs to VLAN 2. A client going online through a different AP
is assigned to a different VLAN.
1. Select Wireless Service > Access Service from the navigation tree.
2. Click the icon for the target wireless service to enter the AP radio setup page, as shown
in Figure 345.
3. Select the box for the AP radio mode to be bound.
4. Select Binding VLAN and enter the VLAN to be bound in the Binding VLAN field.
5. Click Bind.
349
Enabling a radio
1. Select Radio > Radio from the navigation tree.
Figure 347 Enabling 802.11n radio
350
Figure 348 Displaying detailed information about a clear-type wireless service
Field Description
Service Template Number Current service template number.
Binding Interface Name of the WLAN-ESS interface bound with the service template.
Beacon-measurement Interval The interval at which the AP sends beacon requests to clients.
• Passive.
Beacon-measurement Type • Active.
• Beacon-table.
Authentication mode of the service template:
• Central.
Authentication Mode
• Local.
• Backup.
351
Field Description
• Disable—SSID advertisement is enabled.
SSID-hide • Enable—SSID advertisement is disabled, and the AP does not
advertise the SSID in the beacon frames.
Forwarding mode:
Bridge Mode • Local Forwarding—The AP forwards the data.
• Remote Forwarding—The AC forwards the data.
Service template status, which can be:
Service Template Status • Enable—The wireless service is enabled.
• Disable—The wireless service is disabled.
Maximum clients per BSS Maximum number of associated clients per BSS.
352
Figure 349 Displaying detailed information about a crypto-type wireless service
Field Description
Service Template Number Current service template number.
Binding Interface Name of WLAN-ESS the interface bound with the service template.
Beacon-measurement Interval The interval at which the AP sends beacon requests to clients.
• Passive.
Beacon-measurement Type • Active.
• Beacon-table.
Authentication mode of the service template:
• Central.
Authentication Mode
• Local.
• Backup.
353
Field Description
• Disable—SSID advertisement is enabled.
SSID-hide • Enable—SSID advertisement is disabled, and the AP does not
advertise the SSID in the beacon frames.
WEP Key Index WEP key index for encryption or de-encryption frames.
Forwarding mode:
Bridge Mode • Local Forwarding—The AP forwards the data.
• Remote Forwarding—The AC forwards the data.
Management frame protection status:
• Disabled—PMF is disabled. All clients can associate with the AP.
The AP does not protect management frames in
communications.
• Optional—PMF is enabled. All clients can associate with the AP.
PMF Status The AP protects management frames from clients supporting
PMF.
• Mandatory—PMF is enabled. Clients supporting PMF can
associate with the AP. The AP protects management frames from
these clients. Clients not supporting PMF cannot associate with
the AP.
354
Configuring policy-based forwarding
If the AC adopts the local authentication mode, it also uses the local forwarding mode. Configuration of
policed-based forwarding mode is invalid. For more information about authentication modes, see
"Configuring an authentication mode."
Before you can apply a forwarding policy, create a forwarding policy and specify forwarding rules. The
ACL sorts ACL rules in ascending order of rule ID. A rule with a lower ID is matched before a rule with
a higher ID. If a match is found, the AC forwards the packet according to this rule. If no match is found,
or no rule is configured, the AC adopts the centralized forwarding mode by default.
The forwarding modes can be applied to a user profile or service template:
• User profile—If a client passes the 802.1X authentication, the authentication server sends the user
profile name used by the client to the AP. Then the AP obtains the forwarding mode applied to the
user profile. You need to create and enable the user profile on the AC first. If you configure a QoS
policy in the user profile at the same time, and the packets match both the QoS policy and the
forwarding mode, the QoS policy enjoys a higher priority.
• Service template—Clients associated with the AP adopt the forwarding mode in the service
template.
If you configure different forwarding modes in the user profile and the service template, the forwarding
mode in the user profile has a higher priority.
The forwarding mode takes effect only when applied to the AP, so you need to download the
configuration file from the AC to the AP. The configuration files must contain ACL numbers and ACL rules.
To apply the forwarding mode to the user profile, you must include user profile configurations in the
configuration file. For more information about the configuration file, see "Configuring APs."
355
Figure 350 Creating a forwarding policy
Item Description
Create a forwarding policy.
Policy Name
You can create 1000 forwarding policies at most.
356
Category Match criteria
IP Source and destination IP addresses
IPv4 advanced ACL TCP and UDP Source and destination port numbers
IPv6 advanced ACL
Message type and message code of specified ICMP
ICMP
packets
357
Figure 351 Applying a forwarding policy to an access service
3. Apply the forwarding policy to the access service as described in Table 124.
4. Click Apply.
358
Table 124 Configuration Items
Item Description
Select Forwarding Policy Based from the list to enable the policy-based
forwarding mode.
Forwarding Mode
IMPORTANT:
Forwarding policies are only available to packets sent by clients.
359
Figure 353 Network diagram
Configuration guidelines
Select a correct district code.
Configuring the AC
1. Create an AP:
a. Select AP > AP Setup from the navigation tree.
b. Click Add.
c. On the page that appears, set the AP name to ap, select the AP model MSM460-WW, select
Manual from the Serial ID list, and enter the serial ID of the AP.
d. Click Apply.
Figure 354 Creating an AP
360
b. On the page that appears, select service1 and click Enable.
Figure 356 Enabling wireless service
361
5. Enable 802.11n(2.4GHz) radio:
a. Select Radio > Radio from the navigation tree.
b. Select the box to the left of the radio mode 802.11n(2.4GHz).
c. Click Enable.
Figure 358 Enabling 802.11n(2.4GHz) radio
362
Figure 360 Network diagram
Configuring the AC
1. Create an AP:
a. Select AP > AP Setup from the navigation tree.
b. Click Add.
c. On the page that appears, set the AP name to ap, select the AP model MSM460-WW, select
Manual from the Serial ID list, enter the AP serial ID, and click Apply.
Figure 361 Creating an AP
363
e. Click Apply.
Figure 363 Configuring security settings
364
Figure 365 Binding an AP radio
365
3. Click Connect.
4. In the popup dialog box, enter the key (12345678 in this example), and then click Connect.
Figure 367 Configuring the client
The client has the same pre-shared PSK key as the AP, so the client can associate with the AP.
366
Figure 368 The client is associated with the AP
Configuring the AC
1. Create an AP:
a. Select AP > AP Setup from the navigation tree.
367
b. Click Add.
c. On the page that appears, set the AP name to ap, select the AP model MSM460-WW, select
Manual from the Serial ID list, enter the AP serial ID, and click Apply.
Figure 370 Creating an AP
368
Figure 372 Configuring security settings
369
c. On the page that appears, add a local user in the MAC Address field. 0014-6c8a-43ff is used
in this example.
d. Click Add.
Figure 374 Adding a MAC authentication list
370
Figure 376 Enabling 802.11n(2.4GHz) radio
371
• You can view the online clients on the page you enter by selecting Summary > Client.
Configuring the AC
1. Assign an IP address to the AC:
a. Select Network > VLAN to create a VLAN on the AC.
b. Select Device > Interface Management to assign an IP address to the VLAN interface.
2. Configure a RADIUS scheme:
a. Select Authentication > RADIUS from the navigation tree.
b. Click Add.
c. On the page that appears, add two servers in the RADIUS Server Configuration area as shown
in Figure 379, and specify the key expert.
d. Enter mac-auth in the Scheme Name field.
e. Select Extended as the server type.
f. Select Without domain name from the Username Format List.
g. Click Apply.
372
Figure 379 Configuring RADIUS
3. Configure AAA:
a. From the navigation tree, select Authentication > AAA.
b. Optional: On the Domain Setup tab, create a new ISP domain.
This example uses the default domain system.
c. On the Authentication tab, select the ISP domain system, select the LAN-access AuthN box,
select the authentication mode RADIUS, select the authentication scheme mac-auth from the
Name list, and click Apply.
Figure 380 Configuring the AAA authentication method for the ISP domain
d. On the Authorization tab, select the ISP domain system, select the LAN-access AuthZ box,
select the authorization mode RADIUS, select the authorization scheme mac-auth from the
Name list, and click Apply.
e. Click Close after the configuration process is complete.
373
Figure 381 Configuring the AAA authorization method for the ISP domain
f. Click Apply.
4. Create an AP:
a. Select AP > AP Setup from the navigation tree.
b. Click Add.
c. On the page that appears, set the AP name to ap, select the AP model MSM460-WW, select
Manual from the Serial ID list, enter the AP serial ID, and click Apply.
Figure 382 Configuring an AP
374
Figure 383 Creating a wireless service
375
Figure 385 Enabling the wireless service
376
Figure 387 Enabling 802.11n(2.4GHz) radio
2. Add a service:
a. Click the Service tab.
b. Select User Access Manager > Service Configuration from the navigation tree.
c. Click Add.
377
d. On the page that appears, set the service name to mac, keep the default values for other
parameters, and click Apply.
Figure 389 Adding a service
3. Add an account:
a. Click the User tab.
b. Select User > All Access Users from the navigation tree.
c. Click Add.
d. On the page that appears, enter username 00146c8a43ff, set the account name and
password both to 00146c8a43ff, select the service mac, and click Apply.
Figure 390 Adding an account
378
• Use IMC as a RADIUS server for authentication and authorization. On the RADIUS server, configure
the client's username as user, password as dot1x, and shared key as expert. The IP address of the
RADIUS server is 10.18.1.88.
• On the AC, configure the shared key as expert, and configure the AC to remove the domain name
of a username before sending it to the RADIUS server. The IP address of the AC is 10.18.1.1.
Figure 391 Network diagram
Configuring the AC
1. Assign an IP address to the AC:
a. Select Network > VLAN to create a VLAN on the AC.
b. Select Device > Interface Management to assign an IP address to the VLAN interface.
2. Configure a RADIUS scheme:
a. Select Authentication > RADIUS from the navigation tree.
b. Click Add.
c. On the page that appears, add two servers in the RADIUS Server Configuration, and specify
the key expert.
d. Enter 802.1x in the Scheme Name field.
e. Select the server type Extended, and select Without domain name from the Username Format
list.
f. Click Apply.
379
Figure 392 Configuring RADIUS
3. Configure AAA:
a. Select Authentication > AAA from the navigation tree. In this example, the default ISP domain
system is used. You can create a new ISP domain if needed.
b. (Optional.) On the Domain Setup tab, create a new ISP domain.
This example uses the default domain system.
c. On the Authentication tab, select the ISP domain system, select the LAN-access AuthN box,
select the authentication mode RADIUS, select the authentication scheme 802.1x from the
Name list, and click Apply.
Figure 393 Configuring the AAA authentication method for the ISP domain
380
d. On the Authorization tab, select the domain name system, select the LAN-access AuthZ box,
select the authorization mode RADIUS, select the authorization scheme 802.1x from the Name
list, and click Apply.
Figure 394 Configuring the AAA authorization method for the ISP domain
4. Create an AP:
a. Select AP > AP Setup from the navigation tree.
b. Click Add.
c. On the page that appears, set the AP name to ap, select the AP model MSM460-WW, select
Manual from the Serial ID list, enter the AP serial ID, and click Apply.
Figure 395 Configuring an AP
381
Figure 396 Creating a wireless service
382
Figure 398 Enabling the wireless service
383
9. Enable 802.11n(2.4GHz) radio:
a. Select Radio > Radio from the navigation tree.
b. Select the box of the AP with the radio mode 802.11n(2.4GHz).
c. Click Enable.
Figure 400 Enabling 802.11n(2.4GHz) radio
384
2. Add a service:
a. Click the Service tab.
b. Select User Access Manager > Service Configuration from the navigation tree.
c. Click Add.
d. On the page that appears, set the service name to dot1x, and set the Certificate Type to
EAP-PEAP AuthN and the Certificate Sub Type to MS-CHAPV2 AuthN, and click Apply.
Figure 402 Adding a service
3. Add an account:
a. Click the User tab.
b. Select User > All Access Users from the navigation tree.
c. Click Add.
d. On the page that appears, enter username user, set the account name to user and password
to dot1x, and select the service dot1x, and click Apply.
Figure 403 Adding account
385
Configuring the wireless client
1. Double click the icon at the bottom right corner of your desktop.
The Wireless Network Connection Status window appears.
2. Click Properties in the General tab.
The Wireless Network Connection Properties window appears.
3. In the Wireless Networks tab, select wireless network with the SSID dot1x, and then click
Properties.
The dot1x Properties window appears.
4. In the Authentication tab, select Protected EAP (PEAP) from the EAP type list, and click Properties.
5. In the popup window, clear Validate server certificate, and click Configure.
6. In the popup dialog box, clear Automatically use my Windows logon name and password (and
domain if any).
386
Figure 404 Configuring the wireless client (1)
387
Figure 405 Configuring the wireless client (2)
388
Figure 406 Configuring the wireless client (3)
389
Figure 407 Network diagram
Configuration procedure
1. Assign an IP address for the AC:
See "Assign an IP address to the AC:."
2. Configure a RADIUS scheme:
See "Configure a RADIUS scheme:."
3. Configure AAA:
See "Configure AAA:."
4. Configure the AP:
See "Create an AP:."
5. Create a wireless service:
a. Select Wireless Service > Access Service from the navigation tree.
b. Click Add.
c. On the page that appears, set the service name to dot1x, select the wireless service type crypto,
and click Apply.
Figure 408 Creating a wireless service
390
g. Disable Handshake and Multicast Trigger (recommended).
h. Click Apply.
Figure 409 Configuring security settings
391
8. Bind an AP radio to the wireless service:
a. Select Wireless Service > Access Service from the navigation tree.
b. Click the icon for the wireless service dot1x.
c. On the page that appears, select the box of 802.11n(2.4GHz) and click Bind.
Figure 411 Binding an AP radio to a wireless service
1. Double click the icon at the bottom right corner of your desktop.
2. The Wireless Network Connection Status window appears.
3. Click Properties.
The Wireless Network window appears.
4. Click Add.
5. Click the Association tab, and enter dot1x in the Network name (SSID) field. Make sure you have
selected The key is provided for me automatically. Click OK.
392
Figure 412 Configuring the wireless client (1)
6. On the Authentication tab, select Protected EAP (PEAP) from the EAP type list, and click Properties.
7. In the popup window, clear Validate server certificate, and click Configure.
8. In the popup dialog box, clear Automatically use my Windows logon name and password (and
domain if any), and then click OK.
393
Figure 413 Configuring the wireless client (2)
394
Figure 414 Configuring the wireless client (3)
395
Adding commands to the configuration file of the AP
port-security enable
domain branch.net
authentication lan-access local
authorization lan-access local
accounting lan-access local
local-user 00-14-6c-8a-43-ff
password simple 00-14-6c-8a-43-ff
service-type lan-access
Then save the configuration file with the name map.cfg, and upload it to the storage media of the AC.
Configuring the AC
Before configuring the AC in the Web interface, use the mac-authentication user-name-format
mac-address with-hyphen lowercase command to use MAC-based user accounts for MAC
authentication users, and each MAC address must be hyphenated and in lower case..
To configure the AC:
1. Configure an ISP domain branch.net:
a. Select Authentication > AAA from the navigation tree.
You are placed on the Domain Setup tab.
b. Enter the domain name in the Domain Name field.
c. Click Apply.
396
Figure 416 Configuring an ISP domain
2. Create an AP:
a. Select AP > AP Setup from the navigation tree.
b. Click Add.
c. On the page that appears, set the AP name to ap, select the AP model MSM460-WW, select
Manual from the Serial ID list, enter the serial ID of the AP, and click Apply.
Figure 417 Creating an AP
397
Figure 418 Creating a wireless service
398
Figure 419 Configuring backup client authentication
399
Figure 420 Configuring local MAC authentication
400
b. Click MAC Authentication List.
c. Add a local user in the MAC Address field. 00-14-6c-8a-43-ff is used in this example.
d. Click Add.
Figure 422 Adding a MAC authentication list
401
9. Bind an AP radio to a wireless service:
a. Select Wireless Service > Access Service from the navigation tree.
b. Click the icon for the wireless service mac-auth.
c. Select the box to the left of ap with the radio mode 802.11n(2.4GHz).
d. Click Bind.
Figure 424 Binding an AP radio
402
11. Verify the configuration:
When the connection between AP and AC is correct, clients associated with the AP can access
the network after passing centralized authentication. Select Summary > Client from the
navigation tree to view detailed client information. The Central field in the output shows that the
AC authenticates the clients.
When the connection between AC and AP fails, clients associated with the AP are not logged
off and the AP authenticates new clients.
When the connection between AC and AP recovers, the AP logs off all associated clients. The
clients can associate with the AP again after authenticated by the AC. Select Summary > Client
from the navigation tree to view detailed client information. The authentication-mode field in the
output displays Central.
domain cams
authentication default radius-scheme rad
403
authorization default radius-scheme rad
accounting default radius-scheme rad
Then save the file with the name map.cfg, and upload it to the storage media on the AC.
Configuring the AC
1. Configure the AP:
a. Select AP > AP Setup from the navigation tree.
b. Click Add.
c. On the page that appears, set the AP name to ap, select the AP model MSM460-WW, select
Manual from the Serial ID list, enter the serial ID of the AP, and click Apply.
Figure 427 Configuring the AP
404
Figure 429 Configuring local client authentication
405
e. Select EAP from the Authentication Method list.
f. Disable Handshake and Multicast Trigger (recommended).
g. Click Apply.
Figure 430 Security setup
406
b. Click the icon for the target AP in the list.
The page for configuring an AP appears.
c. Expand Advanced Setup, set the configuration file to map.cfg, and select Enable from the
Remote AP list.
d. Click Apply.
Figure 432 Enabling remote AP
407
Figure 433 Binding an AP radio to a wireless service
408
Policy-based forwarding configuration example
Network requirements
Configure policy-based forwarding so that both the centralized forwarding mode and the local
forwarding mode can be achieved for one SSID.
Figure 435 Network diagram
Configuring the AC
1. Configure forwarding policy st:
a. Select Wireless Service > Access Service from the navigation tree.
b. Click the Forwarding Policy tab.
c. Click Add.
d. On the page that appears, create a forwarding policy st as described in Figure 436.
e. Click Apply.
409
Figure 436 Creating a forwarding policy (1)
410
Figure 437 Creating a forwarding policy (2)
411
Figure 438 Downloading the configuration file to the AP
412
Figure 439 Applying the forwarding policy to the access service
413
Figure 440 Specifying the user profile name
414
Configuring mesh services
A WLAN mesh network allows for wireless connections between APs, making the WLAN more mobile
and flexible. Also, you can establish multi-hop wireless links between APs. In these ways, a WLAN mesh
network differs from a traditional WLAN. However, from the perspective of end users, a WLAN mesh
network is no different from a traditional WLAN.
Mesh overview
Basic concepts in WLAN mesh
Concept Description
Access controller (AC) Device that controls and manages all the APs in the WLAN.
Mesh access point (MAP) AP providing the mesh service and the access service concurrently.
Mesh portal point (MPP) Wireless AP that connects to an AC through a wired connection.
415
Deployment scenarios
One-hop mesh link backhaul deployment
As shown in Figure 441, the MAP is a dual-radio AP, with one radio for WLAN access and the other for
mesh link backhaul. You can configure the MAC address of the MPP connected to the MAP to establish
a mesh link between them.
Figure 441 One-hop mesh link backhaul
……
…
416
Figure 443 Two-hop mesh backhaul deployment (1)
HP supports up to 4 MPs on a single MPP and up to 4 MAPs on a single MP as shown in Figure 444.
Figure 444 Two-hop mesh backhaul deployment (2)
MAP 1
mesh-link
AC
mesh-link
MP 1
mesh-link
PC1
MAP 4 mesh-link
MP 2
mesh-link
PC2
MPP
MAP 13
MP 3
mesh-link
mesh-link
MP 4
mesh-link
MAP 16
417
Figure 445 Configuring mesh service
3. Click Add.
Figure 446 Creating a mesh service
Item Description
Mesh Service Name Name of the created mesh service.
418
Figure 447 Configuring mesh service
Item Description
Mesh Service Display the selected mesh service name.
Enter the ID of the VLAN whose packets are to be sent tagged. VLAN (Tagged)
VLAN (Tagged)
indicates that the port sends the traffic of the VLAN without removing the VLAN tag.
Enter the ID of the VLAN whose packets are to be sent untagged. VLAN (Untagged)
VLAN (Untagged)
indicates that the ports send the traffic of the VLAN with the VLAN tag removed.
Exclude VLAN Remove the IDs of the VLANs whose packets are to be sent untagged and tagged.
Link Keep Alive Interval Configure the mesh link keep-alive interval.
Security Configuration
419
Item Description
Pre-shared key, which takes one of the following values:
Preshared Key • A string of 8 to 63 characters.
• A valid hexadecimal number of 64 bits.
420
3. Click a mesh service to see its detailed information.
Figure 450 Displaying detailed mesh service information
Field Description
Mesh Profile Number Mesh service number.
421
Figure 451 Mesh policy configuration page
3. Click Add.
Figure 452 Creating a mesh policy
Item Description
Name of the created mesh policy.
Mesh Policy Name The created mesh policies use the contents of the
default mesh policy default_mp_plcy.
422
Figure 453 Configuring a mesh policy
Item Description
Mesh Policy Display the name of the created mesh policy.
Minimum time to hold a link An active link remains up within the link hold time, even if the link
switch margin is reached. This mechanism is used to avoid
frequent link switch.
423
Item Description
Set the link switch margin.
Minimum margin rssi If the RSSI of the new link is greater than that of the current active
link by the link switch margin, active link switch will occur. This
mechanism is used to avoid frequent link switch.
424
Figure 454 Displaying detailed mesh policy information
Field Description
MP Policy Name Name of the mesh policy.
425
Mesh global setup
Mesh basic setup
1. Select Wireless Service > Mesh Service from the navigation tree.
2. Click the Global Setup tab.
Figure 455 Configuring basic mesh settings
Item Description
Make sure the MAC address configured is unused and has the correct
MKD-ID vendor specific part.
The MAC address of an AC should not be configured as the MKD ID.
• Manual—Select one-time dynamic channel selection (DFS) and click
Apply to enable it. After manual mode is selected, if no mesh network is
manually specified when the next calibration interval is reached, the AC
will refresh radio information of all mesh networks that it manages, and
display it on the Radio Info tab of the Mesh Channel Optimize page. You
can view the radio information and select mesh networks for which
one-time DFS will be performed on the Mesh Channel Optimize tab. After
that, if you want the AC to perform DFS for the mesh network, you have
to make this configuration again.
• Auto—Select auto-DFS and click Apply to enable it. Auto-DFS applies to
all mesh networks where the working channels of the radios are
Dynamic Channel Select: automatically selected. With auto DFS enabled, an AC makes DFS
decisions at the calibrate interval automatically.
• Close—Close DFS. At the next calibration interval, the radio information
and channel switching information on the Mesh Channel Optimize page
will be cleared.
By default, DFS for a mesh network is disabled.
IMPORTANT:
Before enabling auto or one-time DFS for a mesh network, make sure auto
mode is selected for the working channel of radios in the mesh network. For
the related configuration, see "Configuring radios."
426
2. Click the Global Setup tab.
Figure 456 Enabling mesh portal service
Manual
1. Select Radio > Radio from the navigation tree, and click the icon for the target AP.
427
Figure 457 Configuring a radio
2. On the page that appears, select a specified channel from the Channel list.
3. Click Apply.
NOTE:
Specify a working channel for the radios of the MAP and MPP. Specify the same working channel for the
radio of the MAP and the radio of the MPP.
Auto
Set the working channel mode on the MPP and MAP to auto so that the working channel is automatically
negotiated when a WDS link is established between the MPP and MAP.
NOTE:
If you configure the working channel mode of the radios of the MPP and MAP as auto, the automatically
selected working channel is a non-radar channel.
Enabling radio
1. Select Radio > Radio from the navigation tree.
428
Figure 458 Enabling a radio
Item Description
The mesh feature supports two topologies. The mesh feature is implemented
Peer MAC Address
through configuration of peer MAC addresses for each AP.
Sets the STP cost of the mesh link to the peer. If not configured, the STP cost is
cos automatically calculated by STP.
You can view the cost of the mesh link on the page shown in Figure 459.
429
Configuring mesh DFS
Displaying radio information
1. Select Wireless Service > Mesh Service from the navigation tree.
2. Click the Mesh Channel Optimize tab.
3. Click the specified mesh network, and click the Radio Info tab.
Figure 460 Displaying radio information
430
NOTE:
• If you select Auto or Close for dynamic channel selection on the Global Setup tab, when you enter the
Mesh Channel Optimize page, the Channel Optimize button is grayed out, and you cannot perform
the operation.
• If you select manual DFS on the Global Setup tab, select mesh networks where DFS will be performed,
and then click Channel Optimize to complete DFS. In auto mode, DFS is performed at the calibration
interval. In manual mode, DFS is performed one time.
Field Description
AP AP name in the mesh network.
You can monitor the mesh link status in real-time on the mesh link monitoring page.
431
Figure 463 Displaying mesh link test information
Configuring the AC
1. Create an MAP and MPP:
432
a. Select AP> AP Setup from the navigation tree.
b. Click Add.
c. On the page that appears, set the AP name to map, select the AP model MSM460-WW, select
Manual from the Serial ID list, enter the AP serial ID, and click Apply.
Figure 465 Configuring an AP
433
b. Click the icon for the mesh service outdoor.
c. Select the AP radios to be bound.
d. Click Bind.
Figure 468 Binding an AP radio to a mesh service
NOTE:
By default, the default mesh policy default_mp_plcy already exists. You can create a mesh policy and
bind the mesh policy to an AP as needed. By default, the default_mp_plcy mesh policy is mapped to
an AP.
434
Figure 470 Configuring mesh portal service
7. Configure the same working channel and enable the radio on the MAP and MPP:
a. Select Radio > Radio from the navigation tree.
b. Click the icon for the target MAP.
Figure 471 Configuring the working channel
435
You can follow this step to configure the working channel for the MPP. The working channel of
the radio on the MPP must be the same as the working channel of the radio on the MAP.
8. Enable radio:
a. Select Radio > Radio from the navigation tree.
b. Select the radio modes to be enabled for the MAP and MPP.
c. Click Enable.
Figure 472 Enabling radio
436
Figure 473 Network diagram
Configuration guidelines
• Configure a peer MAC address for each radio interface. Configure the MAC addresses of AP 2
through AP 5 on AP 1, and configure the MAC address of only AP 1 on AP 2 through AP 5.
• Set the value of maximum links that an MP can form in a mesh network (The default value is 2. It
must be set to 4 in this example.). For more information, see "Configuring a mesh policy."
AC MPP MAP
Configuration guidelines
The mesh configuration in this example is similar to a common wireless mesh configuration. Follow these
guidelines when you configure mesh DFS:
• Configure the working channel mode of the radios that provide mesh services as auto.
• Do not configure any wireless service on radios that provide mesh services.
437
Configuration procedure
The mesh configuration is the same as the normal WLAN mesh configuration. For configuration
procedures, see "WLAN mesh configuration example." Perform the following operations after
completing mesh configuration:
1. (Optional) Set a calibration interval:
a. Select Radio > Calibration from the navigation tree.
b. Click the Parameters tab.
c. On the page that appears, enter the calibration interval 3 and click OK.
438
Figure 475 Setting mesh calibration interval
439
2. Configure mesh DFS:
a. Select Wireless Service > Mesh Service from the navigation tree.
b. Click the Global Setup tab.
c. On the page that appears, select the Manual box for Dynamic Channel Select.
d. Click Apply.
Figure 476 Configuring mesh DFS
440
Figure 478 Displaying mesh channel switching information
441
Configuring an IACTP tunnel and WLAN
roaming
IACTP tunnel
The Inter AC Tunneling Protocol (IACTP) provides a generic packet encapsulation and transport
mechanism for ACs to securely communicate with each other.
IACTP provides a control tunnel to exchange control messages, and a data tunnel to transmit data
packets between ACs. IACTP supports both IPv4 and IPv6.
WLAN roaming, AC backup, and AC-BAS collaboration must support IACTP for inter-AC
communication.
442
Figure 479 Configuring an IACTP tunnel
Item Description
• Enable—Enable IACTP service.
IACTP Tunnel
• Disable—Disable IACTP service.
IP Type Select IPv4 or IPv6.
Optional.
MD5: Select the MD5 authentication mode.
The control message integrity can be verified when the MD5 authentication mode is
Auth Mode selected. The sender (an AC) calculates a digest based on the content of a control
message. On receiving such a message, the receiver (another AC in the roaming group)
will calculate the digest again and compare it against the digest present in the message
to verify the integrity of the packet received. If the digests are the same, the packet is not
tampered.
443
Figure 480 Adding a member to the IACTP tunnel
Item Description
Add the IP address of an AC to a roaming group.
IP Address IMPORTANT:
When you configure a roaming group, the roaming group name configured
for the ACs in the same roaming group must be the same.
Configure the VLAN to which the roaming group member belongs.
This configuration item is optional.
VLAN
If multiple ACs exist in a roaming group, make sure no loop occurs on the
IACTP tunnels between ACs in the group when configure this option.
NOTE:
• The user profile configurations of the ACs in a roaming group must be the same. For more information,
see "Configuring users."
444
Configuring WLAN roaming
Configuring WLAN roaming
1. Select Roam > Roam Group from the navigation tree.
Figure 481 Configuring WLAN roaming
2. View the detailed information and roaming information of the client by clicking a target client. For
more information, see "Displaying information summary."
445
WLAN roaming configuration examples
Intra-AC roaming configuration example
Network requirements
As shown in Figure 483, an AC has two APs associated and all of them are in VLAN 1. A client is
associated with AP 1. Configure intra-AC roaming so that the client can associate with AP 2 when
roaming to AP 2.
Figure 483 Network diagram
Configuration guidelines
When you configure intra-AC roaming, the SSIDs of the two APs must be the same. The same wireless
service must be bound to the radios of the two APs in Bind AP radios to the wireless service:.
Configuring the AC
If remote authentication is required in the authentication mode you select, configure the RADIUS server.
For information about how to configure the RADIUS server, see "Configuring AAA."
1. Create two APs:
a. Select AP > AP Setup from the navigation tree.
b. Click Add.
c. On the page that appears, set the AP name to ap1, select the AP model MSM460-WW, select
manual from the Serial ID list, enter the serial ID of the AP, and click Apply.
d. Follow the same steps to create the other AP.
2. Configure wireless service:
a. Select Wireless Service > Access Service from the navigation tree.
b. Click Add.
446
c. On the page that appears, set the service name to Roam, and click Apply.
NOTE:
For information about how to configure the authentication mode, see "Configuring access services."
Fast roaming can be implemented only when the RSN+802.1X authentication mode is adopted.
447
Figure 485 Enabling radio
d. Click Refresh.
On the Roam Information page that appears, you can see that the client is connected to the
WLAN through AP 2, and the BSSID of AP 2 is 000f-e233-5500.
448
Figure 487 Client status after intra-AC roaming
449
Figure 489 Network diagram
Configuration guidelines
Follow these guidelines when you configure inter-AC roaming:
• The SSIDs and the authentication and encryption modes of two APs should be the same.
• An IACTP tunnel must be configured on both of the two ACs.
Configuring AC 1 and AC 2
If remote authentication is required in the authentication mode you select, configure the RADIUS server.
For information about how to configure the RADIUS server, see "Configuring RADIUS."
1. Establish AC-AP connections:
Configure AC 1 and AC 2 to establish a connection between AP 1 and AC 1, and between AP 2
and AC 2. You see that the two APs are in the running status only after you establish the
connections. To view the AP status, select Summary > AP or AP > AP Setup.
For the related configuration, see "Configuring access services."
NOTE:
For the configuration of authentication mode, see "Configuring access services." Fast roaming
supporting key caching can be implemented only when RSN+802.1X authentication is adopted.
450
Figure 490 Configuring an IACTP tunnel on AC 1
451
Figure 492 Verifying the IACTP tunnel state (2)
452
Figure 494 Verifying inter-AC roaming
b. Select Summary > Client, from the navigation tree on AC 2, select the Detail Information tab,
and click the desired client to view the roaming information of the client.
The roaming information in Figure 496 shows that the client connects to the WLAN through AP
2, and the BSSID of AP 2 is 000f-e233-5500.
453
Figure 496 Client status after intra-AC roaming
454
Configuring WLAN RRM
Radio overview
Radio frequency (RF) refers to electrical signals that can be transferred over the space to a long distance.
802.11b/g in the IEEE 802.11 standards operates at the 2.4 GHz band, 802.11a operates at the 5 GHz
band, and 802.11n operates at both the 2.4 GHz and 5 GHz bands. Radio frequency is allocated in
bands, each of which corresponds to a range of frequencies.
455
Figure 497 Dynamic channel adjustment
456
Figure 498 Power reduction
As shown in Figure 499, when AP 3 fails or goes offline, the other APs increase their transmission power
to cover the signal blackhole.
457
Figure 499 Power increasing
Spectrum analysis
WLAN systems operate on shared bands. Many devices, such as microwave ovens, cordless phones,
and Bluetooth devices also operate on these bands and can negatively affect the WLAN systems.
The spectrum analysis feature is designed to solve this problem. Spectrum analysis delivers the following
functions:
• Identifies five types of interferences and provides interference device reports.
• Calculates the number of interferences on each channel and average and worst channel quality,
and provides channel quality reports.
• The AP collects Fast Fourier Transform (FFT) data, including frequency, FFT power, maximum power,
and FFT duty cycle, and sends the data to the NMS through the AC.
458
• With RRM collaboration enabled, if the detected channel quality is lower than the threshold, the AC
automatically adjusts the working channel upon detecting a channel with a higher quality.
Administrators can view the interference information on the AC, or view real-time spectrum analysis data
on the NMS to locate and remove the interferences.
For more information about WIDS, see "Configuring WLAN security."
Configuring radios
Configuring radio parameters
1. Select Radio > Radio from the navigation tree.
2. Click the icon for the desired AP.
Figure 500 802.11a/b/g/n radio setup
459
Figure 501 802.11ac radio setup
Item Description
AP Name Display the selected AP.
Specify the working channel of the radio, which varies with radio types
and country/region codes. The working channel list varies with device
models.
auto: The working channel is automatically selected. If you select this
Channel
mode, the AP checks the channel quality in the WLAN network, and
selects the channel of the best quality as its working channel.
If you modify the working channel configuration, the transmit power is
automatically adjusted.
The option is available only when the AP supports 802.11n and the radio
802.11n
mode is 802.11n.
460
Item Description
802.11n can bond two adjacent 20-MHz channels together to form a
40-MHz channel. During data forwarding, the two 20-MHz channels can
work separately with one acting as the primary channel and the other
acting as the secondary channel. This provides a simple way of doubling
the data rate.
By default, the channel bandwidth of the 802.11n radio (5 GHz) is 40
MHz, and that of the 802.11n radio (2.4 GHz) is 20 MHz.
802.11ac bonds four adjacent 20-MHz channels together to form an
80-MHz channel, which increases the bandwidth and throughput. Like
802.11n, 802.11ac also ensures the throughput by increasing the
channel usage rate. 802.11ac only supports 5 GHz.
By default, the channel bandwidth of 802.11ac radios is 80 MHz.
If you select the client dot11n-only option, only 802.11n clients are
client dot11n-only allowed to access the wireless network. To provide access for all
802.11a/b/g clients, you must disable this function.
461
Item Description
Select the A-MSDU option to enable A-MSDU.
Multiple MSDUs can be aggregated into a single A-MSDU. This reduces
the MAC header overhead and improves MAC layer forwarding
efficiency.
A-MSDU At present, only A-MSDUs can be received.
IMPORTANT:
When 802.11n radios are used in a mesh WLAN, make sure they have
the same A-MSDU configuration.
IMPORTANT:
When 802.11n radios are used in a mesh WLAN, make sure they have
the same A-MSDU configuration.
This option is available only when the AP supports 802.11ac and the
802.11ac
radio mode is 802.11ac.
Select the client type that is allowed to associate with the radio.
• all type—The radio allows 802.11a/an clients to associate with it.
Access Type • 802.11n—The radio allows 802.11an clients to associate with it.
By default, 802.11ac radio allows 802.11a/11an/ac clients to
associate with it.
462
Figure 502 Radio setup (advanced setup)
Item Description
Preamble is a pattern of bits at the beginning of a frame so that the receiver
can sync up and be ready for the real data.
• Short preamble—Short preamble improves network performance.
Therefore, this option is always selected.
Preamble
• Long preamble—Long preamble ensures compatibility between access
point and some legacy client devices. Therefore, you can select this
option to make legacy client devices support short preamble.
802.11a/802.11n (5 GHz) does not support this configuration.
Adaptive Noise Immunity (ANI). After the ANI function is enabled, the
device automatically adjusts the noise immunity level according to the
ANI surrounding signal environment to eliminate RF interference.
• Enable—Enable ANI.
• Disable—Disable ANI.
Transmit Distance Maximum coverage of a radio.
463
Item Description
Client Max Count Maximum number of clients that can be associated with one radio.
If a frame is larger than the RTS (CTS) threshold, the data collision
avoidance mechanism is used.
A smaller RTS/CTS threshold causes RTS/CTS packets to be sent more
often, consuming more bandwidth. However, the more often RTS/CTS
packets are sent, the quicker the system can recover from collisions.
RTS (CTS) Threshold In a high-density WLAN, you can decrease the RTS threshold to reduce
collisions in the network.
IMPORTANT:
The data collision avoidance mechanism occupies bandwidth. Therefore,
this mechanism applies only to data frames larger than the RTS/CTS
threshold.
Number of beacon intervals between delivery traffic indication message
DTIM Period (DTIM) transmissions. The AP sends buffered broadcast/multicast frames
when the DTIM counter reaches 0.
464
Item Description
Number of retransmission attempts for unicast frames larger than the
Long Retry Threshold
RTS/CTS threshold.
Enabling a radio
1. Select Radio > Radio from the navigation tree.
465
Figure 503 Enabling radio
466
Locking the power
1. Select Radio > Radio from the navigation tree.
Figure 505 Locking the current power
467
Figure 506 Setting 802.11a/802.11b/802.11g rates
468
Table 138 Configuration items
Item Description
Configure rates (in Mbps) for 802.11a.
By default:
• Mandatory rates—6, 12, and 24.
802.11a • Supported rates—9, 18, 36, 48, and 54.
• Multicast rate—Automatically selected from the mandatory rates. The transmission
rate of multicasts in a BSS is selected from the mandatory rates supported by all the
clients.
469
Number of Data rate (Mbps)
MCS index Modulation
spatial streams 800ns GI 400ns GI
3 1 16-QAM 26.0 28.9
For example, if you specify the maximum MCS index as 5 for mandatory rates, rates corresponding to
MCS indexes 0 through 5 are configured as 802.11n mandatory rates.
470
• Mandatory rates must be supported by the AP and the clients that want to associate with the AP.
• Supported rates allow some clients that support both mandatory and supported rates to choose
higher rates when communicating with the AP.
• Multicast MCS: Specifies 802.11n multicast data rates.
2. Configure the 802.11n rate as described in Table 141, and click Apply.
Table 141 Configuration items
Item Description
Set the maximum MCS index for 802.11n mandatory rates.
Supported Maximum MCS Set the maximum MCS index for 802.11n supported rates.
NOTE:
When 802.11n radios are used in a mesh WLAN, make sure they have the same MCS configuration.
471
VHT-MCS data rate tables for 20 MHz, 40 MHz, and 80 MHz are shown in Table 142, Table 143,
and Table 144, respectively. For the entire table, see IEEE Draft P802.11ac_D5.0.
The value range for NSS is 1 to 8, and the value range for VHT-MCS index in each NSS is 0 to 9.
NOTE:
Support for NSS depends on the device model.
Table 142 VHT-MCS data rate table (20 MHz Nss =1)
9 not valid
Table 143 VHT-MCS data rate table (40 MHz Nss =1)
472
Table 144 VHT-MCS data rate table (80 MHz Nss =1)
2. Configure the 802.11ac rate as described in Table 145, and click Apply.
473
Table 145 Configuration items
Item Description
Select Mandatory Maximum NSS and set the maximum 802.11ac
mandatory NSS.
Mandatory Maximum NSS IMPORTANT:
If you select the 802.11n and 802.11ac or 802.11ac option, you must
configure the mandatory maximum NSS.
Set the multicast NSS for 802.11ac.
The multicast NSS is adopted only when all the clients use 802.11ac. If a
non 802.11ac client exists, multicast traffic is transmitted at a rate
determined by the client type.
Set the maximum NSS for 802.11ac supported rates. The supported
Supported Maximum NSS maximum NSS must be equivalent to or larger than the mandatory
maximum NSS.
474
2. Configure channel scanning as described in Table 146, and click Apply.
Table 146 Configuration items
Item Description
Set the scan mode.
• Auto—Legal channels with the scanning mode under country/region
Scan Mode
code are scanned.
• All—All the channels of the radio band are scanned.
Some of 802.11h channels, also called radar channels, overlap some
802.11a channels. If the device operates on an overlapping channel, the
service quality of the WLAN might be affected. With this function
enabled, the device selects a working channel from non-802.11h
channels belonging to the configured country/region code to avoid
Scan Non-802.11h Channel channel collision.
Selecting the Scan Non-802.11h Channel option enables the function of
scanning non-802.11h channels.
By default, the scan mode is auto, that is, all channels of the
country/region code being set are scanned.
475
Item Description
To avoid selecting improper channels, you can exclude specific channels
from automatic channel selection. The excluded channels will not be
available for initial channel selection, DFS, and mesh DFS. This feature
does not affect rogue detection and WIDS.
Select a channel and add it to the 5GHz Excluded Channel or 2.4GHz
Excluded Channel.
By default, no channels exist in the 5GHz Excluded Channel or 2.4GHz
Excluded Channel.
IMPORTANT:
• The channel exclusion list is not restricted by the country/region code.
You can add channels not supported by the country/region code to
the list, and changing the country/region code does not change the
channel list. The device will select an available channel from the
5GHz Excluded
channels supported by the country/region code and not in the
Channel/2.4GHz Excluded
channel exclusion list. When you configure this feature, do not add all
Channel
channels supported by the country/region code to the channel
exclusion list.
• This feature takes effect only for initial channel selection, DFS, and
mesh DFS.
• If you add an automatically selected channel into the channel
exclusion list, the AC disables the radio, enables the radio, and then
selects an available channel from the channels supported by the
country/region code and not in the channel exclusion list.
• If you add an automatically selected primary channel to the channel
exclusion list, the AC selects another available primary channel. If you
add a secondary channel into the channel exclusion list in this case,
the AC selects another secondary channel. If the AP cannot find an
available secondary channel, no channels are available for the
wireless, mesh, and WDS services.
Configuring calibration
Executing channel persistence
Configuration guidelines
• Channel persistence is applicable to radios used for wireless access, and the radios must have
channels.
• Channel persistence is not applicable to auto APs, nor APs operating in monitor mode.
• The device switches to a new channel if radar signals are detected on the channel, regardless of
whether it is a persistent channel or not.
• If a radio is configured to automatically select its channel mode, the channel persistence operation
does not take effect if no channel is selected.
• If a radio is configured to automatically select its channel mode and channel persistence is
executed after a channel is selected, the device automatically saves the channel value through the
Channel option on the Radio page. After AC reboots, AP continues to use the persistent channel.
476
• If channel persistence is executed on a locked channel, the channel is unlocked. The device
automatically saves the channel value through the Channel option on the Radio page. After AC
reboots, AP continues to use the persistent channel.
Configuration procedure
1. Select Radio > Calibration from the navigation tree.
2. Click the Operation tab.
3. Select the box of the target AP.
4. Click Channel Persistent.
Figure 510 Executing channel persistence
The device executes channel persistence on automatically selected or adjusted channels. After the AC
reboots, the AP continues to use the persistent channel.
Configuration procedure
1. Select Radio > Calibration from the navigation tree.
2. Click the Operation tab.
3. Select the box of the target AP.
4. Click Power Persistent.
Figure 511 Configuring power persistence
477
The device executes power persistence on the adjusted power. If the adjusted power value is not the
default value set through the Transmit Power option on the Radio page, the device automatically saves
the power value. After the AC reboots, the AP continues to use the adjusted power.
Setting parameters
1. Select Radio > Calibration from the navigation tree.
2. Click the Parameters tab.
478
Figure 512 Setting channel calibration
479
3. Configure channel calibration as described in Table 147, and click Apply.
Table 147 Configuration items
Item Description
• RTS/CTS—Use RTS/CTS mode to implement 802.11g protection.
Before sending data to a client, an AP sends an RTS packet to the
client, ensuring that all the devices within the coverage of the AP do
not send data in the specified time after receiving the RTS packet.
Upon receiving the RTS packet, the client will send a CTS packet
802.11g again, ensuring that all the devices within the coverage of the client
Protection do not send data in the specified time.
Mode
• CTS-to-Self—Use CTS-to-Self mode to implement 802.11g protection.
When an AP sends packets to a client, it uses its IP address to send
a CTS packet to inform the client that it will send a packet, ensuring
that all the devices within the coverage of the AP do not send data in
the specified time.
• 802.11b devices and 802.11g devices use different modulation
modes, so 802.11g protection needs to be enabled for a 802.11g
device to send RTS/CTS or CTS-to-self packets to 802.11b devices,
which will defer access to the medium.
• Enable—Enable 802.11g protection.
Basic Setup • Close—Disable 802.11g protection.
An AP running 802.11g uses the 802.11g protection function in the
802.11g
following two cases:
Protection
• An 802.11b client is associated with it.
• It detects APs or clients running 802.11b on the same channel.
IMPORTANT:
• Enabling 802.11g protection reduces network performance.
• Enabling 802.11g protection applies to the second case only,
because 802.11g protection is always enabled for the first case.
802.11n
Both RTS/CTS and CTS-to-Self modes can be adopted. The
Protection
implementation of the two modes is the same as 802.11g.
Mode
• Enable—Enable 802.11n protection. When non 802.11n wireless
802.11n devices or non 802.11n clients exist within the coverage of the AP,
Protection you need to enable 802.11n protection.
• Close—Disable 802.11n protection.
Calibration Channel and power calibration interval. A calibration interval takes effect on both mesh
Interval network channel calibration and channel and power calibration of wireless services.
480
Item Description
• Close—Disable the DFS function.
• Auto—With auto DFS enabled, an AC performs DFS for a radio
when certain trigger conditions are met on the channel, and returns
the result to the AP after a calibration interval (the default calibration
interval is 8 minutes, which can be set through the Calibration
Interval option). After that, the AC will make DFS decisions at the
calibration interval automatically.
Dynamic • Manual—With one-time DFS configured for a radio, an AC performs
Channel Select DFS for the radio when certain trigger conditions are met on the
channel, and returns the result to the AP after a calibration interval.
After that, if you want the AC to perform DFS for the radio, you have
to make this configuration again.
IMPORTANT:
If you select the manual mode, click Calibration on the Calibration page
every time you perform channel calibration.
CRC Error
Set the CRC error threshold value, in percentage.
Threshold
Channel
Interference Set the channel interference threshold value, in percentage.
Threshold
481
Item Description
• Close—Disable transmit power control (TPC).
• Auto—With auto TPC enabled, the AC performs TPC for an AP upon
certain interference and returns the result to the AP after a calibration
interval (the default calibration interval is 8 minutes, which can be
set through the Calibration Interval option). After that, the AC makes
TPC decisions at the calibration interval automatically.
• Manual—With one-time TPC configured, an AC performs TPC for
Dynamic the AP upon certain interference, and returns the result to the AP after
Power Select a calibration interval (the default calibration interval is 8 minutes,
which can be set through the Calibration Interval option). After that,
if you want the AC to perform TPC for the AP, you have to make this
configuration again.
IMPORTANT:
If you select the manual mode, click Calibration on the Calibration page
every time you perform channel calibration.
Adjacency Specify the neighbor APs that trigger automatic power adjustment. The
Factor neighbor APs are managed by the same AC.
Channel switching results in temporary service interruption, so use the channel calibration function with
caution.
NOTE:
Before entering the Radio Group page, configure channel or power adjustment on the Parameters tab.
482
3. Click Add.
The Radio Group page appears.
Figure 513 Configuring a radio group
4. Configure the radio group as described in Table 148, and click Apply.
Table 148 Configuration items
Item Description
Group ID ID of the radio group
Specify that the current channel keeps unchanged within the specified time after a
channel adjustment (automatic or initial channel selection).
Channel
Holddown IMPORTANT:
Interval
The AC immediately selects another channel when it detects any radar signals on the
current channel, and then resets the channel holddown timer.
Power
Specify that the current power keeps unchanged within the specified time after a
Holddown
power adjustment (automatic power adjustment).
Interval
• Select the target radios from the Radios Available area, and then click << to add
them into the Radios Selected area.
Radio List
• Select the radios to be removed from the Radios Selected, and the click >> to
remove them from the radio group.
483
Calibration operations
If RRM is not enabled, or the radio to be displayed works on a fixed channel, you can only view the work
channel and the power of the radio on the Operations tab in the Radio > Calibration page. Other
information such as interference observed and the number of neighbors is displayed when RRM is
enabled, that is, dynamic power selection or automatic dynamic frequency selection is enabled. For the
configuration of RRM parameters, see "Setting parameters."
Item Description
Channel NO Running channel.
484
Figure 515 Neighbor information
Field Description
AP MAC Address MAC address of a neighbor AP.
RSSI (dBm) Received signal strength indication (RSSI) of the AP, in dBm.
485
Figure 516 History information
Field Description
Radio Radio ID of the AP.
Chl Channel on which the radio operates in case of the change of channel or power.
Load Load observed on the radio in percentage in case of the change of channel or power.
Util Utilization of the radio in percentage in case of the change of channel or power.
Reason for the change of channel or power, such as Interference, packets discarded,
Reason
retransmission, radar or coverage.
Selecting an antenna
1. Select Radio > Antenna Switch to select an appropriate antenna for the corresponding radio.
2. Select the antenna type for a specific radio from the Antenna list.
3. Click Apply.
486
Figure 517 Antenna switch
NOTE:
HP recommends that you enable spectrum analysis for APs operating in monitor or hybrid mode.
487
Figure 518 Spectrum analysis
Item Description
• Enable—Enable spectrum analysis.
Spectrum Analysis • Disable—Disable spectrum analysis. IMPORTANT:
By default, spectrum analysis is disabled. Spectrum analysis takes effect only
when enabled both globally and on a
Enable spectrum See "Enabling spectrum analysis on a radio.
analysis on a radio radio."
488
Configuring event-driven RRM
This function enables the AC to start calculating the channel quality, and switch to a new channel with a
higher quality when the channel quality is lower than the sensitivity level.
Table 153 Configuration items
Item Description
• Enable—Enable event-driven RRM.
Event Driven RRM • Disable—Disable event-driven RRM.
By default, spectrum analysis does not trigger channel adjustment.
• High—Specify the high sensitivity threshold.
• Low—Specify the low sensitivity threshold.
Sensitivity Threshold
• Medium—Specify the medium sensitivity threshold.
By default, the sensitivity threshold is medium.
Item Description
Configure channel quality trap
• Enable—The AC sends SNMP traps to the NMS when the channel quality is
lower than the threshold.
• Disable—The AC does not send SNMP traps to the NMS when the channel
Channel Quality Trap
quality is lower than the threshold.
By default, the AC sends SNMP traps to the NMS when the channel quality is
lower than the threshold.
Configure the AC to send SNMP traps to the NMS when a specified interference
device is detected.
• To add a device type to the Device Types area, select a device type in the Trap
on Device Types area, and click <<.
• To remove a device type from the Device Types area, select a device type in this
Trap on Device Types area, and click >>.
By default, all device types in the Trap on Device Types area are detected.
IMPORTANT:
Before using this function, you must select the target devices in the Devices Types to
Detect area. Otherwise, interference device trap does not take effect.
489
Enabling spectrum analysis on a radio
1. Select Radio > Spectrum Analysis from the navigation tree.
2. Click Radio.
Figure 519 Enabling spectrum analysis
Field Description
Interference severity level in the range of 1 to 100. A greater value indicates a stronger
Severity Index
interference.
Duty Cycle(%) Percentage of time for which the interference device was active.
490
2. Click Channel Quality Info.
Figure 521 Displaying channel quality information
Configuration guidelines
If you select manual channel adjustment, click Channel Optimize on the Operation tab every time you
perform manual channel adjustment.
Configuration procedure
1. Before you configure manual channel adjustment, configure AP 1 on the AC to establish a
connection between them.
For the related configuration, see "Configuring access services."
2. Configure manual channel adjustment:
a. Select Radio > Calibration from the navigation tree.
b. Click the Parameters tab.
c. Select Manual from the Dynamic Channel Select list.
d. Click Apply.
491
Figure 523 Configuring manual channel adjustment
492
3. Perform manual channel adjustment:
a. Select Radio > Calibration from the navigation tree.
b. On the Operation tab, select the box of the target radio.
c. Click Channel Optimize.
Figure 524 Performing manual channel adjustment
493
Figure 525 Network diagram
Configuration procedure
1. Before you configure automatic power adjustment, configure AP 1 through AP 4 on the AC to
establish a connection between the AC and each AP.
For the related configuration, see "Configuring access services."
2. Configure automatic power adjustment:
a. Select Radio > Calibration from the navigation tree.
b. Click the Parameters tab.
c. Select Auto from the Dynamic Power Select list.
d. Click Apply.
494
Figure 526 Configuring automatic power adjustment
495
Verifying the configuration
• You can view the power of each AP on the Operation tab you enter by selecting Radio > Calibration
from the navigation tree.
• When AP 4 joins (the adjacency number becomes 3), the maximum number of neighbors reaches
the upper limit (3 by default), and the AC performs power adjustment after the calibration interval.
You can view the detailed information, such as decrease of the Tx power value, on the History Info
tab you enter by selecting Radio > Calibration from the navigation tree, selecting the Operation tab,
and then selecting History Info.
Configuration procedure
1. Before you configure a radio group, configure AP 1 through AP 4 on the AC to establish a
connection between the AC and each AP.
For the related configuration, see "Configuring access services."
2. Configure automatic channel and power adjustment:
a. Select Radio > Calibration from the navigation tree.
b. Click the Parameters tab.
c. Select Auto from the Dynamic Channel Select list, select Auto from the Dynamic Power Select list,
and click Apply.
496
Figure 528 Configuring automatic channel and power adjustment
497
3. Configure a radio group:
a. Select Radio > Calibration from the navigation tree.
b. Click Radio Group.
c. Click Add.
d. On the page that appears, enter the channel holddown interval 20 and enter the power
holddown interval 30.
e. In the Radios Available area, select the target radios and click << to add them into the Radios
Selected area.
f. Click Apply.
Figure 529 Configuring the radio group
498
Figure 530 Network diagram
Configuration procedure
1. Configure AP 1 to operate in normal mode. For more information, see "Configuring WLAN
access."
2. Configure AP 2 to operate in monitor mode. For more information, see "Configuring WLAN
security."
3. Enable spectrum analysis on a specified radio:
a. Select Radio > Spectrum Analysis from the navigation tree.
b. Click Radio.
Figure 531 Configuring radio
499
c. Enable spectrum analysis, disable channel quality trap (enabled by default), and keep
Microwave oven and Bluetooth in the Trap on Device Types area (remove other devices from
the area by selecting them and clicking >>).
d. Click OK.
Figure 532 Configuring spectrum analysis
500
Configuring 802.1X
802.1X is a port-based network access control protocol initially proposed by the IEEE 802 LAN/WAN
committee for the security of wireless LANs (WLANs). It has been widely used on Ethernet networks for
access control.
802.1X controls network access by authenticating the devices connected to 802.1X-enabled LAN ports.
You can also configure the port security feature to perform 802.1X. Port security combines and extends
802.1X and MAC authentication. It applies to a network, a WLAN, for example, that requires different
authentication methods for different users on a port. For more information about port security, see HP
Unified Wired-WLAN Products Security Configuration Guide.
Overview
802.1X architecture
802.1X operates in the client/server model. It has three entities: the client (supplicant), the network
access device (authenticator), and the authentication server, as shown in Figure 533.
Figure 533 802.1X architecture
Client
• Client—A user terminal seeking access to the LAN. It must have 802.1X software to authenticate to
the network access device.
• Network access device—Authenticates the client to control access to the LAN. In a typical 802.1X
environment, the network access device uses an authentication server to perform authentication.
• Authentication server—Provides authentication services for the network access device. The
authentication server authenticates 802.1X clients by using the data sent from the network access
device, and returns the authentication results for the network access device to make access
decisions. The authentication server typically is a RADIUS server. In a small LAN, you can also use
the network access device as the authentication server.
For more information about the 802.1X protocol, see HP Unified Wired-WLAN Products Security
Configuration Guide.
501
• Port-based access control—Once an 802.1X user passes authentication on a port, any subsequent
user can access the network through the port without authentication. When the authenticated user
logs off, all other users are logged off.
• MAC-based access control—Each user is authenticated separately on a port. When a user logs off,
no other online users are affected.
802.1X timers
This section describes the timers used on an 802.1X device to guarantee that the client, the device, and
the RADIUS server can interact with each other correctly.
• Username request timeout timer—Starts when the device sends an EAP-Request/Identity packet to
a client in response to an authentication request. If the device receives no response before this timer
expires, it retransmits the request. The timer also sets the interval at which the network device sends
multicast EAP-Request/Identity packets to detect clients that cannot actively request authentication.
• Client timeout timer—Starts when the access device sends an EAP-Request/MD5 Challenge packet
to a client. If no response is received when this timer expires, the access device retransmits the
request to the client.
• Server timeout timer—Starts when the access device sends a RADIUS Access-Request packet to the
authentication server. If no response is received when this timer expires, the access device
retransmits the request to the server.
• Handshake timer—Sets the interval at which the access device sends client handshake requests to
check the online status of a client that has passed authentication. If the device receives no response
after sending the maximum number of handshake requests, it considers that the client has logged
off. For information about how to enable the online user handshake function, see "Configuring
802.1X on a port."
• Quiet timer—Starts when the access device sends a RADIUS Access-Request packet to the
authentication server. If no response is received when this timer expires, the access device
retransmits the request to the server.
• Periodic online user re-authentication timer—Sets the interval at which the network device
periodically re-authenticates online 802.1X users. For information about how to enable periodic
online user re-authentication on a port, see "Configuring 802.1X on a port."
Configuration prerequisites
• Configure an ISP domain and AAA scheme (local or RADIUS authentication) for 802.1X users. For
more information, see "Configuring AAA" and "Configuring RADIUS."
• If you use local authentication, create user accounts on the device and assign the LAN access
service to the users. For more information, see "Configuring users."
• If you use RADIUS authentication, create user accounts on the RADIUS server.
• Configure a special local EAP server on the device to use EAP relay if the RADIUS server does not
support any EAP authentication method or when local authentication is used. For more information,
see "Configuring the local EAP service."
502
Configuration procedure
Task Description
Required.
Enable 802.1X authentication globally and configure the authentication
1. Configuring 802.1X globally
method and advanced parameters.
By default, 802.1X authentication is disabled globally.
Required.
Enable 802.1X authentication on specified ports and configure 802.1X
2. Configuring 802.1X on a port
parameters for the ports.
By default, 802.1X authentication is disabled on a port.
503
• Whether the RADIUS server supports EAP packets.
• The authentication methods supported by the 802.1X client and the RADIUS server.
If the client is using only MD5-Challenge EAP authentication or the "username + password" EAP
authentication initiated by an H3C iNode 802.1X client, you can use both EAP termination and EAP relay.
To use EAP-TL, PEAP, or any other EAP authentication methods, you must use EAP relay.
4. Click Advanced to expand the advanced 802.1X configuration area.
Figure 535 Advanced configuration
Item Description
Specify whether to enable the quiet timer.
Quiet The quiet timer enables the network access device to wait a period of time before it
can process any authentication request from a client that has failed an 802.1X
authentication.
504
Item Description
Re-Authentication
Set the periodic online user re-authentication timer.
Period
IMPORTANT:
Do not change the timer parameters of global 802.1X from their default values unless you have
determined that the changes would better the interaction process.
505
3. Configure 802.1X features on a port, as described in Table 157.
4. Click Apply.
Table 157 Configuration items
Item Description
Select the port to be enabled with 802.1X authentication. Only 802.1X-disabled ports
are available.
802.1X configuration takes effect on ports only when 802.1X is enabled both globally
Port and on the ports.
NOTE:
802.1X is mutually exclusive with the link aggregation group or service loopback group
configuration on a port.
Set the access control method for the port: MAC Based or Port Based.
Port Control NOTE:
To use both 802.1X and portal authentication on a port, you must select MAC Based.
Max Number of
Set the maximum number of concurrent 802.1X users on the port.
Users
506
Item Description
Specify whether to enable periodic online user re-authentication on the port.
Periodic online user re-authentication tracks the connection status of online users and
updates the authorization attributes assigned by the server, such as the ACL, and VLAN.
The re-authentication interval is specified by the Re-Authentication Period setting in Table
156.
NOTE:
• The periodic online user re-authentication timer can also be set by the authentication
Enable server in the session-timeout attribute. The server-assigned timer overrides the timer
Re-Authentication setting on the access device, and enables periodic online user re-authentication, even
if the function is not configured. Support for the server assignment of re-authentication
timer and the re-authentication timer configuration on the server vary with servers.
• The VLAN assignment status must be consistent before and after re-authentication. If
the authentication server has assigned a VLAN before re-authentication, it must also
assign a VLAN at re-authentication. If the authentication server has assigned no VLAN
before re-authentication, it must not assign one at re-authentication. Violation of either
rule can cause the user to be logged off. The VLANs assigned to an online user before
and after re-authentication can be the same or different.
Specify an existing VLAN as the guest VLAN. For more information, see "Configuring an
Guest VLAN
802.1X guest VLAN."
507
Feature Relationship description
The 802.1X guest VLAN function has higher priority than
Port intrusion protection on a port that the block MAC action, but lower priority than the
performs MAC-based access control shutdown port action of the port intrusion protection
feature.
Configuration prerequisites
• Create the VLAN to be specified as the 802.1X guest VLAN.
• If the 802.1X-enabled port performs port-based access control, enable 802.1X multicast trigger at
the CLI. (802.1X multicast trigger is enabled by default.)
• If the 802.1X-enabled port performs MAC-based access control, configure the port as a hybrid port,
enable MAC-based VLAN on the port, and assign the port to the 802.1X guest VLAN as an
untagged member.
Configuration prerequisites
• Create the VLAN to be specified as the 802.1X Auth-Fail VLAN.
• If the 802.1X-enabled port performs port-based access control, enable 802.1X multicast trigger.
(802.1X multicast trigger is enabled by default.)
• If the 802.1X-enabled port performs MAC-based access control, configure the port as a hybrid port,
enable MAC-based VLAN on the port, and assign the port to the Auth-Fail VLAN as an untagged
member.
508
Configuring portal authentication
Overview
Portal authentication helps control access to the Internet. It is also called Web authentication. A website
implementing portal authentication is called a portal website.
With portal authentication, an access device redirects all users to the portal authentication page. All
users can access the free services provided on the portal website. However, to access the Internet, a user
must pass portal authentication.
A user can access a known portal website and enter username and password for authentication. This
authentication mode is called active authentication. There is also another authentication mode, forced
authentication, in which the access device forces a user who is trying to access the Internet through HTTP
to log on to a portal website for authentication.
The portal feature provides the flexibility for ISPs to manage services. A portal website can, for example,
present advertisements and deliver community and personalized services. In this way, broadband
network providers, equipment vendors, and content service providers form an industrial ecological
system.
A typical portal system comprises these basic components: authentication client, access device, portal
server, authentication/accounting server, and security policy server.
Figure 537 Portal system components
Authentication/accounting
Authentication client server
509
2. On the authentication homepage/authentication dialog box, the user enters and submits the
authentication information, which the portal server then transfers to the access device.
3. Upon receipt of the authentication information, the access device communicates with the
authentication/accounting server for authentication and accounting.
4. After successful authentication, the access device checks whether there is a corresponding security
policy for the user. If not, it allows the user to access the Internet. Otherwise, the client
communicates with the access device and the security policy server for security check. If the client
passes security check, the security policy server authorizes the user to access the Internet
resources.
NOTE:
The Web interface of the device supports configuring portal authentication only on Layer 3 interfaces. For
more information about portal authentication, see HP Unified Wired-WLAN Products Security
Configuration Guide.
Configuration prerequisites
Although the portal feature provides a solution for user identity authentication and security checking, the
portal feature cannot implement this solution by itself. RADIUS authentication needs to be configured on
the access device to cooperate with the portal feature to complete user authentication.
The prerequisites for portal authentication configuration are as follows:
• The portal server and the RADIUS server have been installed and configured correctly. Local portal
authentication requires no independent portal server.
• With re-DHCP authentication, the IP address check function of DHCP relay is enabled on the access
device, and the DHCP server is installed and configured correctly.
• The portal client, access device, and servers can reach each other.
• With RADIUS authentication, usernames and passwords of the users are configured on the RADIUS
server, and the RADIUS client configurations are performed on the access device. For information
about RADIUS client configuration, see "Configuring RADIUS."
• To implement extended portal functions, install and configure IMC EAD. Make sure the ACLs
configured on the access device correspond to those specified for the resources in the quarantined
area and for the restricted resources on the security policy server. For information about security
policy server configuration on the access device, see "Configuring RADIUS."
Configuration procedure
Step Remarks
Required.
Configure a portal server, apply the portal server to a Layer 3
1. Configuring the portal service
interface, and configure the portal authentication parameters.
By default, no portal server is configured.
510
Step Remarks
Optional.
2. Configuring advanced
parameters for portal Specify an auto redirection URL, set the time that the device must wait
authentication before redirecting an authenticated user to the auto redirection URL,
and add Web proxy server port numbers.
Optional.
Configure a portal-free rule, specifying the source and destination
information for packet filtering.
3. Configuring a portal-free rule A portal-free rule allows specified users to access specified external
websites without portal authentication. Packets matching a portal-free
rule will not trigger portal authentication and the users can directly
access the specified external websites.
By default, no portal-free policy is configured.
511
Figure 538 Portal server configuration
512
Table 160 Configuration items
Item Description
Interface Specify the Layer 3 interface to be enabled with portal authentication.
Specify the portal server to be applied on the specified interface. Options include:
• Select Server—Select an existing portal server from the Portal Server list.
• New Server—If you select Add under this option from the list, the portal server
configuration area, as shown in Figure 540, will be displayed at the lower part of the
page. You can add a remote portal server and apply the portal server to the interface.
Portal Server
For detailed configuration, see Table 161.
• Enable Local Server—If you select this option from the list, the local portal service
configuration area, as shown in Figure 541, will be displayed at the lower part of the
page. You can configure the parameters for local portal service. For detailed
configuration, see Table 162.
Specify the IP address and mask of the authentication subnet. This field is configurable
when you select the Layer3 mode (cross-subnet portal authentication).
By configuring an authentication subnet, you specify that only HTTP packets from users on
the authentication subnet can trigger portal authentication. If an unauthenticated user is
Auth Network IP
not on any authentication subnet, the access device discards all the user's HTTP packets
Network Mask that do not match any portal-free rule.
IMPORTANT:
The authentication subnet in direct mode is any source IP address, and that in re-DHCP
mode is the private subnet to which the interface's private IP address belongs.
Specify the authentication domain for Layer 3 portal users.
After you specify an authentication domain on a Layer 3 interface, the device will use the
authentication domain for authentication, authorization, and accounting (AAA) of the
Authentication portal users on the interface, ignoring the domain names carried in the usernames. You
Domain can specify different authentication domains for different interfaces as needed.
The available authentication domains are those specified on the page you enter by
selecting Authentication > AAA from the navigation tree. For more information, see
"Configuring AAA."
513
Figure 540 Adding a portal server
Item Description
Server Name Enter a name for the remote portal server.
Enter the shared key to be used for communication between the device and the remote
Key
portal server.
Specify the URL for HTTP packets redirection, in the format http://ip-address. By default,
the IP address of the portal server is used in the URL.
URL IMPORTANT:
Redirection URL supports domain name resolution. However, you must configure a
portal-free rule and add the DNS server address into the portal-free address range.
Item Description
Server Name Specify the local portal server name.
514
Item Description
Specify the IP address of the local portal server. You need to specify the IP address of
IP
the interface where the local portal server is applied.
URL IMPORTANT:
• To use the local portal server for stateful failover in a wireless environment, you must
specify the redirection URL, and the IP address of the URL must be the virtual IP
address of the VRRP group where the VRRP downlink resides.
• URL redirection supports domain name resolution, but you need to configure a
portal-free rule and add the DNS server address into the portal-free address range.
Specify the protocol to be used for authentication information exchange between the
Protocol
local portal server and the client. It can be HTTP or HTTPS.
Specify the PKI domain for HTTPS. This field is configurable when you select HTTPS.
The available PKI domains are those specified on the page you enter by selecting
Authentication > Certificate Management from the navigation tree. For more
information, see "Managing certificates."
PKI Domain
IMPORTANT:
The service management, local portal authentication, and local EAP service modules
always reference the same PKI domain. Changing the referenced PKI domain in any of the
three modules will also change that referenced in the other two modules.
Specify the authentication page files to be bound with SSIDs as required.
After you bind SSIDs with authentication page files, when a user access the portal
page, the local portal server pushes the authentication pages according to the SSID of
Page Customization the user login interface and the bound authentication page file.
SSID By default, an SSID is not bound with any authentication page file. In this case, the
Page File system pushes the default authentication pages.
You can edit an authentication page file as required and save it in the root directory or
the portal directory under the root directory of the access device. For rules of
customizing authentication pages, see "Customizing authentication pages."
515
Figure 542 Advanced configuration
Item Description
Add the Web proxy server ports to allow HTTP requests proxied by the specified proxy
servers to trigger portal authentication. By default, only HTTP requests that are not
proxied can trigger portal authentication.
Different clients may have different Web proxy configurations. To make sure that clients
using a Web proxy can trigger portal authentication, you must first complete some other
relevant configurations. When the IMC portal server is used, you must first complete the
following configurations:
• If the client does not specify the portal server's IP address as a proxy exception, ensure
the IP connectivity between the portal server and the Web proxy server and perform
the following configurations on the IMC portal server:
Select NAT as the type of the IP group associated with the portal device.
Specify the proxy server's IP address as the IP address after NAT.
Web Proxy Server Configure the port group to support NAT.
Ports • If the client specifies the portal server's IP address as an exception of the Web proxy
server, configure the IP group and port group to not support NAT.
IMPORTANT:
• If a user's browser uses the Web Proxy Auto-Discovery (WPAD) protocol to discover
Web proxy servers, add the port numbers of the Web proxy servers on the device, and
configure portal-free rules to allow user packets destined for the IP address of the
WPAD server to pass without authentication.
• If the Web proxy server port 80 is added on the device, clients that do not use a proxy
server can trigger portal authentication only when they access a reachable host
enabled with the HTTP service.
• Authorized ACLs to be assigned to users who have passed portal authentication must
contain a rule that permits the Web proxy server's IP address. Otherwise, the user
cannot receive heartbeat packets from the remote portal server.
Specify the auto redirection URL to which users will be automatically redirected after they
pass portal authentication.
Redirection URL To access the network, an unauthenticated user either goes to or is automatically forced
to the portal authentication page for authentication. If the user passes portal
authentication and the access device is configured with an auto redirection URL, the
access device will redirect the user to the URL after a specified period of time.
516
Item Description
Period of time that the device must wait before redirecting an authenticated portal user to
Wait-Time
the auto redirection URL.
3. Click Add.
The page for adding a new portal-free rule appears.
Figure 544 Adding a portal-free rule
517
Table 164 Configuration items
Item Description
Number Specify the sequence number of the portal-free rule.
Source IP address
Specify the source IP address and mask of the portal-free rule.
Mask
IMPORTANT:
Source MAC
If you configure both the source IP address and the source MAC address, make sure
that the mask of the specified source IP address is 255.255.255.255. Otherwise, the
specified source MAC address will not take effect.
Specify the source VLAN of the portal-free rule.
IMPORTANT:
Source-VLAN
If you configure both a source interface and a source VLAN for a portal-free rule, make
sure that the source interface is in the source VLAN. Otherwise, the portal-free rule will
not take effect.
Destination IP Address
Specify the destination IP address and mask of the portal-free rule.
Mask
518
Table 165 Main authentication page file names
Online page.
online.htm
Pushed after the user gets online for online notification.
519
<p><input type=SUBMIT value="Logoff" name="PtButton" style="width:60px;">
</form>
Logging off a user who closes the logon success or online page
After a user passes authentication, the system pushes the logon success page named logonSuccess.htm.
If the user initiates another authentication through the logon page, the system pushes the online page
named online.htm. You can configure the device to forcibly log off the user when the user closes either
of these two pages. To do so, add the following contents in logonSuccess.htm and online.htm:
1. Reference to file pt_private.js.
2. Function pt_unload(), which is for triggering page unloading.
3. Function pt_submit(), the event handler function for Form.
4. Function pt_init(), which is for triggering page loading.
The following is a script example with the added contents highlighted in gray:
<html>
<head>
<script type="text/javascript" language="javascript" src="pt_private.js"></script>
</head>
<body onload="pt_init();" onbeforeunload="return pt_unload();">
... ...
<form action=logon.cgi method = post onsubmit="pt_submit()">
... ...
</body>
</html>
520
If a user refreshes the logon success or online page, or jumps to another website from either of the pages,
the device also logs off the user.
Google Chrome browsers do not support this function.
Make sure that the browser of an authentication client permits pop-ups or permits pop-ups from the
access device. Otherwise, the user cannot log off by closing the logon success or online page, and can
only click Cancel to return back to the logon success or online page
521
Figure 545 Network diagram
RADIUS server
1.1.1.2/24
Vlan-int4
Vlan-int2 1.1.1.1/24
192.168.1.1/24
IP network
Vlan-int3
3.3.3.3/24
Client AP AC
SSID: abc
Gateway: 192.168.1.1/24
Configuration prerequisites
Complete the follow tasks before you perform the portal configuration:
• Configure IP addresses for the devices, as shown in Figure 545, and make sure they can reach each
other.
• Configure PKI domain test, and make sure that a local certificate and a CA certificate are obtained
successfully. For more information, see "Managing certificates."
• Complete the editing of the authentication page files to be bound with the client SSID.
• Configure the RADIUS server correctly to provide authentication and accounting functions for users.
Configuring the AC
1. Configure the RADIUS scheme system:
a. From the navigation tree, select Authentication > RADIUS.
b. Click Add.
c. On the page that appears, enter the scheme name system, select the server type Extended, and
select Without domain name for Username Format.
d. In the RADIUS Server Configuration area, click Add.
e. On the page that appears, select Primary Authentication as the server type, enter the IP
address 1.1.1.2, the port number 1812, and the key expert, enter expert again in the Confirm
Key field, and click Apply.
The RADIUS server configuration page closes, and the RADIUS Server Configuration area on
the RADIUS scheme configuration page displays the authentication server you have just
configured.
f. In the RADIUS Server Configuration area, click Add.
g. On the page that appears, select Primary Accounting as the server type, enter the IP address
1.1.1.2, the port number 1813, and the key expert, enter expert again in the Confirm Key field,
and click Apply.
The RADIUS server configuration page closes, and the RADIUS Server Configuration area on
the RADIUS scheme configuration page displays the accounting server you have just
configured.
h. Click Apply.
522
Figure 546 Configuring the RADIUS scheme
523
Figure 547 Creating an ISP domain
524
Figure 548 Configuring the authentication method for the ISP domain
525
The configuration progress dialog box appears
g. After the configuration process is complete, click Close.
Figure 550 Configuring the accounting method for the ISP domain
6. Create an AP:
a. From the navigation tree, select AP > AP Setup.
b. Click Create.
c. Enter the AP name ap1.
d. Select model MSM460-WW.
e. Select the manual mode for serial ID, and then enter the serial ID CN2AD330S8.
f. Click Apply.
Figure 551 Creating an AP
526
Figure 552 Creating a wireless service
d. On the page as shown in Figure 553, enter 2 in the VLAN (Untagged) field, enter 2 in the
Default VLAN field, and click Apply.
A configuration progress dialog box appears.
Figure 553 Configuring parameters for the wireless service
527
Figure 554 Enabling the wireless service
528
Figure 555 Binding an AP radio
529
Figure 556 Enabling 802.11n(2.4GHz) radio
530
Figure 557 Portal service application
531
Figure 558 Configuring a portal-free rule for Bridge-Aggregation 1
532
Configuring AAA
Overview
Authentication, Authorization, and Accounting (AAA) provides a uniform framework for implementing
network access management. It provides the following security functions:
• Authentication—Identifies users and determines whether a user is valid.
• Authorization—Grants user rights and controls user access to resources and services. For example,
a user who has successfully logged in to the device can be granted read and print permissions to
the files on the device.
• Accounting—Records all network service usage information, including the service type, start time,
and traffic. The accounting function provides information required for charging and allows for
network security surveillance.
AAA can be implemented through multiple protocols. The device supports RADIUS. For more information,
see "Configuring RADIUS."
AAA typically uses a client/server model. The client runs on the network access server (NAS) and the
server maintains user information centrally. In an AAA network, the NAS is a server for users, but a client
for AAA servers.
Figure 559 AAA application scenario
AAA manages users based on their ISP domains and access types.
On a NAS, each user belongs to one ISP domain. Typically, a NAS determines the ISP domain a user
belongs to by the username entered by the user at login.
533
Figure 560 Determining the ISP domain for a user by the username
You can configure different authentication, authorization, and accounting methods for users in an ISP
domain. Or you can configure a set of default methods for an ISP domain. These default methods are
used for users for whom no specific AAA methods are configured.
AAA manages users in the same ISP domain based on their access types. The device supports the
following user access types:
• LAN users—Users on a LAN who must pass 802.1X or MAC address authentication to access the
network.
• Login users—Users who want to log in to the device, including SSH users, Telnet users, FTP users,
and terminal users.
• Portal users—Users who must pass portal authentication to access the network.
• PPP users—Users who access through PPP.
To improve device security, AAA provides command authorization for login users. Command
authorization enables the NAS to defer to the authorization server to determine whether a command
entered by a login user is permitted for the user, and allows login users to execute only authorized
commands.
For more information about AAA and ISP, see HP Unified Wired-WLAN Products Security Configuration
Guide.
Configuration prerequisites
• To deploy local authentication, first configure local users on the access device. See "Configuring
users."
• To perform RADIUS authentication, first create the RADIUS schemes. See "Configuring RADIUS."
Configuration procedure
Step Remarks
Optional.
Create ISP domains and specify one of them as the default ISP domain.
1. Configuring an ISP domain
By default, there is an ISP domain named system, which is the default ISP
domain.
534
Step Remarks
Optional.
2. Configuring authentication
Configure authentication methods for various types of users.
methods for the ISP domain
By default, all types of users use local authentication.
Optional.
3. Configuring authorization
Specify the authorization methods for various types of users.
methods for the ISP domain
By default, all types of users use local authorization.
Required.
4. Configuring accounting
Specify the accounting methods for various types of users.
methods for the ISP domain
By default, all types of users use local accounting.
535
Table 166 Configuration items
Item Description
Enter an ISP domain name for uniquely identifying the domain.
Domain Name You can enter a new domain name to create a domain, or specify an existing domain
to change its status (whether it is the default domain).
Specify whether to use the ISP domain as the default domain. Options include:
• Enable—Uses the domain as the default domain.
Default Domain • Disable—Uses the domain as a non-default domain.
There can only be one default domain at a time. If you specify a second domain as
the default domain, the original default domain will become a non-default domain.
3. Configure authentication methods for different types of users in the domain, as described in Table
167.
4. Click Apply.
A configuration progress dialog box appears.
5. After the configuration progress is complete, click Close.
Table 167 Configuration items
Item Description
Select an ISP
Select the ISP domain for which you want to specify authentication methods.
domain
536
Item Description
Configure the default authentication method and secondary authentication method for all
types of users.
Options include:
• HWTACACS—HWTACACS authentication. You must specify the HWTACACS scheme
to be used.
Default AuthN
• Local—Local authentication.
Name • None—No authentication. This method trusts all users and is not for general use.
Secondary • RADIUS—RADIUS authentication. You must specify the RADIUS scheme to be used.
Method
• Not Set—The device uses the default authentication setting, which is local
authentication.
IMPORTANT:
Use the default authentication method if the AC performs authentication on the connecting
APs.
Configure the authentication method and secondary authentication method for LAN
users.
LAN-access AuthN
Options include:
Name
• Local—Local authentication.
Secondary • None—No authentication. This method trusts all users and is not for general use.
Method
• RADIUS—RADIUS authentication. You must specify the RADIUS scheme to be used.
• Not Set—The device uses the settings in the Default AuthN area for LAN users.
Configure the authentication method and secondary authentication method for login
users.
Options include:
Login AuthN
• HWTACACS—HWTACACS authentication. You must specify the HWTACACS scheme
Name to be used.
Secondary • Local—Local authentication.
Method
• None—No authentication. This method trusts all users and is not for general use.
• RADIUS—RADIUS authentication. You must specify the RADIUS scheme to be used.
• Not Set—The device uses the settings in the Default AuthN area for login users.
Configure the authentication method and secondary authentication method for PPP users.
Options include:
PPP AuthN • HWTACACS—HWTACACS authentication. You must specify the HWTACACS scheme
Name to be used.
Secondary • Local—Local authentication.
Method • None—No authentication. This method trusts all users and is not for general use.
• RADIUS—RADIUS authentication. You must specify the RADIUS scheme to be used.
• Not Set—The device uses the settings in the Default AuthN area for PPP users.
Configure the authentication method and secondary authentication method for portal
users.
Portal AuthN
Options include:
Name
• Local—Local authentication.
Secondary • None—No authentication. This method trusts all users and is not for general use.
Method
• RADIUS—RADIUS authentication. You must specify the RADIUS scheme to be used.
• Not Set—The device uses the settings in the Default AuthN area for portal users.
537
Configuring authorization methods for the ISP
domain
1. From the navigation tree, select Authentication > AAA.
2. Click the Authorization tab to enter the authorization method configuration page.
Figure 563 Authorization method configuration page
3. Configure authorization methods for different types of users in the domain, as described in Table
168.
4. Click Apply.
A configuration progress dialog box appears.
5. After the configuration progress is complete, click Close.
Table 168 Configuration items
Item Description
Select an ISP domain Select the ISP domain for which you want to specify authorization methods.
Configure the default authorization method and secondary authorization method for
all types of users.
Options include:
538
Item Description
Configure the authorization method and secondary authorization method for LAN
users.
LAN-access AuthZ Options include:
Name • Local—Local authorization.
Secondary Method • None—This method trusts all users and assigns default rights to them.
• RADIUS—RADIUS authorization. You must specify the RADIUS scheme to be used.
• Not Set—The device uses the settings in the Default AuthZ area for LAN users.
Configure the authorization method and secondary authorization method for login
users.
Options include:
Login AuthZ • HWTACACS—HWTACACS authorization. You must specify the HWTACACS
Name scheme to be used.
Secondary Method • Local—Local authorization.
• None—This method trusts all users and assigns default rights to them.
• RADIUS—RADIUS authorization. You must specify the RADIUS scheme to be used.
• Not Set—The device uses the settings in the Default AuthZ area for login users.
Configure the authorization method and secondary authorization method for PPP
users.
Options include:
PPP AuthZ • HWTACACS—HWTACACS authorization. You must specify the HWTACACS
Name scheme to be used.
Secondary Method • Local—Local authorization.
• None—This method trusts all users and assigns default rights to them.
• RADIUS—RADIUS authorization. You must specify the RADIUS scheme to be used.
• Not Set—The device uses the settings in the Default AuthZ area for PPP users.
Configure the authorization method and secondary authorization method for portal
users.
Portal AuthZ Options include:
Name • Local—Local authorization.
Secondary Method • None—This method trusts all users and assigns default rights to them.
• RADIUS—RADIUS authorization. You must specify the RADIUS scheme to be used.
• Not Set—The device uses the settings in the Default AuthZ area for portal users.
539
Figure 564 Accounting method configuration page
3. Configure accounting methods for different types of users in the domain, as described in Table
169.
4. Click Apply.
A configuration progress dialog box appears.
5. After the configuration progress is complete, click Close.
Table 169 Configuration items
Item Description
Select an ISP domain Select the ISP domain for which you want to specify accounting methods.
Configure the default accounting method and secondary accounting method for all
types of users.
Options include:
Default Accounting • HWTACACS—HWTACACS accounting. You must specify the HWTACACS scheme
Name to be used.
Secondary Method • Local—Local accounting.
• None—No accounting.
• RADIUS—RADIUS accounting. You must specify the RADIUS scheme to be used.
• Not Set—The device uses the default accounting setting, which is local accounting.
Configure the accounting method and secondary accounting method for LAN users.
LAN-access Options include:
Accounting • Local—Local accounting.
Name • None—No accounting.
Secondary Method • RADIUS—RADIUS accounting. You must specify the RADIUS scheme to be used.
• Not Set—The device uses the settings in the Default Accounting area for LAN users.
540
Item Description
Configure the accounting method and secondary accounting method for login users.
Options include:
Login Accounting • HWTACACS—HWTACACS accounting. You must specify the HWTACACS scheme
to be used.
Name
• Local—Local accounting.
Secondary Method
• None—No accounting.
• RADIUS—RADIUS accounting. You must specify the RADIUS scheme to be used.
• Not Set—The device uses the settings in the Default Accounting area for login users.
Configure the accounting method and secondary accounting method for PPP users.
Options include:
PPP Accounting • HWTACACS—HWTACACS accounting. You must specify the HWTACACS scheme
to be used.
Name
• Local—Local accounting.
Secondary Method
• None—No accounting.
• RADIUS—RADIUS accounting. You must specify the RADIUS scheme to be used.
• Not Set—The device uses the settings in the Default Accounting area for PPP users.
Configure the accounting method and secondary accounting method for portal users.
Options include:
Portal Accounting • Local—Local accounting.
Name • None—No accounting.
Secondary Method • RADIUS—RADIUS accounting. You must specify the RADIUS scheme to be used.
• Not Set—The device uses the settings in the Default Accounting area for portal
users.
Configuration procedure
1. Configure a local user:
a. From the navigation tree, select Authentication > Users.
The local user management page appears.
541
b. Click Add.
c. Enter telnet as the username.
d. Enter abcd as the password.
e. Enter abcd again to confirm the password.
f. Select Reversible as the password encryption method.
g. Select Common User as the user type.
h. Select Configure as the level.
i. Select Telnet as the service type.
j. Click Apply.
Figure 566 Configuring the local user
542
Figure 567 Configuring ISP domain test
3. Configure the ISP domain to use local authentication for login users:
a. From the navigation tree, select Authentication > AAA.
b. Click the Authentication tab.
c. Select the domain test.
d. Select the Login AuthN option, and then select the authentication method Local.
e. Click Apply.
A configuration progress dialog box appears.
f. After the configuration progress is complete, click Close.
543
Figure 568 Configuring the ISP domain to use local authentication for login users
4. Configure the ISP domain to use local authorization for login users:
a. From the navigation tree, select Authentication > AAA.
b. Click the Authorization tab.
c. Select the domain test.
d. Select the Login AuthZ option, and then select the authorization method Local.
e. Click Apply.
A configuration progress dialog box appears.
f. After the configuration progress is complete, click Close.
Figure 569 Configuring the ISP domain to use local authorization for login users
5. At the CLI, enable the Telnet service and configure the AC to use AAA for Telnet users.
<AC> system-view
[AC] telnet server enable
[AC] user-interface vty 0 4
[AC-ui-vty0-4] authentication-mode scheme
[AC-ui-vty0-4] quit
544
Verifying the configuration
Telnet to the AC and enter the username telnet@test and password abcd. You are serviced as a user in
domain test.
545
Configuring RADIUS
The Remote Authentication Dial-In User Service (RADIUS) protocol implements Authentication,
Authorization, and Accounting (AAA). RADIUS uses the client/server model. It can protect networks
against unauthorized access, and is often used in network environments where both high security and
remote user access are required. RADIUS defines the packet format and message transfer mechanism,
and uses UDP as the transport layer protocol for encapsulating RADIUS packets. It uses UDP port 1812
for authentication and UDP port 1813 for accounting.
RADIUS was originally designed for dial-in user access. With the addition of new access methods,
RADIUS has been extended to support additional access methods, for example, Ethernet and ADSL.
RADIUS provides access authentication and authorization services. Its accounting function collects and
records network resource usage information.
For more information about AAA and RADIUS, see HP Unified Wired-WLAN Products Security
Configuration Guide.
Configuration guidelines
The status of RADIUS servers (blocked or active) determines which servers the device will communicate
with or turn to when the current servers are not available. In practice, you can specify one primary
RADIUS server and multiple secondary RADIUS servers, with the secondary servers that function as the
backup of the primary servers. Generally, the device chooses servers based on these rules:
• When the primary server is in active state, the device communicates with the primary server. If the
primary server fails, the device changes the state of the primary server to blocked, starts a quiet
timer for the server, and turns to a secondary server in active state (a secondary server configured
earlier has a higher priority). If the secondary server is unreachable, the device changes the state
of the secondary server to blocked, starts a quiet timer for the server, and continues to check the
next secondary server in active state. This search process continues until the device finds an
available secondary server or has checked all secondary servers in active state. If the quiet timer of
a server expires or an authentication response is received from the server, the status of the server
changes back to active automatically, but the device does not check the server again during the
authentication process. If no server is found reachable during one search process, the device
considers the authentication attempt a failure.
• If you remove an authentication server in use, the communication of the device with the server will
soon time out, and the device will look for a server in active state from scratch: it checks the primary
server (if any) first and then the secondary servers in the order they are configured.
• When the primary server and secondary servers are all in blocked state, the device communicates
with the primary server. If the primary server is available, its statues changes to active. Otherwise,
its status remains to be blocked.
• If one server is in active state, but all the others are in blocked state, the device only tries to
communicate with the server in active state, even if the server is unavailable.
• After receiving an authentication response from a server, the device changes the status of the server
identified by the source IP address of the response to active if the current status of the server is
blocked.
546
Configuring a RADIUS scheme
A RADIUS scheme defines a set of parameters that the device uses to exchange information with the
RADIUS servers. There might be authentication servers and accounting servers, or primary servers and
secondary servers. The parameters mainly include the IP addresses of the servers, the shared keys, and
the RADIUS server type. By default, no RADIUS scheme exists.
To configure a RADIUS scheme:
1. From the navigation tree, select Authentication > RADIUS.
Figure 570 RADIUS scheme list
2. Click Add.
Figure 571 RADIUS scheme configuration page
547
Table 170 Configuration items
Item Description
Select the type of the RADIUS servers supported by the device:
• Standard—Standard RADIUS servers. The RADIUS client and server
communicate by using the standard RADIUS protocol and packet format
Server Type defined in RFC 2865/2866 or later.
• Extended—Extended RADIUS servers, usually running on IMC. The
RADIUS client and server communicate by using the proprietary RADIUS
protocol and packet format.
548
Figure 572 Advanced configuration area
549
Table 171 Configuration items
Item Description
Set the shared key for RADIUS authentication packets and that for RADIUS
accounting packets.
The RADIUS client and the RADIUS authentication/accounting server use
MD5 to encrypt RADIUS packets. They verify the validity of packets
Authentication Key through the specified shared key. The client and the server can receive and
respond to packets from each other only when they use the same shared
Confirm Authentication Key key.
Accounting Key
IMPORTANT:
Confirm Accounting Key
• The shared keys configured on the device must be consistent with those
configured on the RADIUS servers.
• The shared keys configured in the Common Configuration area are
used only when no corresponding shared keys are configured in the
RADIUS server configuration area.
Set the time the device keeps an unreachable RADIUS server in blocked
state.
If you set the quiet time to 0, when the device needs to send an
authentication or accounting request but finds that the current server is
unreachable, it does not change the server's status that it maintains. It
simply sends the request to the next server in active state. As a result, when
Quiet Time the device needs to send a request of the same type for another user, it still
tries to send the request to the server because the server is in active state.
You can use this parameter to control whether the device changes the
status of an unreachable server. For example, if you determine that the
primary server is unreachable because the device's port for connecting the
server is out of service temporarily or the server is busy, you can set the
time to 0 so that the device uses the primary server as much.
Set the RADIUS server response timeout time and the maximum number of
attempts for transmitting a RADIUS packet to a single RADIUS server.
If the device does not receive a response to its request from the RADIUS
Server Response Timeout server within the response timeout period, it retransmits the RADIUS
Time request. If the number of transmission attempts exceeds the limit but the
device still receives no response from the RADIUS server, the device
Request Transmission
considers the request a failure.
Attempts
IMPORTANT:
The server response timeout time multiplied by the maximum number of
RADIUS packet transmission attempts must not exceed 75.
Set the interval for sending real-time accounting information. The interval
must be a multiple of 3.
To implement real-time accounting, the device must send real-time
accounting packets to the accounting server for online users periodically.
Realtime Accounting Different real-time accounting intervals impose different performance
Interval requirements on the NAS and the RADIUS server. A shorter interval helps
achieve higher accounting precision but requires higher performance. Use
a longer interval when 1000 or more users exist. For information about the
recommended real-time accounting intervals, see "Configuration
guidelines."
550
Item Description
Realtime Accounting Set the maximum number of attempts for sending a real-time accounting
Attempts request.
Specify the unit for data flows sent to the RADIUS server:
• Byte.
• Kilo-byte.
Unit for Data Flows • Mega-byte.
• Giga-byte.
The traffic measurement units on the device must be the same as the units
configured on the RADIUS servers.
Specify the unit for data packets sent to the RADIUS server:
• One-packet.
• Kilo-packet.
Unit for Packets • Mega-packet.
• Giga-packet.
The traffic measurement units on the device must be the same as the units
configured on the RADIUS servers.
Security Policy Server Specify the IP address of the security policy server.
551
Item Description
Specify the source IP address for the device to use in RADIUS packets sent
to the RADIUS server.
The source IP address of RADIUS packets that a NAS sends must match the
IP address of the NAS configured on the RADIUS server. A RADIUS server
identifies a NAS by its IP address. Upon receiving a RADIUS packet, a
RADIUS server checks whether the source IP address of the packet is the IP
address of a managed NAS. If it is, the server processes the packet. If it is
not, the server drops the packet.
The source address of outgoing RADIUS packets is typically the IP address
of an egress interface on the NAS to communicate with the RADIUS server.
RADIUS Packet Source IP However, in some situations, you must change the source IP address. For
example, if the NAS is configured with VRRP for stateful failover, the
source IP address of outgoing RADIUS packets can be the virtual IP
address of the uplink VRRP group.
IMPORTANT:
• If you do not specify this parameter, the IP address of the outbound
interface is used.
• Make sure this source address has the same IP version of the RADIUS
server address that is specified in the scheme. Otherwise, the
configuration does not take effect.
Specify the backup source IP address for the device to use in RADIUS
packets sent to the RADIUS server.
In a stateful failover environment, the backup source IP address must be the
RADIUS Packet Backup source IP address for the remote device to use in RADIUS packets sent to
Source IP the RADIUS server.
Configuring the backup source IP address in a stateful failover
environment makes sure that the backup server can receive the RADIUS
packets sent from the RADIUS server when the master device fails.
552
Item Description
Set the interval for sending accounting-on packets. This field is
Accounting-On Interval
configurable only when the Send accounting-on packets option is selected.
Attribute Enable or disable the device to interpret the RADIUS class attribute as CAR
Interpretation parameters.
Item Description
Select the type of the RADIUS server to be configured. Possible values include
Server Type primary authentication server, primary accounting server, secondary
authentication server, and secondary accounting server.
Specify the shared key for communication with the RADIUS server.
Key
If no shared key is specified here, the shared key specified in the common
Confirm Key
configuration area is used.
553
RADIUS configuration example
Network requirements
As shown in Figure 574, a RADIUS server running on IMC uses UDP port 1812 to provide authentication
and authorization service.
Configure the AC to do the following:
• Use the RADIUS server for Telnet user authentication and authorization.
• Remove domain names from the usernames sent to the server.
On the RADIUS server, configure a Telnet user account with the username hello@bbb and the password
abc, and set the EXEC privilege level to 3 for the user.
Set the shared keys for packet exchange between the AC and the RADIUS server to expert.
Figure 574 Network diagram
Configuration procedure
1. Configure RADIUS scheme system:
a. From the navigation tree, select Authentication > RADIUS.
b. Click Add.
c. Enter the scheme name system, select the server type Extended, and select the username format
Without domain name.
d. In the RADIUS Server Configuration area, click Add to enter the RADIUS server configuration
page.
e. Select the server type Primary Authentication, enter 10.1.1.1 as the IP address of the primary
authentication server, 1812 as the port number, and expert as the key, and click Apply to add
the primary authentication server to the scheme.
Figure 575 RADIUS authentication server configuration page
554
The RADIUS scheme configuration page refreshes and the added server appears in the server
list, as shown in Figure 576.
f. Click Apply.
Figure 576 RADIUS scheme configuration
555
Figure 577 Creating an ISP domain
556
Figure 578 Configuring an authentication method for the ISP domain
557
Figure 580 Enabling the Telnet service
6. At the CLI, configure the VTY user interfaces to use AAA for user access control.
<AC> system-view
[AC] user-interface vty 0 4
[AC-ui-vty0-4] authentication-mode scheme
[AC-ui-vty0-4] quit
558
Configuring the local EAP service
In some simple application environments, you may want to use a NAS to authenticate users locally,
instead of deploying AAA servers for user authentication. When the Extensible Authentication Protocol
(EAP) is used for user authentication, configure the local EAP authentication server to cooperate with
local authentication method of AAA for local EAP authentication. For more information about AAA, see
"Configuring AAA."
Configuration procedure
1. From the navigation tree, select Authentication > Local EAP Server.
The local EAP service configuration page appears.
Figure 581 Local EAP service configuration page
Item Description
Enable or disable the EAP server.
Status If the EAP server is enabled, the EAP authentication method and PKI domain
configurations are required.
559
Item Description
Specify the EAP authentication methods:
• MD5—Uses Message Digest 5 (MD5) for authentication.
• TLS—Uses the Transport Layer Security (TLS) protocol for authentication.
• PEAP-MSCHAPV2—Uses the Protected Extensible Authentication Protocol (PEAP) for
authentication and uses the Microsoft Challenge Handshake Authentication Protocol
version 2 (MSCHAPv2) for authentication in the established TLS tunnel.
• PEAP-GTC—Uses the Protected Extensible Authentication Protocol (PEAP) for
authentication and uses the Microsoft Generic Token Card (GTC) for authentication
in the established TLS tunnel.
• TTLS—Uses the Tunneled Transport Layer Security (TTLS) protocol for authentication.
Method When an EAP client and the local server communicate for EAP authentication, they first
negotiate the EAP authentication method to be used. During negotiation, the local
server prefers the authentication method with the highest priority from the EAP
authentication method list. If the client supports the authentication method, the
negotiation succeeds and they proceed with the authentication process. Otherwise, the
local server tries the one with the next highest priority until a supported one is found, or
if none of the authentication methods are found supported, the local server sends an
EAP-Failure packet to the client for notification of the authentication failure.
IMPORTANT:
• You can select more than one authentication method. An authentication method
selected earlier has a higher priority.
• PEAP-MSCHAPv2 and PEAP-GTC methods are mutually exclusive.
Specify the PKI domain for EAP authentication.
The available PKI domains are those configured on the page you enter by selecting
Authentication > Certificate Management. For more information, see "Managing
certificates."
PKI domain
IMPORTANT:
The service management, local portal authentication, and local EAP service modules
always reference the same PKI domain. Changing the referenced PKI domain in any of the
three modules will also change that referenced in the other two modules.
Configuration guidelines
To implement local EAP authentication and authorization for 802.1X users, make sure port security is
enabled and 802.1X authentication uses the EAP authentication mode.
560
To use the authentication method of EAP-TLS, configure the network properties of the connection and the
client certificate correctly on the client.
For information about configuring PKI domain test, requesting a local certificate, and retrieving a CA
certificate, see "Managing certificates."
Configuration procedure
1. Configure local user usera:
a. From the navigation tree, select Authentication > Users.
b. Click Add.
c. Enter the username usera and password 1234, and select the service type LAN-access.
d. Click Apply.
Figure 583 Local user configuration page
2. Configure the default ISP domain named system to use local authentication and local
authorization.
The ISP domain system uses local authentication and local authorization by default. For the
configuration procedure, see "Configuring AAA."
3. Enable the EAP server, configure the authentication method as TLS, and the PKI domain as test:
a. From the navigation tree, select Authentication > Local EAP Server.
b. Select Enabled for Status.
c. Select TLS from the Available methods list and click << to add TLS to the Selected methods list.
d. Select test from the PKI domain list.
e. Click Apply.
561
Figure 584 Configuring a local EAP server
562
Figure 586 Creating a wireless service
563
Figure 587 Wireless service configuration page
564
8. Bind the AP's radio mode with the wireless service:
a. In the wireless service list, click the icon for wireless service 802.1x-auth.
b. Select the AP named ap1 with the radio mode 802.11n(2.4GHz).
c. Click Bind.
A progress dialog box appears.
d. After the configuration process is complete, click Close.
Figure 589 Binding the radio mode with the wireless service
565
Verifying the configuration
When a client passes EAP authentication to access the wireless network, you can successfully ping the
client from the AC.
566
Configuring users
Overview
This module allows you to configure local users, user groups, guests, and user profiles.
Local user
A local user represents a set of user attributes configured on a device (such as the user password, user
type, service type, and authorization attribute). It is uniquely identified by the username. For a user
requesting a network service to pass local authentication, you must add an entry as required in the local
user database of the device. For more information about local authentication, see "Configuring AAA."
User group
A user group consists of a group of local users and has a set of local user attributes. You can configure
local user attributes for a user group to implement centralized management of user attributes for the local
users in the group. All local users in a user group inherit the user attributes of the group, but if you
configure user attributes for a local user, the settings of the local user take precedence over the settings
for the user group.
By default, every newly added local user belongs to a user group named system, which is automatically
created by the system.
Guest
A guest is a local user for specific applications. You can create a guest account for portal and LAN users
to temporarily access the network.
User profile
A user profile is a configuration template for saving predefined configurations. You can configure
different items such as Quality of Service (QoS) policy, rate limit, wireless service, and AP group for
different user profiles to accommodate to different application scenarios.
During the authentication process for a user, the authentication server sends the user profile name to the
device, which then enables the configurations in the user profile. After the user passes the authentication
and accesses the device, the device restricts the user's access based on the configurations in the user
profile. When the user logs out, the device automatically disables the configurations in the user profile,
removing the restrictions on the user as a result. As the mechanism indicates, user profiles are for
restricting online users' access. If no user is online (no user is accessing the network, no user has passed
authentication, or all users have logged out), user profiles do not take effect.
With user profiles, you can:
• Make use of system resources more granularly. For example, you can apply a QoS policy on a
per-user basis.
• Restrict users' access rate more flexibly. For example, you can deploy traffic policing on a per-user
basis by defining a rate limit in user profiles.
• Restrict users' access more specifically. For example, you can deploy user access control on a
per-wireless service basis by defining an SSID in user profiles. Or you can deploy user access
control on a per-AP basis by defining APs in the user profiles.
567
Configuring a local user
1. From the navigation tree, select Authentication > Users.
The local user management page appears, displaying information about all local users including
common users, guest administrator, and guests.
NOTE:
On the Local User tab, you can modify a guest user, but the user type changes to another one after
your modification.
2. Click Add.
The local user configuration page appears. On this page, you can create a local user of any type
except guest.
568
Figure 592 Local user configuration page
Item Description
User-name Specify a name for the local user.
Specify the user type for the local user: Common User or Guest Admin.
User-Type A guest administrator manages guest accounts through the Authentication > User >
Guest page.
569
Item Description
Select an authorization level for the local user: Visitor, Monitor, Configure, or
Management, in ascending order of priority. A local user has the rights of the specified
level and all levels lower than the specified level (if any).
• Visitor—A user of this level can perform ping and trace route operations but cannot
read any data from the device or configure the device.
• Monitor—A user of this level can read data from the device but cannot configure the
device.
Level
• Configure—A user of this level can read data from the device and configure the
device, but it cannot upgrade the device software, configure users, or back up or
restore configuration files.
• Management—A user of this level can perform all operations.
IMPORTANT:
This option is effective only for Web, FTP, Telnet, and SSH users of the Common User type.
Select the service types for the local user to use: Web, FTP, Telnet, PPP, Portal,
LAN-access (accessing through the Ethernet, such as 802.1X users), SSH, or Terminal.
IMPORTANT:
Service-Type • If you do not specify any service type for a local user who uses local authentication,
the user cannot pass authentication and cannot log in.
• Guest administrators can use the Web service.
• Guests can use portal and LAN access services.
Specify an expiration time for the local user.
Expire-time When authenticating a local user with the expiration time configured, the access
device checks whether the expiration time has elapsed. If not, the device permits the
user to log in.
Specify the VLAN to be authorized to the local user after the user passes authentication.
VLAN IMPORTANT:
This option is effective only on portal and LAN users of the Common User type.
Specify the ACL to be used by the access device to restrict the access of the local user
after the user passes authentication.
ACL
IMPORTANT:
This option is effective only on PPP, portal, and LAN users of the Common User type.
Specify the user profile for the local user.
User-profile IMPORTANT:
This option is effective only on PPP, portal, and LAN users of the Common User type.
570
Figure 593 User group list
Item Description
Group-name Specify a name for the user group.
Select an authorization level for the user group: Visitor, Monitor, Configure, or
Level
Management, in ascending order of priority.
Specify the VLAN to be authorized to a user in the user group after the user passes
VLAN
authentication.
Specify the ACL to be used by the access device to restrict the access of a user in the
ACL
user group after the user passes authentication.
571
Item Description
Specify whether to allow a guest to join the user group.
Allow Guest IMPORTANT:
Accounts
By default, the system provides a group named system for guest accounts. The group
cannot be modified.
Configuring a guest
Two categories of administrators can configure guests: guest administrators and administrators of the
management level. A guest administrator manages guests through the Web interface. For information
about the user type and authorization level, see Table 174.
572
Figure 596 Guest configuration page
Item Description
Create Users in a Batch Specify whether to create guests in a batch.
Username Specify a name for the guest when users are not created in a batch.
Specify the username prefix and number for guests to be created in a batch.
User-name(prefix) For example, if you specify the username prefix as abc and number as 50, 50 guests
will be created, with the usernames abc0 through abc49.
Specify a valid time range for the guest, including the start time and end time.
ValidTime When authenticating a local user with the valid time configured, the access device
checks whether the valid time has elapsed. If it is not, the device permits the user to
log in.
573
Configuring a guest by a guest administrator
1. Log in to the AC as a guest administrator, and then select Authentication > User from the
navigation tree.
The guest management page appears.
Figure 597 Guest management page
574
NOTE:
The guest accounts are also displayed in the local user list. You can click the icon of a guest in the list
to edit the guest information and authorization attributes.
Configuration procedure
1. From the navigation tree, select Authentication > Users.
2. Click the User Profile tab to display the existing user profiles
Figure 599 User profile list
575
Figure 600 User profile name configuration item
576
Figure 601 User profile configuration page
577
7. Click Apply.
8. From the page displaying the existing user profiles, select the user profile to be enabled.
9. Click Enable.
Table 177 Configuration items
Item Description
Userprofile name This field displays the user profile name.
578
Managing certificates
Overview
The Public Key Infrastructure (PKI) is a general security infrastructure for providing information security
through public key technologies. It is the most widely applied encryption mechanism currently. H3C's PKI
system provides certificate management for IP Security (IPsec), and Secure Sockets Layer (SSL).
PKI, also called asymmetric key infrastructure, uses a key pair to encrypt and decrypt data. The key pair
consists of a private key and a public key. The private key must be kept secret, but the public key needs
to be distributed. Data encrypted by one of the two keys can only be decrypted by the other.
A key problem of PKI is how to manage the public keys. Currently, PKI employs the digital certificate
mechanism to solve this problem. The digital certificate mechanism binds public keys to their owners,
helping distribute public keys in large networks securely.
With digital certificates, the PKI system provides network communication and e-commerce with security
services such as user authentication, data non-repudiation, data confidentiality, and data integrity.
The PKI technology can satisfy the security requirements of online transactions. As an infrastructure, PKI
has a wide range of applications. Here are some application examples:
• VPN—A virtual private network (VPN) provides private data communication on public
communication infrastructure. For security and privacy purposes, it is typically protected by network
layer security protocols such as IPsec and employs PKI encryption and digital signature
technologies.
• Secure email—Emails require confidentiality, integrity, authentication, and non-repudiation. PKI
can address these needs. The secure email protocol that is currently developing rapidly is
Secure/Multipurpose Internet Mail Extensions (S/MIME), which is based on PKI and allows for
transfer of encrypted mails with signature.
• Web security—For Web security, two peers can establish a Secure Sockets Layer (SSL) connection
first for transparent and secure communications at the application layer. With PKI, SSL enables
encrypted communications between a browser and a server. Both the communication parties can
verify the identity of each other through digital certificates.
For more information about PKI, see HP Unified Wired-WLAN Products Security Configuration Guide.
Configuration guidelines
When you configure PKI, use the following guidelines:
• Make sure the clocks of entities and the CA are synchronous. Otherwise, the validity period of
certificates will be abnormal.
• The Windows 2000 CA server has some restrictions on the data length of a certificate request. If the
PKI entity identity information in a certificate request goes beyond a certain limit, the server will not
respond to the certificate request.
• The SCEP plug-in is required when you use the Windows Server as the CA. In this case, you need
to specify RA as the authority for certificate request when you configure the PKI domain.
579
• The SCEP plug-in is not required when you use the RSA Keon software as the CA. In this case, you
need to specify CA as the authority for certificate request when you configure the PKI domain.
Configuration procedures
The system supports the following PKI certificate request modes:
• Manual—In manual mode, you must retrieve a CA certificate, generate a local RSA key pair, and
submit a local certificate request for an entity.
• Auto—In auto mode, an entity automatically requests a certificate through the Simple Certification
Enrollment Protocol (SCEP) when it has no local certificate or the existing certificate is about to
expire.
You can specify the PKI certificate request mode for a PKI domain. Different PKI certificate request modes
require different configurations.
Required.
Create a PKI domain, setting the certificate request mode to Manual.
2. Creating a PKI domain Before requesting a PKI certificate, an entity needs to be configured with some
enrollment information, which is referred to as a PKI domain.
A PKI domain is intended only for convenience of reference by other
applications like IKE and SSL, and has only local significance.
Required.
Generate a local RSA key pair.
By default, no local RSA key pair exists.
Generating an RSA key pair is an important step in certificate request. The key
3. Generating an RSA key pair includes a public key and a private key. The private key is kept by the
pair user, and the public key is transferred to the CA along with some other
information.
IMPORTANT:
If a local certificate already exists, you must remove the certificate before
generating a new key pair, so as to keep the consistency between the key pair
and the local certificate.
580
Step Remarks
Required.
Certificate retrieval serves the following purposes:
• Locally store the certificates associated with the local security domain for
improved query efficiency and reduced query count,
4. Retrieving the CA • Prepare for certificate verification.
certificate
IMPORTANT:
If a local CA certificate already exists, you cannot perform the CA certificate
retrieval operation. This will avoid possible mismatch between certificates and
registration information resulting from relevant changes. To retrieve the CA
certificate, you must remove the CA certificate and local certificate first.
Required.
When requesting a certificate, an entity introduces itself to the CA by
providing its identity information and public key, which will be the major
components of the certificate.
A certificate request can be submitted to a CA in online mode or offline mode.
• In online mode, if the request is granted, the local certificate will be
retrieved to the local system automatically.
5. Requesting a local
certificate • In offline mode, you must retrieve the local certificate by an out-of-band
means.
IMPORTANT:
If a local certificate already exists, you cannot perform the local certificate
retrieval operation. This will avoid possible mismatch between the local
certificate and registration information resulting from relevant changes. To
retrieve a new local certificate, you must remove the CA certificate and local
certificate first.
Optional.
6. Destroying the RSA key If the certificate to be retrieved contains an RSA key pair, you must destroy the
pair existing RSA key pair. Otherwise, the certificate cannot be retrieved.
Destroying the existing RSA key pair also destroys the corresponding local
certificate.
581
Configuration procedure for automatic request
Step Remarks
Required.
Create a PKI entity and configure the identity information.
A certificate is the binding of a public key and the identity information of an
1. Creating a PKI entity entity, where the identity information is identified by an entity distinguished
name (DN). A CA uniquely identifies a certificate applicant by entity DN.
The parameter settings of an entity DN, optional or required, must be
compliant to the CA certificate issue policy. Otherwise, the certificate request
might be rejected.
Required.
Create a PKI domain, setting the certificate request mode to Auto.
2. Creating a PKI domain Before requesting a PKI certificate, an entity needs to be configured with some
enrollment information, which is referred to as a PKI domain.
A PKI domain is intended only for convenience of reference by other
applications like IKE and SSL, and has only local significance.
Optional.
3. Destroying the RSA key If the certificate to be retrieved contains an RSA key pair, you must destroy the
pair existing RSA key pair. Otherwise, the certificate cannot be retrieved.
Destroying the existing RSA key pair also destroys the corresponding local
certificate.
Optional.
Retrieve an existing certificate and display its contents.
IMPORTANT:
4. Retrieving and • Before retrieving a local certificate in online mode, be sure to complete
displaying a certificate LDAP server configuration.
• If a CA certificate already exists, you cannot retrieve another CA certificate.
This restriction avoids inconsistency between the certificate and registration
information due to related configuration changes. To retrieve a new CA
certificate, remove the existing CA certificate and local certificate first.
582
Figure 602 PKI entity list
Item Description
Entity Name Enter the name for the PKI entity.
Enter the fully qualified domain name (FQDN) for the entity.
An FQDN is a unique identifier of an entity on the network. It consists of a host name
FQDN and a domain name and can be resolved to an IP address. For example,
www.whatever.com is an FQDN, where www indicates the host name and
whatever.com the domain name.
583
Item Description
Country/Region Code Enter the country or region code for the entity.
584
4. Configure the parameters as described in Table 179.
5. Click Apply.
Table 179 Configuration items
Item Description
Enter the name for the PKI domain. By default, the device contains a PKI domain
Domain Name
named local_domain.
IMPORTANT:
This item does not support domain name resolution.
LDAP IP Enter the IP address, port number and version of the LDAP server.
Port In a PKI system, the storage of certificates and CRLs is a crucial problem, which is
Version usually addressed by deploying an LDAP server.
Request Mode Select the online certificate request mode: Auto or Manual.
585
Item Description
Specify the fingerprint used for verifying the CA root certificate.
After receiving the root certificate of the CA, an entity needs to verify the fingerprint of
the root certificate, namely, the hash value of the root certificate content. This hash
value is unique to every certificate. If the fingerprint of the root certificate does not
match the one configured for the PKI domain, the entity will reject the root certificate.
• If you specify MD5 as the hash algorithm, enter an MD5 fingerprint. The fingerprint
must a string of 32 characters in hexadecimal notation.
• If you specify SHA1 as the hash algorithm, enter an SHA1 fingerprint. The
Fingerprint Hash
fingerprint must a string of 40 characters in hexadecimal notation.
Fingerprint
• If you do not specify the fingerprint hash, do not enter any fingerprint. The entity will
not verify the CA root certificate, and you yourself must make sure that the CA
server is trusted.
IMPORTANT:
The fingerprint must be configured if you specify the certificate request mode as Auto. If
you specify the certificate request mode as Manual, you can leave the fingerprint settings
null. If you do not configure the fingerprint, the entity will not verify the CA root certificate
and you yourself must make sure that the CA server is trusted.
Set the polling interval and attempt limit for querying the certificate request status.
Polling Count After an entity makes a certificate request, the CA might need a long period of time if
it verifies the certificate request in manual mode. During this period, the applicant
Polling Interval
needs to query the status of the request periodically to get the certificate as soon as
possible after the certificate is signed.
Select this option to enable CRL checking for certificate verification. By default, CRL
Enable CRL Checking
checking is disabled in the default PKI domain local_domain.
Enter the interval at which the PKI entity downloads the latest CRLs for CRL checking.
CRL Update Period
By default, the CRL update period depends on the next update field in the CRL file.
Enter the URL of the CRL distribution point by an IP address or domain name for CRL
checking.
CRL URL
When the URL of the CRL distribution point is not set, first obtain the CA certificate and
a local certificate, and then obtain a CRL through SCEP.
586
Figure 606 Certificate configuration page
3. Click Create Key to enter RSA key pair parameter configuration page.
Figure 607 Key pair parameter configuration page
587
Figure 608 Key pair destruction page
Item Description
Select the PKI domain for the certificate. By default, the list displays the default PKI
Domain Name
domain local_domain.
588
Item Description
Enable Offline Select this option to retrieve a certificate by an out-of-band means like FTP, disk, or
Mode email, and then import the certificate into the local PKI system.
Specify the path and name of the certificate file if you retrieve the certificate in offline
mode.
• If the certificate file is saved on the device, select Get File From Device, and then
Get File From Device specify the path of the file on the device. If you do not specify the file path, the system
Get File From PC uses the CA certificate file named domain-name_ca.cer or local certificate file
named domain-name_local.cer in the root directory of the device.
• If the certificate file is saved on a local PC, select Get File From PC and then specify
the path to the file and select the partition of the device for saving the file.
Enter the password for protecting the private key if you retrieve the certificate in offline
Password
mode. The password was specified when the certificate was exported.
6. After you retrieve a certificate, click View Cert corresponding to the certificate from the PKI
certificates list to display the contents of the certificate.
Figure 610 Certificate information
589
Requesting a local certificate
1. From the navigation tree, select Authentication > Certificate Management.
2. Click the Certificate tab.
3. Click Request Cert to enter the local certificate request page.
Figure 611 Local certificate request page
Item Description
Select the PKI domain for the certificate. By default, the list displays the default PKI
Domain Name
domain local_domain.
Select this option to request a certificate by an out-of-band means like FTP, disk, or
Enable Offline Mode
email.
5. Click Apply.
If you request the certificate in online mode, the system displays Certificate request has been
submitted. Click OK. If you request the certificate in offline mode, the system displays the offline
certificate request information. You can submit the information to the CA by an out-of-band means.
Figure 612 Offline certificate request information page
590
Retrieving and displaying a CRL
1. From the navigation tree, select Authentication > Certificate Management.
2. Click the CRL tab.
Figure 613 CRL page
591
• The AC acquires CRLs for certificate verification.
Figure 615 Network diagram
Configuring the AC
1. Create a PKI entity.
a. From the navigation tree, select Authentication > Certificate Management.
The PKI entity list page is displayed by default.
b. Click Add.
c. Enter aaa as the PKI entity name.
d. Enter ac as the common name.
e. Click Apply.
592
Figure 616 Configuring a PKI entity
593
Figure 617 Configuring a PKI domain
594
Figure 618 Generating an RSA key pair
595
Figure 620 Requesting a local certificate
596
Configuring WLAN security
Terminology
• Rogue AP—An unauthorized or malicious access point on the network, such as an employee setup
AP, misconfigured AP, neighbor AP or an attacker operated AP. Because it is not authorized, if there
is any vulnerability in the AP, the hacker will have a chance to compromise your network security.
• Rogue client—An unauthorized or malicious client on the network.
• Rogue wireless bridge—Unauthorized wireless bridge on the network.
• Monitor AP—An AP that scans or listens to 802.11 frames to detect rogue devices in the network.
• Ad hoc mode—A wireless client in ad-hoc mode can communicate directly with other stations
without support from any other device.
597
Figure 622 Monitor AP for rogue detection
• Hybrid mode—An AP can both scan devices in the WLAN and provide WLAN data services.
Figure 623 Hybrid AP for rogue detection
598
Figure 624 Taking countermeasures against rogue devices
599
spoofed de-authentication frame can cause a client to get de-authenticated from the network and can
affect the normal operation of the WLAN.
At present, spoofing attack detection counters this type of attack by detecting broadcast
de-authentication and disassociation frames sent on behalf of an AP. When such a frame is received, it
is identified as a spoofed frame, and the attack is immediately logged.
Weak IV detection
Wired Equivalent Privacy (WEP) uses an Initialization Vector (IV) to encrypt each frame. The system uses
an IV and a key to generate a key stream, so encryptions using the same key have different results. Also,
when a WEP frame is sent, the IV used in encrypting the frame is sent as part of the frame header.
However, if a WLAN device generates IVs in an insecure way, for example, if it uses a fixed IV for all
frames, the shared secret key may be exposed to any potential attackers. When the shared secret key is
compromised, the attacker can access network resources.
Weak IV detection counters this attack by verifying the IVs in WEP frames. Whenever a frame with a
weak IV is detected, it is immediately logged.
600
Figure 625 Network diagram for WLAN client access control
• In the topology above, three APs are connected to an AC. Configure whitelist and static blacklist
entries on the AC, which will send all the entries to the APs. If the MAC address of a station, Client
1 for example, is present in the blacklist, it cannot access any of the APs. If only Client 1 is present
in the whitelist, it can access any of the APs, and other clients cannot access any of the APs.
• Enable dynamic blacklist function on the AC. If AP 1 receives attack frames from Client 1, a dynamic
blacklist entry is generated in the blacklist. Client 1 cannot associate with AP 1, but can associate
with AP 2 or AP 3. If AP 2 or AP 3 receives attack frames from Client 1, a new dynamic blacklist
entry is generated in the blacklist.
601
Figure 626 AP monitor configuration
2. On the AP Monitor tab, select the AP to be configured and click the icon.
Figure 627 AP operating mode configuration
Item Description
Configure the AP operating mode:
• In normal mode, an AP provides WLAN data services but does not perform scanning.
• In monitor mode, an AP scans all 802.11g frames in the WLAN, but cannot provide
WLAN services.
• In hybrid mode, an AP can both scan devices in the WLAN and provide WLAN data
Work mode services.
IMPORTANT:
• When an AP has its operating mode changed from normal to monitor, it does not
restart.
• When an AP has its operating mode changed from monitor to normal, it restarts.
602
4. Click Apply.
603
Figure 629 Identifying whether a client is a rogue
Client
In the static
attack list? Yes
In the permitted
MAC address list?
Check if AP (BSSID) No
Yes associated with the client
is legal
Yes
604
Configuring detection rule lists
1. Select Security > Rogue Detection from the navigation tree.
2. Click the Rule List tab.
Figure 631 Configuring a rule list
Item Description
• MAC—Add MAC addresses to be permitted after selecting this option.
• Wireless Service—Add SSIDs to be permitted after selecting this option.
List Type • Vendor—Specify vendors to be permitted after selecting this option.
• Attacker—Add the MAC address of a device to configure the device as a
rogue.
605
Figure 632 Configuring a MAC address list
Item Description
MAC Enter the permitted MAC address in the box.
Select the existent If you select this option, the MAC address table displays MAC addresses of
devices the current devices. Select the MAC addresses to be permitted.
6. Click Apply.
The operation to add other types of lists is similar to the add operation of a MAC address list, so the
description is omitted.
606
Figure 633 Common configuration
Item Description
Configure the AP to take countermeasures against rouge devices while
providing wireless services.
Countermeasures
• Interval—The interval at which the AP takes countermeasures.
Setting
• Max Device Number—The maximum number of rouge devices that the AP
can take countermeasures against.
• Rogue Device—Allows you to take countermeasures against rogue devices
(including illegal APs and illegal clients).
• Rogue Adhoc Device—Allows you to take countermeasures against ad hoc
Countermeasures Mode
devices.
• Static Rogue Device—Allows you to take countermeasures against rogue
devices configured in the detection rule list.
4. Click Apply.
607
Figure 634 Monitor record
Type Description
• r—Rogue device.
• p—Permitted device.
• a—Ad hoc device.
• w—AP.
Type
• b—Wireless bridge.
• c—Client.
For example, pw represents a permitted AP while rb represents a rogue wireless bridge.
The device considers all ad hoc devices and wireless bridges as rogue devices.
608
Figure 635 History record page
Configuring WIDS
Configuring WIDS
1. Select Security > WIDS from the navigation tree.
Figure 636 Configuring WIDS
Item Description
If you select the option, flood attack detection is enabled.
Flood Attack Detect
It is disabled by default.
3. Click Apply.
609
Figure 637 Displaying history information
610
Configuring the blacklist and whitelist functions
A static blacklist or whitelist configured on an AC applies to all APs connected to the AC, while a
dynamic blacklist applies to APs that receive attack frames. For more information, see "Blacklist and
whitelist."
2. On the Blacklist tab, configure the dynamic blacklist as described in Table 188.
Table 188 Configuration items
Item Description
• Enable—Enable dynamic blacklist.
Dynamic Blacklist
• Disable—Disable dynamic blacklist.
Configure the lifetime of the entries in the blacklist. When the lifetime of an
Lifetime
entry expires, the entry is removed from the blacklist.
3. Click Apply.
NOTE:
These attacks can be detected through a dynamic blacklist: Assoc-Flood, Reassoc-Flood, Disassoc-Flood,
ProbeReq-Flood, Action-Flood, Auth-Flood, Deauth-Flood, and Null data-Flood.
611
2. On the Blacklist tab, click Static.
Figure 640 Configuring a static blacklist
Item Description
MAC Address Select MAC Address, and then add a MAC address to the static blacklist.
Select from Connected If you select the option, the table below lists the current existing clients. Select
Clients the options of the clients to add their MAC addresses to the static blacklist.
5. Click Apply.
612
Configuring whitelist
1. Select Security > Filter from the navigation tree.
2. Click the Whitelist tab.
Figure 642 Configuring a whitelist
3. Click Add.
Figure 643 Adding a whitelist
Item Description
MAC Address Select MAC Address, and then add a MAC address to the whitelist.
If you select the option, the table below this option lists the current existing
Select from Connected
clients. Select the options of the clients to add their MAC addresses to the
Clients
whitelist.
613
5. Click Apply.
Configuration guidelines
• The radio must be disabled so that the AP operation mode can be changed.
• If you configure more than one detection rule, you need to specify the rogue device types (AP, client,
bridge, and ad hoc) and the rule matching order. For more information, see "Configuring user
isolation."
• The wireless service configuration is needed for an AP operating in hybrid mode, and not needed
for an AP in monitor mode.
Configuration procedure
1. Configure AP 1 to operate in normal mode:
In normal mode, AP 1 provides WLAN data services only. For information about how to configure
WLAN services, see "Configuring access services."
2. Configure AP 2 to operate in monitor mode:
a. Select AP > AP Setup from the navigation tree.
b. Click Add.
614
c. On the page that appears, set the AP name to ap, select the AP model MSM460-WW, select
Manual, and enter the serial ID of AP 2.
d. Click Apply.
Figure 645 AP configuration
615
Figure 647 Radio configuration
616
d. Select Attacker, and click Add. Enter 000f-e220-405e in the MAC Address field and click
Apply.
Figure 649 Adding MAC addresses to the attacker list
617
Figure 650 Common configuration
618
Configuring user isolation
619
Figure 651 User communication
620
Figure 652 Configuring user isolation
Item Description
VLAN ID Specify the VLAN in which user isolation is enabled.
Specify the MAC addresses to be permitted by the AC. For more information, see
"After user isolation is enabled."
• Enter a MAC address in the field next to the Add button.
• Click Add to add the MAC address to the permitted MAC list.
AccessMAC
• To delete a MAC address from the list, select an entry and click Delete.
IMPORTANT:
• Broadcast or multicast MAC addresses cannot be specified as permitted
MAC addresses.
• Up to 16 permitted MAC addresses can be configured for one VLAN.
4. Click Apply.
To avoid network disruption caused by user isolation, add the MAC address of the gateway to the
permitted MAC address list, and then enable user isolation.
If you configure user isolation for a super VLAN, the configuration does not take effect on the sub-VLANs
in the super VLAN, and you must configure user isolation on the sub-VLANs if needed.
621
Figure 653 Displaying user isolation summary
Configuration procedure
1. Configure wireless service:
For information about how to configure wireless service, see "Configuring access services."
622
2. Configure user isolation:
a. Select Security > User Isolation from the navigation tree.
b. Click Add.
c. On the page that appears, enter the VLAN ID 2, add MAC address 000f-e212-7788 to the
permitted MAC address list, and click Apply.
Figure 655 Configuring user isolation
623
Configuring authorized IP
The authorized IP function associates the HTTP or Telnet service with an ACL to filter the requests of clients.
Only clients that pass the ACL filtering can access the device.
Before configuring authorized IP, you must create and configure the ACL. For ACL configuration, see
"Configuring QoS."
1. Select Security > Authorized IP from the navigation tree.
2. Click the Setup tab.
Figure 656 Configuring authorized IP
Item Description
Select the IPv4 ACL to be associated with the Telnet service.
IPv4 ACL Available IPv4 ACLs are what you configure on the page you enter
by selecting QoS > ACL IPv4.
Telnet
Select the IPv6 ACL to be associated with the Telnet service.
IPv6 ACL Available IPv6 ACLs are what you configure on the page you enter
by selecting QoS > ACL IPv6.
4. Click Apply.
624
Configuring session management
This function is used to verify packets through transport layer protocols. The session management feature
tracks the status of connections by inspecting the transport layer protocol (TCP or UDP) information, and
performs unified status maintenance and management for all connections.
Basic session management settings include:
• Configuring whether to enable unidirectional traffic detection.
• Configuring a persistent session rule which is available only for TCP sessions in ESTABLISHED state.
• Setting aging times for the sessions in different protocol states, which are effective only for the
sessions that are being established.
• Setting aging times for the sessions of different application layer protocols, which are effective only
for the sessions in READY or ESTABLISHED state.
NOTE:
If too many sessions, for example, more than 800 thousands sessions, exist, do not set small values for the
aging times of the sessions in different protocol states and of different application layer protocols.
Otherwise, the responses of the console will be very slow.
625
Figure 657 Session configuration
626
Table 193 Configuration items
Item Description
Enable or disable unidirectional traffic detection.
• When unidirectional traffic detection is enabled, the session
management feature processes both the unidirectional and
Enable unidirectional traffic detection
bidirectional traffic.
• When unidirectional traffic detection is disabled, the session
management feature processes only the bidirectional traffic.
Aging
Accelerate Queue Aging
Accelerate Specify the accelerate queue aging time.
Time
Queue
• OPEN State Aging
RAWIP Time • Specify the OPEN state aging time for RAW IP.
Protocol • READY State Aging • Specify the READY state aging time for RAW IP.
Time
DNS Session Aging Time Specify the DNS session aging time.
FTP Session Aging Time Specify the FTP session aging time.
MSN Session Aging Time Specify the MSN session aging time.
SIP Session Aging Time Specify the SIP session aging time.
627
Displaying session table information
1. Select Security > Session Table from the navigation tree, and click the Session Summary tab.
The session table appears.
Figure 658 Session table
Field Description
Init Src IP Source IP address and port number of packets from the session initiator.
Init VPN VPN to which the packets (from the initiator to responder) belong and the
VPN/VLAN/INLINE VLAN and INLINE to which the packets belong during Layer 2 forwarding.
Resp Src IP Source IP address and port number of packets from the session responder.
VPN instance to which the packets (from the responder to initiator) belong
Resp VPN
and the VLAN and INLINE to which the packets belong during Layer 2
VPN/VLAN/INLINE
forwarding.
2. Click the icon for the target session to display detailed information about the session.
Figure 659 Detailed information about a session
628
Table 195 Field description
Field Description
Protocol Transport layer protocol, which can be TCP, UDP, ICMP, or RAWIP.
Session status:
• Accelerate.
• SYN.
• TCP-EST.
• FIN.
State • UDP-OPEN.
• UDP-READY.
• ICMP-OPEN.
• ICMP-CLOSED.
• RAWIP-OPEN.
• RAWIP-READY.
629
Configuring ACL and QoS
ACL overview
An access control list (ACL) is a set of rules (or permit or deny statements) for identifying traffic based on
criteria such as source IP address, destination IP address, and port number.
ACLs are primarily used for packet filtering. You can use ACLs in QoS, security, and other feature
modules for identifying traffic. The packet drop or forwarding decisions varies with the modules that use
ACLs.
ACLs include the following categories.
WLAN-AP ACLs 200 to 299 IPv4 and IPv6 MAC address and serial ID of a WLAN AP.
For more information about ACL, see ACL and QoS Configuration Guide.
QoS overview
Quality of Service (QoS) is a concept concerning service demand and supply. It reflects the ability to
meet customer needs. Generally, QoS does not focus on grading services precisely, but on improving
services under certain conditions.
In the Internet, QoS refers to the ability of the network to forward packets. The evaluation on QoS of a
network can be based on different aspects because the network might provide various services.
Generally, QoS refers to the ability to provide improved service by solving the core issues such as delay,
jitter, and packet loss ratio in the packet forwarding process.
630
delivers packets to their destinations as best it can, without any guarantee for such issues as delay, jitter,
packet loss ratio, and reliability.
This service policy is only suitable for applications insensitive to bandwidth and delay, such as WWW,
file transfer and email.
Configuration guidelines
When you configure an ACL and QoS, follow these guidelines:
• You cannot add an ACL rule with, or modify a rule to have, the same permit/deny statement as an
existing rule in the ACL.
• You can only modify the existing rules of an ACL that uses the match order of config. When
modifying a rule of such an ACL, you can choose to change just some of the settings, in which case
the other settings remain the same.
• When you configure rate limit and traffic policing for a behavior, make sure the ratio of CBS to CIR
is more than 100:16. Otherwise, the handling for bursty traffic might be affected.
• If an ACL is referenced by a QoS policy for defining traffic classification rules, the operation of the
QoS policy varies by interface (the definition of software/hardware interface varies with device
models). The specific process is as follows:
If the QoS policy is applied to a software interface and the referenced ACL rule is a deny clause,
the ACL rule does not take effect and packets go to the next classification rule.
If the QoS policy is applied to a hardware interface, packets matching the referenced ACL rule
are organized as a class and the behavior defined in the QoS policy applies to the class
regardless of whether the referenced ACL rule is a deny or permit clause.
• If a QoS policy is applied in the outbound direction of a port, the QoS policy cannot influence local
packets. Local packets refer to the important protocol packets that maintain the normal operation of
the device. QoS must not process such packets to avoid packet drop. Commonly used local packets
are: link maintenance packets, ISIS packets, OSPF packets, RIP packets, BGP packets, LDP packets,
RSVP packets, and SSH packets and so on.
631
• When you configure queuing for a traffic behavior:
In a policy, the total bandwidth assigned to the AF and EF classes cannot be greater than the
available bandwidth of the interface to which the policy applies. The total bandwidth
percentage assigned to the AF and EF classes cannot be greater than 100%.
In the same policy, the same bandwidth unit must be used to configure bandwidth for AF classes
and EF classes, either absolute bandwidth value or percent.
Configuring an ACL
Recommended ACL configuration procedures
Recommended IPv4 basic ACL configuration procedure
IPv4 basic ACLs match packets based only on source IP addresses.
To configure an IPv4 basic ACL:
Step Remarks
Optional.
1. Adding a time range A rule referencing a time range takes effect only
during the specified time range.
Required.
2. Add an IPv4 basic ACL
For more information, see "Adding an ACL."
Step Remarks
Optional.
1. Adding a time range A rule referencing a time range takes effect only
during the specified time range.
Required.
2. Add an IPv4 advanced ACL
For more information, see "Adding an ACL."
3. Configuring a rule for an IPv4 advanced ACL Required.
632
Recommended Ethernet frame header ACL configuration procedure
Ethernet frame header ACLs, also called "Layer 2 ACLs," match packets based on Layer 2 protocol
header fields, such as source MAC address, destination MAC address, 802.1p priority (VLAN priority),
and link layer protocol type.
To configure an Ethernet frame header ACL:
Step Remarks
Optional.
1. Adding a time range A rule referencing a time range takes effect only
during the specified time range.
Required.
2. Add an Ethernet frame header ACL
For more information, see "Adding an ACL."
3. Configuring a rule for an Ethernet frame header
Required.
ACL
Step Remarks
Optional.
1. Adding a time range A rule referencing a time range takes effect only
during the specified time range.
Required.
2. Add a WLAN-AP ACL
For more information, see "Adding an ACL."
3. Configuring a rule for a WLAN-AP ACL Required.
Step Remarks
Optional.
1. Adding a time range A rule referencing a time range takes effect only during the
specified time range.
Required.
2. Add an IPv6 basic ACL
For more information, see "Adding an IPv6 ACL."
633
Recommended IPv6 advanced ACL configuration procedure
IPv6 advanced ACLs match packets based on the source IPv6 addresses, destination IPv6 addresses,
packet priorities, protocols carried over IPv6, and other protocol header fields such as the TCP/UDP
source port number, TCP/UDP destination port number, ICMPv6 message type, and ICMPv6 message
code.
Compared to IPv6 basic ACLs, IPv6 advanced ACLs allow more flexible and accurate filtering.
To configure an IPv6 advanced ACL:
Step Remarks
Optional.
1. Adding a time range A rule referencing a time range takes effect only during the
specified time range.
Required.
2. Add an IPv6 advanced ACL
For more information, see "Adding an IPv6 ACL."
634
Figure 660 Adding a time range
Item Description
Time Range Name Set the name for the time range.
• Start Time—Set the start time of the periodic time range.
• End Time—Set the end time of the periodic time range. The end time must be later
than the start time.
• Sun, Mon, Tue, Wed, Thu, Fri, and Sat—Select the day or days of the week on
Periodic Time Range
which the periodic time range is valid. You can select any combination of the days
of the week.
NOTE:
These items are available after you select the Periodic Time Range option.
• From—Set the start time of the absolute time range. The time of the day is in the
hh:mm format (24-hour clock), and the date is in the MM/DD/YYYY format.
• To—Set the end time of the absolute time range. The time of the day is in the hh:mm
Absolute Time Range format (24-hour clock), and the date is in the MM/DD/YYYY format. The end time
must be later than the start time.
NOTE:
These items are available after you select the Absolute Time Range option.
635
Adding an ACL
1. Select QoS > ACL IPv4 from the navigation tree.
2. Click the Add tab to enter the ACL adding page, as shown in Figure 661.
Figure 661 Adding an ACL
Item Description
Set the number of the ACL.
• WLAN-AP ACL—200 to 299.
• IPv4 basic ACL—2000 to 2999.
ACL Number • IPv4 advanced ACL—3000 to 3999.
• Ethernet frame header ACL—4000 to 4999.
For an IPv4 basic or advanced ACLs, its ACL number and name must be unique in
IPv4.
636
Configuring a rule for an IPv4 basic ACL
1. Select QoS > ACL IPv4 from the navigation tree.
2. Click the Basic Setup tab.
Figure 662 Configuring an IPv4 basic ACL
Item Description
Select the IPv4 basic ACL for which you want to configure rules.
ACL
Available ACLs are IPv4 basic ACLs.
Select the Rule ID option and enter a number for the rule.
If you do not specify the rule number, the system assigns one automatically.
Rule ID IMPORTANT:
If the rule number you specify already exists, this procedure modifies the configuration
of the existing rule.
Select the action to be performed for IPv4 packets matching the rule:
Action • Permit—Allows matched packets to pass.
• Deny—Drops matched packets.
Select this option to apply the rule to only non-first fragments.
If you do not select this option, the rule applies to all fragments and non-fragments.
Check Fragment
NOTE:
Do not select this option for an AC, because an AC does not support fragmentation.
637
Item Description
Select this option to keep a log of matched IPv4 packets.
A log entry contains the ACL rule number, operation for the matched packets,
protocol that IP carries, source/destination address, source/destination port
Check Logging
number, and number of matched packets.
NOTE:
Do not select this option for an AC, because an AC does not support logging.
Source IP Address Select the Source IP Address option, and enter a source IPv4 address and source
Source Wildcard wildcard, in dotted decimal notation.
Time Range Select the time range during which the rule takes effect.
638
Figure 663 Configuring an IPv4 advanced ACL
639
Table 199 Configuration items
Item Description
Select the IPv4 advanced ACL for which you want to
ACL configure rules.
Available ACLs are IPv4 advanced ACLs.
Select the Rule ID option and enter a number for the rule.
If you do not specify the rule number, the system assigns one
automatically.
Rule ID
IMPORTANT:
If the rule number you specify already exists, this procedure
modifies the configuration of the existing rule.
Select the action to be performed for IPv4 packets matching
the rule:
Action
• Permit—Allows matched packets to pass.
• Deny—Drops matched packets.
Select this option to apply the rule to only non-first fragments.
If you do not select this option, the rule applies to all
fragments and non-fragments.
Non-First Fragments Only
NOTE:
Do not select this option for an AC, because an AC does not
support fragmentation.
Select this option to keep a log of matched IPv4 packets.
A log entry contains the ACL rule number, operation for the
matched packets, protocol that IP carries, source/destination
address, source/destination port number, and number of
Logging
matched packets.
NOTE:
Do not select this option for an AC, because an AC does not
support logging.
Source IP Address Select the Source IP Address option, and enter a source IPv4
Source Wildcard address and source wildcard, in dotted decimal notation.
IP Address Filter
Destination IP Address Select the Destination IP Address option, and enter a
destination IP address and destination wildcard, in dotted
Destination Wildcard decimal notation.
Protocol If you select 1 ICMP, you can configure the ICMP message
type and code; if you select 6 TCP or 17 UDP, you can
configure the TCP or UDP specific items.
640
Item Description
Select this option to make the rule match packets used for
TCP Connection establishing and maintaining TCP connections.
Established These items are available only when you select 6 TCP from the
Protocol list.
Operation Select the operations, and enter the source port numbers and
destination port numbers as required.
Source Port
These items are available only when you select 6 TCP or 17
- UDP from the Protocol list.
TCP/UDP Port
Operation Different operations have different configuration
requirements for the port number fields:
Port
• Not Check—The following port number fields cannot be
configured.
Destination
• Range—The following port number fields must be
- configured to define a port range.
• Other values—The first port number field must be
configured and the second port number field must not.
Time Range Select the time range during which the rule takes effect.
641
Figure 664 Configuring a rule for an Ethernet frame header ACL
Item Description
Select the Ethernet frame header ACL for which you want to configure rules.
ACL
Available ACLs are Ethernet frame header ACLs.
Select the Rule ID option and enter a number for the rule.
If you do not specify the rule number, the system assigns one automatically.
Rule ID IMPORTANT:
If the rule number you specify already exists, this procedure modifies the
configuration of the existing rule.
Select the action to be performed for Layer 2 frames matching the rule:
Action • Permit—Allows matched frames to pass.
• Deny—Drops matched frames.
642
Item Description
Source MAC
Address Select the Source MAC Address option and enter a source MAC address
and wildcard.
MAC Source Mask
Address
Filter Destination MAC
Address Select the Destination MAC Address option and enter a destination MAC
address and wildcard.
Destination Mask
Select the LSAP Type option and specify the DSAP and SSAP fields in the LLC
LSAP Type encapsulation by configuring the following items:
• LSAP Type—Frame encapsulation format.
• LSAP Mask—LSAP wildcard.
Type Filter The AC does not support the LSAP Type or Protocol Type option. They do not
take effect after being configured.
Select the Protocol Type option and specify the link layer protocol type by
Protocol Type
configuring the following items:
• Protocol Type—Frame type. It corresponds to the type-code field of
Ethernet_II and Ethernet_SNAP frames.
Protocol Mask
• Protocol Mask—Wildcard.
Time Range Select the time range during which the rule takes effect.
643
4. Click Add.
Table 201 Configuration items
Item Description
ACL Select the WLAN-AP ACL for which you want to configure rules.
644
Table 202 Configuration items
Item Description
Enter a number for the IPv6 ACL.
• IPv6 basic ACL—2000 to 2999.
ACL Number • IPv6 advanced ACL—3000 to 3999.
For an IPv6 basic or advanced ACLs, its ACL number and name must be unique in
IPv6.
3. Configure the IPv6 basic ACL rule information, as described in Table 203.
4. Click Add.
645
Table 203 Configuration items
Item Description
Select Access Control List Select the IPv6 basic ACL for which you want to configure rules.
(ACL) Available ACLs are IPv6 basic ACLs.
Select the Rule ID option and enter a number for the rule.
If you do not specify the rule number, the system assigns one automatically.
Rule ID IMPORTANT:
If the rule number you specify already exists, this procedure modifies the
configuration of the existing rule.
Select the operation to be performed for IPv6 packets matching the rule:
Operation • Permit—Allows matched packets to pass.
• Deny—Drops matched packets.
Select this option to apply the rule to only non-first fragments.
If you do not select this option, the rule applies to all fragments and non-fragments.
Check Fragment
NOTE:
Do not select this option for an AC, because an AC does not support fragmentation.
Select this option to keep a log of matched IPv6 packets.
A log entry contains the ACL rule number, operation for the matched packets,
protocol that IP carries, source/destination address, source/destination port
Check Logging
number, and number of matched packets.
NOTE:
Do not select this option for an AC, because an AC does not support logging.
Source IP Address Select the Source IP Address option, and enter a source IPv6 address and prefix
length.
The IPv6 address must be in a format like X:X::X:X. An IPv6 address consists of eight
Source Prefix
16-bit long fields, each of which is expressed with two hexadecimal numbers and
separated from its neighboring fields by colon (:).
Time Range Select the time range during which the rule takes effect.
646
Figure 668 Configuring a rule for an IPv6 advanced ACL
3. Configure the IPv6 advanced ACL rule information, as described in Table 204.
4. Click Add.
Table 204 Configuration items
Item Description
Select the IPv6 advanced ACL for which you want to configure
Select Access Control List (ACL) rules.
Available ACLs are IPv6 advanced ACLs.
Select the Rule ID option and enter a number for the rule.
If you do not specify the rule number, the system assigns one
automatically.
Rule ID
IMPORTANT:
If the rule number you specify already exists, this procedure modifies
the configuration of the existing rule.
647
Item Description
Select the operation to be performed for IPv6 packets matching the
rule:
Operation
• Permit—Allows matched packets to pass.
• Deny—Drops matched packets.
Select this option to apply the rule to only non-first fragments.
If you do not select this option, the rule applies to all fragments and
non-fragments.
Check Fragment
NOTE:
Do not select this option for an AC, because an AC does not support
fragmentation.
Select this option to keep a log of matched IPv6 packets.
A log entry contains the ACL rule number, operation for the
matched packets, protocol that IP carries, source/destination
address, source/destination port number, and number of matched
Check Logging
packets.
NOTE:
Do not select this option for an AC, because an AC does not support
logging.
Source IP Address Select the Source IP Address option, and enter a source IPv6
address and prefix length.
The IPv6 address must be in a format like X:X::X:X. An IPv6 address
Source Prefix consists of eight 16-bit long fields, each of which is expressed with
two hexadecimal numbers and separated from its neighboring
IP Address fields by colon (:).
Filter Destination IP Address Select the Destination IP Address option, and enter a destination
IPv6 address and prefix length.
The IPv6 address must be in a format like X:X::X:X. An IPv6 address
Destination Prefix consists of eight 16-bit long fields, each of which is expressed with
two hexadecimal numbers and separated from its neighboring
fields by colon (:).
Protocol If you select 58 ICMPv6, you can configure the ICMPv6 message
type and code. If you select 6 TCP or 17 UDP, you can configure the
TCP or UDP specific items.
Named ICMPv6 Type Specify the ICMPv6 message type and code.
These items are available only when you select 58 ICMPv6 from the
ICMPv6 ICMPv6 Type Protocol list.
Type If you select Other from the Named ICMPv6 Type list, you must enter
ICMPv6 Code values in the ICMPv6 Type and ICMPv6 Code fields. Otherwise, the
two fields will take the default values, which cannot be changed.
648
Item Description
Operator Select the operators, and enter the source port numbers and
destination port numbers as required.
Source Port
These items are available only when you select 6 TCP or 17 UDP
To Port from the Protocol list.
Operator Different operators have different configuration requirements for the
TCP/UDP port number fields:
Port
Port • Not Check—The following port number fields cannot be
configured.
Destination
• Range—The following port number fields must be configured to
Port define a port range.
• Other values—The first port number field must be configured
and the second must not.
Time Range Select the time range during which the rule takes effect.
649
Figure 669 Configuring rate limit on a port
Item Description
Select the types of interfaces to be configured with rate limit.
Please select an interface type
The interface types available for selection depend on your device model.
Rate Limit Select Enable or Disable to enable or disable rate limit on the specified port.
Set the committed burst size (CBS), number of bits that can be sent in each
CBS
interval.
650
Configuring the priority trust mode of a port
Priority mapping overview
When a packet enters a device, the device assigns a set of QoS priority parameters to the packet based
on a certain priority field carried in the packet and sometimes might modify its priority, according to
certain rules depending on device status. This process is called "priority mapping". The set of QoS
priority parameters decides the scheduling priority and forwarding priority of the packet.
The device provides various types of priority mapping tables, or rather, priority mappings. By looking up
a priority mapping table, the device decides which priority value is to assign to a packet for subsequent
packet processing.
You can configure priority mapping by configuring trusting packet priority or trusting port priority.
• If packet priority is trusted, the device uses the specified priority field of the incoming packet to look
up the priority mapping tables for the set of QoS priority parameters to assign to the packet. Note
that, if a received packet does not carry the specified priority field, the device uses the port priority
to look up the priority mapping tables for the set of QoS priority parameters to assign to the packet.
• If port priority is trusted, the device uses the port priority rather than packet priority to look up the
priority mapping tables for the set of QoS priority parameters to assign to the packet.
651
Figure 670 Configuring priority trust mode
2. Configure the priority trust mode of the interfaces, as described in Table 206.
3. Click Apply.
Table 206 Configuration items
Item Description
Select the type of the ports to be configured. The interface types available for
selection depend on your device model.
IMPORTANT:
Please select the interface type
If a WLAN-ESS interface in use has WLAN-DBSS interfaces created on it, its
priority cannot be modified. To modify the priority of the WLAN-ESS interface,
you must stop the service the interface provides (make the current users on the
interface offline).
652
Item Description
Select the priority trust mode:
• Dot1p—Uses the 802.1p priority of received packets for mapping.
• Dscp—Uses the DSCP value of received packets for mapping.
• Dot11e—Uses the 802.11e priority of received packets for mapping. This
Trust Mode
option is applicable to only WLAN-ESS interfaces.
IMPORTANT:
Support for priority trust modes depends on the interface type. The supported
priority trust modes are shown in the Trust Mode list.
Specify the ports to be configured.
(Select the ports) Click the ports to be configured in the port list. You can select one or more
ports.
2. Click the icon for a port to enter the page for configuring the priority and priority trust mode of
the port.
Figure 672 Modifying the port priority
Item Remarks
Interface Name Name of the interface to be configured.
653
Item Remarks
Set the local precedence value for the port.
Local precedence is allocated by the device and has only local significance. A local
Priority precedence value corresponds to an output queue. A packet with higher local
precedence is assigned to a higher priority output queue to be preferentially
scheduled.
Class
Classes identify traffic.
A class is identified by a class name and contains some match criteria for identifying traffic. The
relationship between the criteria can be:
• AND—A packet is considered belonging to a class only when the packet matches all the criteria in
the class.
• OR—A packet is considered belonging to a class if it matches any of the criteria in the class.
Traffic behavior
A traffic behavior, identified by a name, defines a set of QoS actions for packets.
Policy
A policy associates a class with a traffic behavior to define what actions to take on which class of traffic.
You can define multiple class-traffic behavior associations in a policy.
You can apply a policy to a port to regulate traffic sent or received on the port. A QoS policy can be
applied to multiple ports, but in one direction (inbound or outbound) of a port, only one QoS policy can
be applied.
654
QoS policy configuration procedure
Step Remarks
Required.
1. Adding a class
Add a class and specify the operation of the class.
Required.
2. Configuring traffic classification rules
Configure match criteria for the class.
Required.
3. Adding a traffic behavior
Add a traffic behavior.
Required.
5. Adding a policy
Add a policy.
Required.
Associate a traffic behavior with a class in the QoS
policy.
6. Configuring classifier-behavior associations for
the policy You can associate a class with only one traffic
behavior in a QoS policy. If a class is associated with
multiple traffic behaviors, the last associated one takes
effect.
Adding a class
1. Select QoS > Classifier from the navigation tree.
2. Click the Add tab.
655
Figure 673 Adding a class
Item Description
Classifier Name Specify a name for the classifier to be added.
656
Figure 674 Configuring classification rules
657
Table 209 Configuration items
Item Description
Please select a classifier Select an existing classifier in the list.
TIP:
This configuration item is not supported.
658
Item Description
Define a rule to match the customer 802.1p precedence values.
If multiple rules are configured for a class, the new configuration does not
overwrite the previous.
Customer
802.1p You can configure up to eight Dot1p values at a time. If multiple identical Dot1p
values are specified, the system considers them as a single value. The
relationship between different Dot1p values is OR. After configuration, all the
Dot1p values are arranged in ascending order automatically.
TIP:
VLAN
This configuration item is not supported.
Define a rule to match customer VLAN IDs.
If multiple rules are configured for a class, the new configuration does not
overwrite the previous.
You can configure multiple VLAN IDs at a time. If the same VLAN ID is specified
multiple times, the system considers them as a single value. The relationship
Customer VLAN between different VLAN IDs is logical OR. You can specify VLAN IDs in two
ways:
• Enter a range of VLAN IDs, such as 10-500. The number of VLAN IDs in the
range is not limited.
• Specify a combination of individual VLAN IDs and VLAN ID ranges, such as
3, 5-7, 10. You can specify up to eight VLAN IDs in this way.
659
Adding a traffic behavior
1. Select QoS > Behavior from the navigation tree.
2. Click the Add tab.
3. Set the traffic behavior name.
4. Click Add.
Figure 675 Adding a traffic behavior
660
Figure 676 Setting a traffic behavior
Item Description
Please select a behavior Select an existing behavior in the list.
661
Item Description
CIR Set the committed information rate (CIR), the average traffic rate.
Set the committed burst size (CBS), number of bits that can be sent
CBS
in each interval.
TIP:
This configuration item is not supported.
Configure the action of marking 802.1p precedence for packets.
Dot1p Select the Dot1p option and then select the 802.1p precedence
value to be marked for packets in the following list. Select Not Set to
cancel the action of marking 802.1p precedence.
Remark
Configure the action of marking local precedence for packets.
Local Precedence Select the Local Precedence option and then select the local
precedence value to be marked for packets in the following list.
Select Not Set to cancel the action of marking local precedence.
TIP:
This configuration item is not supported.
Configure the maximum bandwidth for
Max Bandwidth
Expedited Forwarding (EF).
662
Item Description
Configure the packet filtering action.
After selecting the Filter option, select one item in the following list:
Filter • Permit—Forwards the packet.
• Deny—Drops the packet.
• Not Set—Cancels the packet filtering action.
Configure the traffic accounting action.
Select the Accounting option and select Enable or Disable in the
Accounting following list to enable/disable the traffic accounting action.
TIP:
This configuration item is not supported.
Adding a policy
1. Select QoS > QoS Policy from the navigation tree.
2. Click the Add tab.
3. Set the policy name.
4. Click Add.
Figure 677 Adding a policy
663
Figure 678 Setting a policy
Item Description
Please select a policy Select an existing policy in the list.
664
Figure 679 Applying a policy to a port
3. Select a policy and apply the policy to the specified ports, as described in Table 212.
4. Click Apply.
Table 212 Configuration items
Item Description
Please select a policy Select an existing policy in the list.
665
Figure 680 Service policy
Item Remarks
WLAN ID Display the selected WLAN ID.
666
Item Remarks
WLAN Service Display the specified WLAN service to which you want to apply a QoS policy.
Inbound Policy Apply the QoS policy to the packets received by the wireless service.
Outbound Policy Apply the QoS policy to the packets sent by the wireless service.
service1
AP 1
10.1.1.1/24
service1
AP 2
Configuration procedure
Before performing the following configurations, make sure the AC has been configured with wireless
service service1. For more information about the wireless service configuration, see "Configuring access
services."
1. Define a time range to cover the time range from 8:00 to 18:00 every day:
667
a. Select QoS > Time Range from the navigation tree.
b. Click the Add tab.
c. On the page as shown in Figure 683, enter the time range name test-time, select the Periodic
Time Range option, set the Start Time to 8:00 and the End Time to 18:00, and select the
options Sun through Sat.
d. Click Apply.
Figure 683 Defining a time range covering 8:00 to 18:00 every day
668
Figure 684 Adding an IPv4 advanced ACL
669
Figure 685 Defining an ACL rule for traffic to the FTP server
4. Add a class:
a. Select QoS > Classifier from the navigation tree.
b. Click the Add tab.
670
c. On the page as shown in Figure 686, enter the class name class1.
d. Click Add.
Figure 686 Adding a class
671
Figure 687 Defining classification rules
672
Figure 688 Adding a traffic behavior
673
Figure 689 Configuring actions for the behavior
8. Add a policy:
a. Select QoS > QoS Policy from the navigation tree.
b. Click the Add tab.
c. On the page as shown in Figure 690, enter the policy name policy1.
d. Click Add.
674
Figure 690 Adding a policy
10. Apply the QoS policy in the inbound direction of the wireless service named service1:
a. Select QoS > Service Policy from the navigation tree.
b. Click the icon for wireless service service1.
c. On the page as shown in Figure 692, select the Inbound Policy option, and select policy1 from
the following list.
d. Click Apply.
675
Figure 692 Applying the QoS policy in the inbound direction of WLAN service service1
676
Configuring wireless QoS
Overview
An 802.11 network offers wireless access based on the carrier sense multiple access with collision
avoidance (CSMA/CA) channel contention. All clients accessing the WLAN have equal channel
contention opportunities. All applications carried on the WLAN use the same channel contention
parameters. A live WLAN, however, is required to provide differentiated access services to address
diversified requirements of applications for bandwidth, delay, and jitter.
When IEEE 802.11e was being standardized, Wi-Fi Alliance defined the Wi-Fi Multimedia (WMM)
standard to allow QoS provision devices of different vendors to interoperate. WMM makes a WLAN
network capable of providing QoS services.
Terminology
WMM
WMM is a wireless QoS protocol designed to preferentially transmit packets with high priority, and
guarantees better QoS services for voice and video applications in a wireless network.
EDCA
Enhanced distributed channel access (EDCA) is a channel contention mechanism designed by WMM to
preferentially transmit packets with high priority and allocate more bandwidth to such packets.
AC
WMM uses access categories (ACs) for handling channel contentions. WMM assigns WLAN data to
four access categories: AC-VO (voice), AC-VI (video), AC-BE (best-effort), and AC-BK (background), in
the descending order of priority. Each access category uses an independent priority queue for
transmitting data. When contention occurs, WMM guarantees that a high-priority access category
preempts a low-priority access category.
CAC
Connection admission control (CAC) limits the number of clients that are using high-priority access
categories (AC-VO and AC-VI) to guarantee sufficient bandwidth for existing high-priority traffic.
U-APSD
Unscheduled automatic power-save delivery (U-APSD) is a new power saving mechanism defined by
WMM to enhance the power saving capability of clients.
SVP
SpectraLink voice priority (SVP) is a voice priority protocol designed by the Spectralink company to
guarantee QoS for voice traffic.
677
WMM protocol overview
The distributed coordination function (DCF) in 802.11 stipulates that access points (APs) and clients use
the CSMA/CA access mechanism. APs or clients listen to the channel before they hold the channel for
data transmission. When the specified idle duration of the channel times out, APs or clients randomly
select a backoff slot within the contention window to perform backoff. The device that finishes backoff first
gets the channel. With 802.11, all devices have the same idle duration and contention window. They are
equal when contending for a channel. In WMM, this fair contention mechanism is changed.
EDCA parameters
WMM assigns data packets to four access categories. By allowing a high-priority access category to
have more channel contention opportunities than a low-priority access category, WMM offers different
service levels to access categories.
WMM define a set of EDCA parameters for each access category, covering the following:
• Arbitration inter-frame spacing number (AIFSN)—Different from the 802.11 protocol where the idle
duration (set using DIFS) is a constant value, WMM can define an idle duration per access category.
The idle duration increases as the AIFSN value increases (see Figure 693 for the AIFS durations).
• Exponent of CWmin (ECWmin) and exponent of CWmax (ECWmax)—Determine the average
backoff slots, which increases as the two values increase (see Figure 693 for the backoff slots).
• Transmission opportunity limit (TXOPLimit)—Indicates the maximum time for which a user can hold
a channel after a successful contention. The greater the TXOPLimit, the longer the user can hold the
channel. The value 0 indicates that the user can send only one packet each time it holds the
channel.
Figure 693 Per-AC channel contention parameters in WMM
678
To use a high-priority access category, a client must send a request to the AP. The AP returns a positive
or negative response based on either of the following admission control policy:
• Channel utilization-based admission policy—The AP calculates the total time that the existing
high-priority access categories occupy the channel in one second, and then calculates the time that
the requesting traffic will occupy the channel in one second. If the sum of the two values is smaller
than or equal to the maximum hold time of the channel, the client can use the requested access
category. Otherwise, the request is rejected.
• Users-based admission policy—If the number of clients using high-priority access categories plus
the requesting clients is smaller than or equal to the maximum number of high-priority access
category clients, the request is accepted. Otherwise, the request is rejected. During calculation, a
client is counted once even if it is using both AC-VO and AC-VI.
SVP service
SVP service implements differentiated treatment of SVP packets by mapping each SVP packet (IP protocol
number 119) to an access category, which corresponds to a transmit queue with certain priority.
ACK policy
WMM defines the following ACK policies:
• No ACK—When the no acknowledgement (No ACK) policy is used, the recipient does not
acknowledge received packets during wireless packet exchange. This policy can improve
transmission efficiency in the environment where communication quality is good and interference is
weak. However, in the environment where communication quality is poor, it can cause increased
packet loss and deteriorated communication quality.
• Normal ACK—When the Normal ACK policy is used, the recipient acknowledges each received
unicast packet.
679
Figure 694 Wireless QoS
NOTE:
The WMM protocol is the foundation of the 802.11n protocol. When the radio operates in 802.11n (5
GHz) or 802.11n (2.4 GHz) radio mode, you must enable WMM. Otherwise, the associated 802.11n
clients might fail to communicate.
2. Click the icon in the Operation column for the desired AP to enter the page for mapping SVP
service to an access category, as shown in Figure 696.
680
Figure 696 Mapping SVP service to an access category
Item Description
AP Name Displays the selected AP.
Select the option before SVP Mapping, and then select an access category for SVP
service:
• AC-VO.
SVP Mapping
• AC-VI.
• AC-BE.
• AC-BK.
NOTE:
SVP mapping is applicable only to non-WMM clients.
681
Figure 697 Setting CAC admission policy
Item Description
Users-based admission policy, or the maximum number of clients allowed to be
connected. A client is counted only once, even if it is using both AC-VO and AC-VI.
Client Number
By default, the users-based admission policy applies, with the maximum number of
users being 20.
Channel utilization-based admission policy, or the rate of the medium time of the
Channel Utilization accepted AC-VO and AC-VI traffic to the valid time during the unit time. The valid
time is the total time during which data is transmitted.
682
5. Click Apply.
Table 216 Configuration items
Item Description
AP Name Displays the selected AP.
If you select the option before No ACK, the No ACK policy is used by the AP.
No ACK
By default, the normal ACK policy is used by the AP.
AC-BE 0 3 4 6
AC-VI 94 1 3 4
AC-VO 47 1 2 3
NOTE:
• ECWmin cannot be greater than ECWmax.
• On an AP operating in 802.11b radio mode, HP recommends that you set the TXOP-Limit to 0, 0, 188,
and 102 for AC-BK, AC-BE, AC-VI, and AC-VO.
683
Configuration procedure
1. Select QoS > Wireless QoS from the navigation tree.
By default, the Wireless QoS tab is displayed.
2. Click the icon in the Operation column for the desired AP.
3. On the client EDCA list, click the icon in the Operation column for the desired priority type
(AC_BK, for example).
Figure 699 Setting client EDCA parameters
Item Description
AP Name Displays the selected AP.
Enable CAC:
• Enable—Enable CAC.
CAC • Disable—Disable CAC.
AC-VO and AC-VI support CAC, which is disabled by default. This item is not
available for AC-BE or AC-BK, because they do not support CAC.
AC-BE 0 3 4 10
AC-VI 94 2 3 4
684
Access category TXOP Limit AIFSN ECWmin ECWmax
AC-VO 47 2 2 3
Field Description
AP ID AP ID.
AP Name AP name.
QoS mode:
QoS mode • WMM—The client is a QoS client.
• None—The client is a non-QoS client.
Radio chip QoS mode Radio chip's support for the QoS mode.
Radio chip max AIFSN Maximum AIFSN allowed by the radio chip.
Radio chip max ECWmin Maximum ECWmin allowed by the radio chip.
685
Field Description
Radio chip max TXOPLimit Maximum TXOPLimit allowed by the radio chip.
Radio chip max ECWmax Maximum ECWmax allowed by the radio chip.
Number of clients that have been admitted to access the radio, including the
Client accepted number of clients that have been admitted to access the AC-VO and the AC-VI
queues.
Total request Total requested medium time, including that of the AC-VO and the AC-VI
mediumtime(us) queues.
Field Description
MAC address MAC address of the client.
686
Field Description
QoS mode:
QoS Mode • WMM—QoS mode is enabled.
• None—QoS mode is not enabled.
Max SP length Maximum service period.
AC Access category.
Assoc State APSD attribute of the four access categories when a client accesses the AP.
687
Figure 702 Setting wireless service-based client rate limiting
Item Description
WLAN ID Display the selected WLAN ID.
688
Figure 703 Setting radio-based client rate limiting
Item Description
List of radios available. You can create the rate limiting rules for one or multiple
Radio List
radios.
Traffic direction:
• Inbound—Traffic from clients to the AP.
Direction
• Outbound—Traffic from the AP to clients.
• Both—Both inbound and outbound traffic.
Rate limiting mode:
• Static—Limits the rate of each client to a fixed value.
Mode
• Dynamic—Limits the rate of a client to the configured total rate/the number of
online clients.
689
To improve bandwidth use efficiency when ensuring bandwidth use fairness among wireless services, use
the bandwidth guarantee function. Bandwidth guarantee makes sure all traffic from each BSS can pass
through when the network is not congested, and each BSS can get the guaranteed bandwidth when the
network is congested. For example, suppose you guarantee SSID1, SSID2, and SSID3 25%, 25%, and
50% of the bandwidth. When the network is not congested, SSID1 can use all idle bandwidth in addition
to its guaranteed bandwidth. When the network is congested, SSID1 can use at least its guaranteed
bandwidth, 25% of the bandwidth.
NOTE:
Bandwidth guarantees apply only to the traffic from AP to client.
Item Description
802.11a Mode
Set the reference radio bandwidth.
802.11b Mode
IMPORTANT:
802.11g Mode
Set the reference radio bandwidth slightly lower than the maximum available bandwidth.
802.11n Mode
NOTE:
After you set the reference radio bandwidth values, the new settings do not take effect for the radios with
bandwidth guarantee enabled. To make the new settings take effect, you must disable and then enable the
radios.
690
Setting guaranteed bandwidth percents
1. Select QoS > Wireless QoS from the navigation tree.
2. Select a radio from the bandwidth guarantee setup list, and click the icon for the radio in the
Operation column.
Figure 705 Setting guaranteed bandwidth
Item Description
Allocate a percentage of the total radio bandwidth to each wireless service as the
Guaranteed Bandwidth
guaranteed bandwidth. The total guaranteed bandwidth cannot exceed 100% of
Percent (%)
the ratio bandwidth.
691
Figure 706 Enabling the bandwidth guarantee function
692
Figure 708 Network diagram
Configuring CAC
1. Select QoS > Wireless QoS from the navigation tree.
By default, the Wireless QoS tab is displayed.
2. Make sure WMM is enabled.
Figure 709 Wireless QoS configuration page
3. As shown in Figure 709, select the AP to be configured on the list, and click the icon for the AP
in the Operation column.
4. On the Client EDCA list, select the priority type (AC_VO, for example) to be modified, and click the
icon for the priority type in the Operation column.
5. Select Enable from the CAC list.
6. Click Apply.
Figure 710 Enabling CAC
693
7. Enable CAC for AC_VI in the same way. (Details not shown.)
8. Select QoS > Wireless QoS from the navigation tree.
By default, the Wireless QoS tab is displayed.
9. Click the icon in the Operation column for the desired AP.
10. Select the Client Number option, and then enter 10.
11. Click Apply.
Figure 711 Setting CAC client number
694
Configuring the wireless service
For the configuration procedure, see "Configuring access services."
695
Figure 714 Network diagram
696
Bandwidth guarantee configuration example
Network requirements
As shown in Figure 716, three wireless clients use wireless services research, office, and entertain to
access the wireless network.
To make sure the enterprise network works properly, guarantee the office service 20% of the bandwidth,
the research service 80%, and the entertain service none.
Figure 716 Network diagram
697
5. Click the icon in the Operation column for 802.11a to enter the page for setting guaranteed
bandwidth, as shown in Figure 718.
6. Set the guaranteed bandwidth:
a. Set the guaranteed bandwidth percent to 80 for wireless service research.
b. Set the guaranteed bandwidth percent to 20 for wireless service office.
c. Set the guaranteed bandwidth percent to 0 for wireless service entertain.
7. Click Apply.
After you apply the guaranteed bandwidth settings, the page for enabling bandwidth guarantee
appears, as shown in Figure 719.
Figure 718 Setting guaranteed bandwidth
698
Verifying the configuration
• Send traffic from the AP to the three wireless clients at a rate lower than 30000 kbps. The rate of
traffic from the AP to the three wireless clients is not limited.
• Send traffic at a rate higher than 6000 kbps from the AP to Client 1 and at a rate higher than
24000 kbps from the AP to Client 2. The total rate of traffic rate from the AP to the two wireless
clients exceeds 30000 kbps. Because you have enabled bandwidth guarantee for wireless services
research and office, the AP forwards traffic to Client 1 and Client 2 at 6000 kbps and 24000 kbps,
respectively, and limits the traffic to Client 3.
NOTE:
• Guaranteed bandwidth in kbps = reference radio bandwidth × guaranteed bandwidth percent.
• Set the reference radio bandwidth slightly lower than the available maximum bandwidth.
• The guaranteed bandwidth configuration applies to only the traffic from the AP to clients.
699
Configuring advanced settings
1+1 AC backup
Support for the 1+1 backup feature might vary depending on your device model. For more information,
see "About the Web-based configuration guide for HP unified wired-WLAN products."
Dual-link backup
• Dual links:
Dual links allow for AC backup. An AP establishes links with two different ACs. The active AC
provides services for APs in the network, and the standby AC provides backup service for the
active AC. If the active AC fails, the standby AC takes over to provide services for the APs.
Figure 720 Dual link topology
700
• Primary AC recovery:
Primary AC provides a mechanism to make sure the primary AC is chosen in precedence by APs
as an active AC. When the primary AC goes down, the APs switch to connect to the standby AC.
As soon as the active AC recovers, the APs automatically connect to the primary AC again.
Figure 721 Primary AC recovery
AC 1 is the primary AC with the connection priority of 7, and it establishes a connection with the
AP. AC 2 acts as the secondary AC. If AC 1 goes down, AC 2 takes over to provide services to
AP until AC 1 recovers. Once the primary AC is reachable again, the AP automatically establishes
a connection with the primary AC. For more information about priority configuration, see
"Configuring an AP connection priority."
NOTE:
• 1+1 fast backup supports only tunnel backup between AC and AP to make sure when the main AC goes down,
the standby AC can quickly connect to the AP. 1+1 fast backup does not back up client information.
• Support for the 1+1 fast backup feature might vary depending on your device model. For more information, see
"About the Web-based configuration guide for HP unified wired-WLAN products."
1+N AC backup
1+N AC backup allows an AC to operate as a backup for multiple ACs. The active ACs independently
provide services for APs that connect to them, and only one standby AC provides backup service for the
active ACs. If an active AC goes down, the APs connecting to it can detect the failure quickly and make
connections to the standby AC. As soon as the active AC recovers, the APs automatically connect to the
original active AC again. This makes sure the standby AC operates as a dedicated backup for the active
ACs. 1+N AC backup delivers high reliability and saves network construction cost.
701
Client information backup
In a network environment as shown in Figure 722, to prevent clients from going offline due to unexpected
primary/backup AC switchover, the ACs must support the stateful failover function. This feature enables
the primary AC to send client information in real time to the backup AC through an IACTP tunnel,
ensuring consistency of client information on the two ACs. When a switchover occurs, the backup AC
immediately takes over services for online clients to ensure service continuity.
To make the stateful failover function operate correctly, you need to configure client information backup
on both the primary and backup ACs so that the client information on both ACs are identical.
This feature supports backing up information for clients that use 802.1X authentication and clients that
use clear-type wireless services.
Figure 722 Network diagram
NOTE:
If a primary/backup AC switchover occurs during the client information backup process, clients will be
logged out and associated with the AC again because the backup AC does not have complete online client
information.
702
• To view detailed client information on the primary and backup ACs, select Summary > Client from
the navigation tree, click the Detailed Information tab, and select the target client. In the command
output, if the client information, except the state (Running for the primary AC, Running(Backup) for
the backup AC), is consistent on the two ACs, the basic client information has been synchronized.
• To view roam-track information of the clients on the primary and backup ACs, select Summary >
Client from the navigation tree, click the Roam Information tab, and select the target client. In the
command output, if the client information is consistent on the two ACs, the basic client information
has been synchronized.
703
Figure 723 Requirement of WLAN load-balancing implementation
Load-balancing modes
The AC supports two load balancing modes: session mode and traffic mode.
• Session mode load-balancing:
Session-mode load balancing is based on the number of clients associated with the AP/radio.
As shown in Figure 724, Client 1 is associated with AP 1, and Client 2 through Client 6 are
associated with AP 2. The AC has session-mode load balancing configured: the maximum number
of sessions is 5, and the maximum session gap is 4. Then, Client 7 sends an association request
to AP 2. The maximum session threshold and session gap have been reached on AP 2, so AP 2
rejects the request. Finally, Client 7 associates with AP 1.
Figure 724 Network diagram for session-mode load balancing
704
Traffic snapshot is considered for traffic mode load balancing.
As shown in Figure 725, Client 1 and Client 2 that run 802.11g are associated with AP 1. The AC
has traffic-mode load balancing configured: the maximum traffic threshold is 10%, and the
maximum traffic gap is 20%. Then, Client 3 wants to access the WLAN through AP 1. The
maximum traffic threshold and traffic gap (between AP 1 and AP 2) have been reached on AP 1,
so AP 1 rejects the request. Finally, Client 3 associates with AP 2.
Figure 725 Network diagram for traffic-mode load balancing
Load-balancing methods
The AC supports AP-based load balancing and group-based load balancing.
1. AP-based load balancing
AP-based load balancing can be implemented either among APs or among the radios of an AP.
AP-based load balancing—APs can carry out either session-mode or traffic-mode load
balancing. An AP starts load balancing when the maximum threshold and gap are reached,
and it does not accept any association requests unless the load decreases below the maximum
threshold or the gap is less than the maximum gap. However, if a client has been denied more
than the specified maximum times, the AP considers that the client is unable to associate with
any other AP, and it accepts the association request from the client.
Radio-based load balancing—The radios of a balanced AP can carry out either session-mode
or traffic-mode load balancing. A radio starts load balancing when the maximum threshold and
gap are reached, and it will reject any association requests unless the load decreases below the
maximum threshold or the gap is less than the maximum gap. However, if a client has been
denied more than the specified maximum times, the AP considers that the client is unable to
associate with any other AP, and it accepts the association request from the client.
2. Group-based load balancing
To balance loads among the radios of different APs, you can add them to the same load balancing
group.
The radios in a load balancing group can carry out either session-mode or traffic-mode load
balancing. The radios that are not added to any load balancing group do not carry out load
balancing. A radio in a load balancing group starts load balancing when the maximum threshold
and gap are reached on it, and it does not accept any association requests unless the load
decreases below the maximum threshold or the gap is less than the maximum gap. However, if a
705
client has been denied more than the specified maximum times, the AP considers that the client is
unable to associate with any other AP, and it accepts the association request from the client.
Upgrading APs
An improper AP version can cause network problems when you upgrade versions for a large amount of
APs at one time. To avoid the problem, you can upgrade a single AP, a group of APs, and all APs as
needed.
You can configure the version upgrade function on the Advanced > AP Setting, AP > AP Group, and AP >
AP Setting pages. The configuration priorities on these pages are in ascending order. If this function is
not configured on one of the pages, configuration with a lower priority is used. For example, if this
function is not configured on the AP > AP Setting page, the AP uses the configuration on the AP > AP
Group page. If this function is not configured on the AP > AP Group page either, the AP uses the
configuration on the Advanced > AP Setting page.
If the version upgrade function is disabled, the AP and the AC establish a tunnel with each other without
checking their versions.
If the version upgrade function is enabled, the AC checks the AP's version before establishing a tunnel.
If their versions are different, the AP downloads a new version from the AC and restarts.
NOTE:
If you enable the version upgrade function on the AC after an AC-AP tunnel has been established, restart
the AP manually so that the AP can automatically download a new version from the AC.
Switching to fat AP
You can switch the working mode of an AP between the fit mode and the fat mode.
Wireless location
Wireless location is a technology to locate, track and monitor specified devices by using WiFi-based
Radio Frequency Identification (RFID) and sensors. With this function enabled, APs send Tag or MU
messages to a location server, which performs location calculation and then sends the data to the
graphics software. You can get the location information of the assets by maps, forms, or reports.
Meanwhile, the graphics software provides the search, alert and query functions to facilitate your
operations.
Wireless location can be applied to medical monitoring, asset management, and logistics, helping users
effectively manage and monitor assets.
706
Architecture of the wireless location system
A wireless location system is composed of three parts: devices or sources to be located, location
information receivers, and location systems.
• Devices or sources to be located include Tags (small, portable RFIDs, which are usually placed or
glued to the assets to be located) of a location server company or Mobile Units (MU), and MUs
(wireless terminals or devices running 802.11). The tags and MUs can send wireless messages
periodically.
• Location information receivers include 802.11 APs.
• Location systems include the location server, calculation software of a location server company, and
different types of graphics software.
707
NOTE:
• For more information about monitor mode and hybrid mode, see "Configuring WLAN security."
• An AP operates in normal mode when it functions as a WLAN access point. For more information,
see "Configuring access services."
Wireless sniffer
In a wireless network, it is difficult to locate signal interference or packet collision by debugging
information or terminal display information of WLAN devices. To facilitate the troubleshooting, configure
an AP as a packet sniffer to listen to, capture, and record wireless packets. The sniffed packets are
recorded in the .dmp file for troubleshooting.
As shown in Figure 726, enable wireless sniffer on the Capture AP. The Capture AP is able to listen to the
wireless packets in the network. Administrators can download the .dmp file to the PC and make further
analysis.
The device supports the following wireless sniffer methods:
• Radio-based—If you enable WLAN sniffer on a radio of the AP, the radio can capture control,
management, and data packets that it can monitor on its working channel.
• Client-based—You can use this method to capture management, control, and data packets sent or
received by specified clients. The packets contain client connection or status update information.
708
Figure 726 Network diagram
AP provision
AP provision enables you to configure network settings for fit APs on the AC. The AC automatically
assigns these settings to the fit APs in run state over tunnel connections. The settings are stored in the
proprietary configuration file on each AP and take effect after the AP restarts. This feature avoids
configuring network settings for APs one by one from a terminal, reducing the work load in large WLAN
networks.
Band navigation
The 2.4 GHz band is often congested. Band navigation enables APs to accept dual-band (2.4 GHz and
5 GHz) clients on their 5 GHz radio, increasing overall network performance.
When band navigation is enabled, the AP directs clients to its 2.4 GHz or 5 GHz radio by following
these principles:
• For a 2.4 GHz client, the AP associates with the client after rejecting it several times.
• For a dual-band client, the AP directs the client to its 5 GHz radio.
• For a 5 GHz client, the AP associates with the client on its 5 GHz radio.
The AP verifies the RSSI of a dual-band client before directing the client to the 5 GHz radio. If the RSSI is
lower than the specified value, the AP does not direct the client to the 5 GHz band.
If the number of clients on the 5 GHz radio reaches the upper limit, and the gap between the number of
clients on the 5 GHz radio and that on the 2.4 GHz radio reaches the upper limit, the AP denies the
client’s association to the 5 GHz radio and allows new clients to associate with the 2.4 GHz radio. If a
client has been denied more than the maximum number of times on the 5 GHz radio, the AP considers
that the client is unable to associate with any other AP, and it allows the 5 GHz radio to accept the client.
VLAN pool
A VLAN pool comprises a group of VLANs. It can assign VLAN IDs only to wireless clients.
709
Multicast optimization
WLAN selects the lowest transmit rate for multicast packets and provides no multicast retransmission
mechanism. Therefore, WLAN cannot meet the requirements of some multicast applications that are not
delay-sensitive but are data-integrity sensitive, such as HD VoD. The multicast optimization feature can
solve these problems by enabling APs to convert multicast packets to unicast packets, so WLAN can
provide retransmission service and higher transmit rates for the converted unicast packets.
Unless otherwise specified, the unicast packets in this chapter refer to the wireless unicast packets that
have the priority of video.
Figure 727 Multicast data transmission when multicast optimization is enabled
Multicast stream
Unicast stream
Client 1
AC Switch AP Client 2
Source
Client 3
With multicast optimization enabled, the AP listens to the IGMP reports and leave messages sent by
clients. When the AP receives an IGMP report, it adds or updates a multicast optimization entry and
updates the multicast source addresses allowed by the client (for IGMPv3 and MLDv2 packets). When
the AP receives an IGMP leave message or when a multicast optimization entry ages out, the AP removes
the entry. When the AP is disconnected from the AC, or when multicast optimization is disabled, all
multicast optimization entries are removed.
After creating multicast entries, the AP listens to non-IGMP and non-MLD multicast packets sent from the
multicast source to clients, and matches the multicast address of the packets to the multicast optimization
entries. If a match is found, the AP converts the multicast packets to unicast packets and sends the unicast
packets to all the clients in the multicast entries. If no match is found, the AP directly sends the multicast
packets.
To avoid performance degradation, you can configure the maximum number of clients that multicast
optimization can support. When the maximum number is reached, the AC takes either of the following
actions, depending on which one is configured:
• Halt—A new client can join a multicast group and receive multicast packets, and a multicast
optimization entry can be created for the client. However, the multicast optimization function for all
clients in the multicast group becomes invalid. When the number of clients drops below the upper
limit, the multicast optimization function takes effect again.
• Reject-client—A new client can join a multicast group, but no new multicast optimization entries can
be created. If multicast optimization entries have been created for other clients in the multicast group,
the client cannot receive multicast packets. Otherwise, the client can receive multicast packets.
NOTE:
If you configure Halt first, and then configure Reject-client, the existing multicast optimization entries still
take effect.
710
Guest access tunnel
A guest access tunnel redirects guest traffic to the external network of a company, providing WLAN
access for guests and ensuring data security in the external network at the same time.
The guest access tunnel function is realized through an aggregation AC and an edge AC. The edge AC
is deployed in the internal network to provide access and authentication services to internal users. The
aggregation AC is deployed in the external network to process guest traffic. After a guest access tunnel
is established between the edge AC and aggregation AC, guests get online through the specified guest
VLAN, and guest traffic is forwarded to the aggregation AC.
Guest access tunnels support NAT traversal. If a NAT device is deployed between the edge AC and the
aggregation AC, a guest access tunnel can still be established.
Figure 728 Network diagram
Bonjour gateway
Bonjour is a set of zero configuration network protocols developed by Apple Inc based on Multicast DNS
(mDNS) services. Bonjour is designed to make network configuration easier for users. It enables Apple
devices to automatically advertise service information and enables clients to automatically discover
Apple devices without obtaining information about the devices.
However, Bonjour supports only link-local multicast addresses. To address this issue, the AC can act as
a Bonjour gateway to manage clients and devices providing services and forward mDNS packets across
VLANs, enabling Bonjour to be applied in large scale networks.
Benefits
Bonjour gateway provides the following benefits:
• mDNS traffic control.
• User-defined Bonjour policies to restrict services that can be used by clients.
• Inter-VLAN forwarding of mDNS packets, enhancing network availability.
• Bonjour policy application in views of multiple levels.
711
Working mechanism
IMPORTANT:
• The Bonjour gateway discards queries received from the wired network.
• The Bonjour gateway filters queries and responses according to user-defined Bonjour policy. For more
information, see "Configuring a Bonjour policy."
712
Figure 730 Bonjour query snooping and response
Item Description
Select a country/region code.
Configure the valid country/region code for a WLAN device to meet the
Country/Region Code country regulations.
If the list is grayed out, the setting is preconfigured to meet the
requirements of the target market and is locked. It cannot be changed.
If you do not specify a country/region code for an AP, the AP uses the global country/region code
configured on this page. If an AP is configured with a country/region code, the AP uses its own country
code. For information about how to specify the country/region code for an AP, see "Configuring APs."
Some ACs and APs have fixed country/region codes. The codes to be used are determined as follows:
713
• An AC's fixed country/region code cannot be changed, and all managed fit APs whose
country/region codes are not fixed must use the AC's fixed country/region code.
• A fit AP's fixed country/region code cannot be changed, and the fit AP can only use the
country/region code.
• If an AC and a managed fit AP use different fixed country/region codes, the fit AP uses its own fixed
country/region code.
714
Table 227 Configuration items
Item Description
AP Connection Priority Set the priority for the AP connection to the AC.
Item Description
Switch
Delay time for the AP to switch from the backup AC to the primary AC.
Delay
715
Configuring 1+1 fast backup
1. Select Advanced > AC Backup from the navigation tree to enter the page shown in Figure 733.
2. Configure fast backup as described in Table 229.
3. Click Apply.
Table 229 Configuration items
Item Description
• disable—Disable fast backup.
Fast Backup Mode • enable—Enable fast backup.
By default, fast backup is disabled.
VLAN ID ID of the VLAN to which the port where the backup is performed belongs.
NOTE:
• Support for 1+1 fast backup varies with the device model. For more information, see "About the
Web-based configuration guide for HP unified wired-WLAN products."
• For the 11900/10500/7500 20G unified wired-WLAN module, if the heartbeat interval is less than
1000 milliseconds and the two Ten-GigabitEthernet interfaces are aggregate interfaces, do not
shutdown any one of the two interfaces.
716
Figure 734 Status information
Field Description
AP Name Display the AP connecting to the AC.
717
2. Click the icon for the target AP.
3. Expand Advanced Setup to enter the page as shown in Figure 732.
4. Configure a connection priority as described in Table 227.
5. Click Apply.
718
Table 231 Configuration items
Item Description
Set the IPv4 address of the backup If the global backup AC is also
Backup AC IPv4 Address
AC. configured on the page you enter by
selecting Advanced > AC Backup, the
Set the IPv6 address of the backup configuration on this page is used
Backup AC IPv6 Address
AC. first.
2. Click the icon for the target radio. The transmission rate varies with radio mode.
When the radio mode is 802.11a/b/g, the page shown in Figure 737 appears. Select a
transmission rate from the list.
Figure 737 Selecting a transmission rate (802.11a/b/g)
719
When the radio mode is 802.11n, the page shown in Figure 738 appears. Select an MCS index
value to specify the 802.11n transmission rate. For more information about MCS, see
"Configuring radios."
Figure 738 Selecting an MCS index (802.11n)
When the radio mode is 802.11ac, the page shown in Figure 739 appears. Select a VHT MCS
index value and a VHT NSS index value to specify the 802.11ac transmission rate. For more
information about VHT MCS and VHT NSS, see "Configuring radios."
Figure 739 Transmission rate (802.11ac)
3. Click Apply.
4. To stop the continuous transmitting mode:
Click the icon for the target radio.
Or, select the target radio and click Stop.
After the continuous transmit is stopped, the transmission rate value on the page shown in Figure
737 is displayed as 0.
NOTE:
When continuous transmit is enabled, do not perform any operations other than transmission rate
configuration.
720
2. Click the icon for the target AP.
Figure 741 Testing busy rate of channels
Item Description
AP Name Display the AP name.
Test Time Per Channel Set a time period in seconds within which a channel is tested.
NOTE:
• During a channel busy test, the AP does not provide any WLAN services. All the connected clients are
disconnected.
• Before the channel busy test completes, do not start another test for the same channel.
Configuration prerequisites
Before you configure load balancing, make sure of the following:
• The target APs are associated with the same AC.
• The clients can find the APs.
721
• The fast association function is disabled. By default, the fast association function is disabled. For
more information about fast association, see "Configuring access services."
Task Remarks
1. Configuring a load balancing mode N/A
Optional.
3. Configuring parameters that affect
load balancing This configuration takes effect for both AP-based load balancing
and radio group-based load balancing.
Item Description
Select Session.
Load Balance Mode
The function is disabled by default.
Load balancing is carried out for a radio when the session threshold
Threshold
and session gap threshold are reached.
Load balancing is carried out for a radio when the session threshold
Gap
and session gap threshold are reached.
722
2. Configure traffic-mode load balancing:
a. Select Advanced > Load Balance from the navigation tree.
b. Select Traffic from the Load Balance Mode list.
c. Click Apply.
Figure 743 Setting traffic-mode load balancing
Item Description
Select Traffic.
Load Balance Mode
The function is disabled by default.
NOTE:
The maximum throughput for 802.11g/802.11a, 802.11b and 802.11n are 30 Mbps, 7 Mbps and
250 Mbps, respectively.
723
Figure 744 Configuring a load balancing group
Item Remarks
Group ID Display the ID of the load balancing group.
724
Table 236 Configuration items
Item Remarks
Maximum denial count of client association requests.
Max Denial Count If a client has been denied more than the specified maximum times, the AP
considers that the client is unable to associate with any other AP and accepts the
association request from the client.
Configuring AP
Upgrading AP version
1. Select Advanced > AP from the navigation tree.
2. On the AP Module tab, select Enable.
3. Click Apply.
NOTE:
You can configure the version upgrade function on the Advanced > AP Setting, AP > AP Group, and AP >
AP Setting pages to upgrade a single AP, a group of APs, and all APs as needed. See "Upgrading APs."
Item Description
AP Model Display the selected AP model.
725
Item Description
Software Version Enter the software version of the AC in the correct format.
Switching to fat AP
1. Select Advanced > AP Setup from the navigation tree.
2. Click the Switch to Fat AP tab.
3. Select the desired AP.
4. Click Switch to Fat AP to perform AP working mode switchover.
NOTE:
Before you switch the work mode, you must download the fat AP software to the AP.
726
Table 238 Configuration items
Item Description
• Enable—Enable the wireless location function. The device begins to listen
to packets when wireless location is enabled.
• Disable—Disable wireless location.
To ensure the location function, complete the configuration on the location
server and AC:
• On the location server—Configure whether to locate Tags or MUs, Tag
message multicast address, and dilution factor on the location server.
Location Function These settings will be notified to the APs through the configuration
message. For more information about location server and configuration
parameters, see the location server manuals.
• On the AC—Configure the AP mode settings, and enable the wireless
location function.
When configurations are made correctly, APs wait for the configuration
message sent by the location server. After receiving that message, the APs
start to receive and report Tag and MU messages.
Specify the rate at which the AP sends location packets to the location
Rate Limit
server, in the range of 16 to 300000 kbps.
RSSI Threshold Specify the RSSI threshold for the location packets, in the range of 5 to 100.
Specify the view in which the IP address of the location server is configured.
• AP Group Table—Configure the IP address of the location server in AP
Address Configuration group view.
• AP Table—Configure the IP address of the location server in AP template
view.
Specify the dilution factor for the location packets, in the range of 1 to
Dilution Factor
10000.
Specify the dilution timeout for the location packets, in the range of 1 to 60
Dilution Timeout
seconds.
An AP reports IP address change and device reboot events to the location server so that the location
server is able to respond in time. The AP reports a reboot message according to the IP address and port
information of the location server recorded in its flash.
• The AP updates the data in the flash after receiving a configuration message. To protect the flash,
the AP does not update the flash immediately after receiving a configuration message, but waits for
10 minutes. If the AP receives another configuration message within 10 minutes, it only updates the
727
configuration information in the cache, and when the 10-minute timer is reached, it saves the cache
information in the flash.
• If the AP reboots within 10 minutes after receiving the first configuration message, and no
configuration is saved in the flash, it does not send a reboot message to the location server.
728
5. Click the icon for the target radio.
Table 239 Configuration items
Item Description
The maximum number of packets that can be captured. If you set a new value for this
option, the packets that have been captured are cleared.
729
5. Enter Ethernet frame ACL ID in the Capture ACL field.
6. Click Start.
Configuring AP provision
If you change the provision settings for an associated AP, save the settings to the proprietary
configuration file of the AP, and restart the AP to validate the new settings.
Item Description
Global IPv4 address of the AC so that all APs can IMPORTANT:
AC IPv4 Address
discover the AC.
• If an item is configured on
Global IPv6 address of the AC so that all APs can both the global provision
AC IPv6 Address
discover the AC. information page and the AP
provision information page,
AC Host Name Global host name of the AC.
the setting on the AP
DNS IPv4 Address Global IPv4 address of the DNS server. provision information page
applies.
DNS IPv6 Address Global IPv6 address of the DNS server.
• The global IPv6 address of
an AC cannot be the link
Domain Name Global AP domain name.
local address.
730
2. Click the Non Provision APs tab.
Figure 750 Configuring non provision APs
Item Description
Select an AP and click this button to change the selected AP to a provision
Change to Provision AP
AP.
Select an AP and click this button to delete the proprietary configuration file
of the selected AP.
IMPORTANT:
Delete Provision
• The Delete Provision operation applies to only running APs.
• The Delete Provision operation takes effect only when you manually
reboot the APs.
CAUTION:
After you click Apply Provision on the AC, the configuration is saved to the wlan_ap_cfg.wcfg file of the
specified AP. When the wlan_ap_cfg.wcfg file takes effect, the AP can only be managed by the AC
specified on the Global Provision tab or Provision APs tab. Make sure the correct AC is specified.
Otherwise, the AP cannot be managed by the specified AC, and you have to log in to the AP to modify its
configuration.
Provision AP settings are not configurable for automatically associated APs (auto APs).
To configure provision APs:
1. Select Advanced > AP Provision from the navigation tree.
2. Click the Provision APs tab.
731
Figure 751 Configuring provision APs
Item Description
Change to Non Provision Select an AP and click this button to change the selected AP to a non-provision
AP AP.
732
Figure 752 Configuring AP provision settings
Item Description
IPv4 Address IPv4 address of the management VLAN interface of the AP.
IPv6 Address IPv6 address of the management VLAN interface of the AP.
733
Item Description
IPsec Key Select this option to configure the IPsec key used by the AP.
802.1X Client Username Configure the username for the AP when it operates as an 802.1X client.
802.1X Client Password Configure the password for the AP when it operates as an 802.1X client.
AC IPv4 Address IPv4 address of the AC so that the AP can discover the AC.
AC IPv6 Address IPv6 address of the AC so that the AP can discover the AC.
Default VLAN ID Default VLAN ID of the Layer 2 Ethernet interface of the AP.
Configuration prerequisites
To enable band navigation to operate correctly, make sure of the following:
• The fast association function is disabled. By default, the fast association function is disabled. For
more information about fast association, see "Configuring access services."
• Band navigation is enabled for the AP. By default, band navigation is enabled for the AP.
• The SSID is bound to the 2.4 GHz and 5 GHz radios of the AP.
734
Figure 753 Configuring band navigation
Item Description
• Enable—Enable band navigation.
Band Navigation • Disable—Disable band navigation.
By default, band navigation is disabled globally.
• Session Threshold—Session threshold for clients on the 5 GHz band.
Session Threshold • Gap—Session gap, which is the number of clients on the 5 GHz band minus the
number of clients on the 2.4 GHz band.
If the number of clients on the 5 GHz radio has reached the upper limit, and the gap
between the number of clients on the 5 GHz radio and that on the 2.4 GHz radio has
Gap reached the upper limit, the AP denies the client’s association to the 5 GHz radio, and
allows new clients to associate with the 2.4 GHz radio.
Max Denial Count If a client has been denied more than the maximum times on the 5 GHz radio, the AP
considers that the client is unable to associate with any other AP, and allows the 5 GHz
radio to accept the client.
RSSI Threshold The AP checks the RSSI of a dual-band client before directing the client to the 5 GHz
radio. If the RSSI is lower than the value, the AP does not direct the client to the 5 GHz
band.
735
Configuring a VLAN pool
Creating a VLAN pool
1. Select Advanced > VLAN Pool from the navigation tree.
2. Click Add.
Figure 754 Creating a VLAN pool
Item Description
Specify the name for a VLAN pool.
VLAN Pool By default, no VLAN pool exists.
You can create up to 32 VLAN pools.
After a VLAN pool assigns a VLAN ID to a client, if the client goes offline and goes online by using the
same SSID within a certain time, the VLAN pool assigns the previous VLAN ID rather than a new VLAN
ID to the client. In addition, this client is not counted in the number of clients in each VLAN on the VLAN
Info tab.
The AP selects a VLAN ID for a client in the following order:
5. VLAN ID assigned by the authentication server.
6. These two kinds of VLAN ID enjoy the same priority:
VLAN ID in the VLAN pool.
VLAN ID specified in the bound service template.
7. VLAN ID bound on the Wireless Service > Access Service page.
Configurations with a higher priority will overwrite the one with lower priority.
736
Binding a VLAN pool to a specific wireless service
Enable MAC VLAN for the wireless service to be bound to the VLAN pool. Configure the MAC VLAN
function on the Wireless Service > Access Service page.
To bind a VLAN pool to a service template:
1. Select Wireless Service > Access Service from the navigation tree.
2. Click the icon for the target wireless service.
Figure 755 Binding a VLAN pool to a wireless service
737
Figure 756 Displaying number of clients for each VLAN ID
This page displays the number of clients that obtain VLAN IDs through the VLAN pool, but not the
clients that obtain VLAN IDs through other methods such as a server-assigned VLAN.
3. Click the VLAN Pool Bound Info tab and click the target VLAN pool name. You can display the
VLAN pool binding information.
Figure 757 Displaying VLAN pool binding information
738
AC fails, a large number of APs upload multicast optimization entries to the new primary AC. To avoid
congestion, the multicast optimization entries will be synchronized to the new primary AC in two minutes.
Item Description
Specify the aging time for multicast optimization entries. If the AP does not receive an
IGMP report from a client within the aging time, the AP removes the client from the
Aging Time multicast optimization entry.
If you enable IGMP snooping, configure the aging time of multicast optimization entries
to be greater than the aging time of IGMP snooping dynamic member ports.
739
Item Description
• Pause Multicast Optimization for All Clients—Invalidate the multicast optimization
function. A new client can join a multicast group and receive multicast packets, and
a multicast optimization entry can be created for the client. However, the multicast
optimization function for all clients in the multicast group becomes invalid. When the
number of clients drops below the upper limit, the multicast optimization function
takes effect again.
• Exclude New Clients for Multicast Optimization—Reject new clients. A new client
Max Client Limit can join a multicast group, but no new multicast optimization entries can be created.
Exceeded Action If multicast optimization entries have been created for other clients in the multicast
group, the client cannot receive multicast packets. Otherwise, the client can receive
multicast packets.
By default, the multicast optimization function becomes invalid when the maximum
number of clients supported by multicast optimization is reached.
If you configure Pause Multicast Optimization for All Clients first, and then configure
Exclude New Clients for Multicast Optimization, the existing multicast optimization
entries still take effect.
Field Description
AP Name Name of the AP.
740
Field Description
Total number of clients served by multicast optimization.
Total Clients If a client joins multiple multicast groups, the client is counted as multiple
clients. For example, if a client has joined two multicast groups through a
radio, the client is counted as two clients by multicast optimization.
MAC Address MAC addresses of the clients that have joined the multicast group.
741
Figure 760 Configuring the edge AC
2. On the page that appears, select Edge AC and configure the parameters as shown in Table 248.
3. Click Add.
4. Click Apply.
Table 248 Configuration items
Item Description
Keep-Alive Time Specify the interval at which the edge AC sends keep-alive requests to aggregation ACs.
Aggregation AC
Specify the IPv4 address of the aggregation AC to be configured on the edge AC.
Address
Specify the source IPv4 address for the edge AC to establish guest access tunnels with
Edge AC Address
aggregation ACs.
NOTE:
• An edge AC can establish guest access tunnels with multiple aggregation ACs, but it cannot use different IP
addresses to build tunnels with one aggregation AC.
• If several IP addresses configured on the edge AC belong to one aggregation AC, the aggregation AC uses the
destination IP address of the first keep-alive request to establish a guest access tunnel with the edge AC.
742
Figure 761 Configuring the aggregation AC
2. On the page that appears, select Aggregation AC and configure the parameters as shown in Table
249.
3. Click Add.
4. Click Apply.
Table 249 Configuration items
Item Description
Edge AC Address Specify the IP address of the edge AC to be configured on the aggregation AC.
You can view the configurations and status of guest access tunnels on the current AC. The VLAN ID field
shows configured guest VLANs.
743
Enabling Bonjour gateway
1. Select Advanced > Bonjour Gateway from the navigation tree.
Figure 763 Enabling Bonjour gateway
2. On the page that appears, select Bonjour Gateway and configure the parameters as shown
in Table 250.
3. Click Apply.
Table 250 Configuration items
Item Description
• Disable—Disable Bonjour gateway globally.
• Enable—Enable Bonjour gateway globally.
By default, Bonjour gateway is disabled globally.
Bonjour Gateway
Bonjour gateway takes effect only after you enable it both globally and for an
AP. You can enable Bonjour gateway for the AP on the AP > AP Setup or
AP > AP Group page.
• Disable—Disable active query for Bonjour services on the AC.
• Enable—Enable active query for Bonjour services on the AC.
By default, active query for Bonjour services is disabled on the AC.
Service Query
With this function enabled, the AC sends queries for a Bonjour service at the
specified intervals and updates the service entry based on the responses. If
no response is received within the TTL of the Bonjour service, the AC deletes
the entry for the service.
744
Configuring a Bonjour policy
A service policy contains service type configuration and VLAN configuration.
The AC forwards queries and responses according to the following rules:
• For a query, if the service type in the query does not match the specified service type, the AC
discards the query.
• For a response, the AC forwards it only when it matches service type, IP address, and instance
name.
• The AC can forward queries and responses only to the VLANs in the configured VLAN lists.
NOTE:
If a service uses multiple protocols, you must configure multiple service types on the AC to enable the AC
to forward queries for the service. For example, you must configure both ipp and ipps service types on the
AC for the airprint service.
Item Description
Configure a name for the Bonjour policy.
Policy Name By default, no Bonjour policy exists.
You can configure up to 1000 Bonjour policies.
745
Item Description
Configure the VLANs to which the AC can forward queries and responses.
Service VLAN
By default, the AC cannot forward queries and responses.
Allow the AC to forward queries and responses to the VLANs to which the clients
Access VLAN belong.
By default, the AC cannot forward queries and responses.
Specify the type of service that can be queried by clients. Table 252 lists some
Service Type
Bonjour protocols by their names and service type strings.
• IPv4—Specify the IP address of the service that can be queried by clients.
• IPv6—Specify the IPv6 address of the service that can be queried by clients.
Service Rule • Instance—Specify the instance name of the service that can be queried by
clients. An instance name uniquely identifies a service.
By default, clients can query all services.
airplay Airplay
746
Service type Protocol name
telnet Remote Login
747
• When AC 1 recovers, no switchover to AC 1 occurs, in which case AC 2 remains the active AC, and
AC 1 acts as the standby AC. This is because the AP connection on AC 1 does not have the highest
priority.
Figure 766 Network diagram
Configuration guidelines
• The wireless services configured on the two ACs should be consistent.
• Specify the IP address of the backup AC on each AC.
• AC backup has no relation to the access authentication method. However, the authentication
method of the two ACs must be the same.
Configuring AC 1
1. Configure AP to establish a connection between AC 1 and AP. For more information about
configurations, see "Configuring access services."
2. Select AP > AP Setup from the navigation tree.
3. Click the icon for the target AP.
4. Expand Advanced Setup.
5. Set the connection priority to 6.
6. Click Apply.
748
Figure 767 Configuring the AP connection priority
7. Select Advance > AC Backup from the navigation tree. You are placed on the Setup tab.
8. On the page that appears, select the IPv4 box, set the IP address of the backup AC to 1.1.1.5, and
select enable to enable the fast backup mode.
9. Click Apply.
749
Figure 768 Configuring the IP address of the backup AC
Configuring AC 2
1. Configure AP to establish a connection between AC 2 and AP.
For more information about configurations, see "Configuring access services."
2. Leave the default value of the AP connection priority unchanged. (Details not shown.)
3. Select Advanced > AC Backup from the navigation tree.
4. On the page that appears, select the IPv4 box, set the address of the backup AC to 1.1.1.4, and
select enable to enable the fast backup mode.
5. Click Apply.
750
Figure 769 Configuring the address of the backup AC
751
Figure 770 Displaying the AP status on AC 1
752
2. When AC 1 goes down, the standby AC (AC 2) detects the failure immediately through the
heartbeat detection mechanism. Then AC 2 takes over to become the new active AC, providing
services to AP.
On AC 2 (the new active AC), display the AP status. (Details not shown.)
The information shows that AC 2 has become the active AC.
On AC 2, display the client information. (Details not shown.)
The value for the State field turns to Running from Running/B, which indicates that the client is
connecting to AC 2 through an active link.
3. When AC 1 recovers, AC 2 still acts as the active AC, and AC 1 becomes the standby AC. AC 1
establishes a backup link with the AP and backs up the client status.
Configuring AC 1
1. Configure AC 1 so that a connection is set up between AC 1 and AP 1.
For more information about configurations, see "Configuring access services."
2. Select AP > AP Setup from the navigation tree.
3. Click the icon for the target AP.
4. Expand Advanced Setup.
753
5. Set the connection priority to 7.
6. Click Apply.
Figure 773 Configuring the AP connection priority for AP 1
Configuring AC 2
1. Configure AC 2 so that a connection is set up between AC 2 and AP 2.
For more information about configurations, see "Configuring access services."
2. Set the AP connection priority to 7.
The configuration steps are the same as the steps on AC 1 (Details not shown.).
3. Configure AC 3 (the backup AC):
a. Configure the related information for AP 1 and AP 2.
For more information about configurations, see "Configuring access services."
b. Select AP > AP Setup from the navigation tree.
c. Click the icon for the target AP.
d. Expand Advanced Setup.
754
e. Enter 1.1.1.3 in the Backup AC IPv4 Address field.
f. Click Apply.
Figure 774 Backing up the IP address of AC 1
755
Figure 775 Backing up the IP address of AC 2
756
Figure 776 Network diagram
Configuration procedure
Complete the following configurations on both AC 1 and AC 2.
1. Build an IACTP tunnel. For more information, see "Configuring WLAN roaming."
2. Configure AC backup. For more information, see "Configuring 1+1 AC backup."
3. Configure client information backup:
a. Select Advanced > AC Backup from the navigation tree. You are placed on the Setup tab.
b. Click Enable to the right of Backup Client Information.
c. Click Apply.
Figure 777 Enabling client information backup
757
Figure 778 Displaying the client status on AC 1
The page shows that the client is in Running status, which means the client is associated with
the primary AC AC 1 because AC 1 has a higher connection priority.
b. Select Summary > Client from the navigation tree, click the Detail Information tab, and select
the target client to view its detailed information.
Figure 779 Displaying the client status on AC 2
This page shows that the client is in Running(Backup) state, which means the client is
associated with the backup AC AC 2.
c. Display roam-track information of the clients (select Summary > Client from the navigation tree,
click the Roam Information tab, and select the target client to view its detailed roaming
758
information. If the information on the two ACs is consistent, the client roaming information has
been synchronized.
2. When AC 1 fails, AC 2 becomes the primary AC. During the switchover, clients are not logged off
and can access network through AC 2.
L2 Switch
Client 6
AP 1 AP 2
Client 1
Client 5
Client 2
Client 4
Client 3
Client 7
Configuration guidelines
An AP starts session-mode load balancing only when both the maximum sessions and maximum session
gap are reached.
Configuration procedure
1. Before you configure load balancing, configure AP 1 and AP 2 on the AC to establish a
connection between the AC and each AP.
For the related configuration, see "Configuring access services."
2. Configure session-mode load balancing:
a. Select Advanced > Load Balance from the navigation tree.
b. On the Load Balance tab, select the Session mode, enter the threshold 5, and use the default
value for the gap.
c. Use the default values for Max Denial Count and RSSI Threshold.
d. Click Apply.
759
Figure 781 Setting session-mode load balancing
760
Figure 782 Network diagram
Configuration guidelines
An AP starts traffic-mode load balancing only when both the maximum traffic threshold and maximum
traffic gap are reached.
Configuration procedure
1. Before you configure load balancing, configure AP 1 and AP 2 on the AC to establish a
connection between the AC and each AP.
For the related configuration, see "Configuring access services."
2. Configure traffic-mode load balancing:
a. Select Advanced > Load Balance from the navigation tree.
b. On the Load Balance tab, select the Traffic mode, enter the threshold 10, and the traffic gap
40.
c. Use the default values for Max Denial Count and RSSI Threshold.
d. Click Apply.
761
Figure 783 Setting traffic-mode load balancing
762
Figure 784 Network diagram
Configuration procedure
1. Before you configure load balancing, configure AP 1 and AP 2 on the AC to establish a
connection between the AC and each AP.
For the related configuration, see "Configuring access services."
2. Configure load balancing:
a. Select Advanced > Load Balance from the navigation tree.
b. On the Load Balance tab, select Session from the Load Balance Mode list, enter the threshold 5,
and use the default value for the gap.
c. Use the default values for Max Denial Count and RSSI Threshold.
d. Click Apply.
Figure 785 Configuring session-mode load balancing
763
3. Configure a load balancing group:
a. Select Advanced > Load Balance from the navigation tree.
b. Click the Load Balance Group tab.
c. Click Add.
d. On the page that appears, select ap1. radio 2 and ap2. radio 2 in the Radios Available area,
click << to add them to the Radios Selected area, and click Apply.
Figure 786 Configuring a load balancing group
764
• Traffic-mode load balancing is required only on radio 2 of AP 1 and radio 2 of AP 2. Therefore, add
them to a load balancing group.
Figure 787 Network diagram
AC
L2 Switch
AP 1 AP 3
AP 2
Client 1 Client 2
Client 3
Configuration procedure
1. Before you configure load balancing, configure AP 1 and AP 2 on the AC to establish a
connection between the AC and each AP.
For the related configuration, see "Configuring access services."
2. Configure load balancing:
a. Select Advanced > Load Balance from the navigation tree.
b. On the Load Balance tab, select Traffic from the Load Balance Mode list, enter the threshold 10
and the gap 40.
c. Use the default values for Max Denial Count and RSSI Threshold.
d. Click Apply.
765
Figure 788 Configuring traffic load balancing
766
Figure 789 Configuring a load balancing group
767
Figure 790 Network diagram
AP 1
AC Switch AP 2
AP 3
Configuration procedures
Before the configuration, assume that you have configured the three APs in AP > AP Setup.
1. Configure an AP group:
a. Select AP > AP Group from the navigation tree.
b. On the page that appears, click Add to create an AP group named update.
2. Enable the AP version upgrade function for AP 1 and AP 2:
a. Select ap1 and ap2 from the AP List, click the icon and add these two APs to the
Selected AP List.
b. Select Enable from the Firmware Update list.
c. Click Apply.
768
Figure 791 Configuring AP version upgrade (1)
769
3. Disable the AP version upgrade function for AP 3:
a. Select AP > AP Setup from the navigation tree.
b. Click the icon for AP 3.
c. Select Disable from the Firmware Update list.
d. Click Apply.
Figure 792 Configuring AP version upgrade (2)
770
Wireless location configuration example
Network requirements
As shown in Figure 793, AP 1, AP 2, and AP 3 operate in normal mode. They send the collected tag and
MU messages to an AE (the location server), which performs location calculation and then sends the
data to the graphics software. You can obtain the location information of the rogue AP, APs, and clients
by using maps, forms or reports.
Figure 793 Network diagram
AE (location server)
AP 1 Client
AC Switch AP 2 Rogue AP
AP 3 AP
Configuration guidelines
Before you enable the wireless location function, make sure at least three APs operate in normal mode,
bind the APs to a wireless service, and enable the wireless service so that the APs can detect Tags and
clients not associated with them, and that the AE can implement location calculation.
Configuring the AE
1. Configure the IP addresses of AP 1, AP 2, and AP 3 on the AE, or select the broadcasting mode
for the AE to discover APs.
2. Perform configuration related to wireless location on the AE.
Configuring AP 1
AP 1, AP 2, and AP 3 are configured similarly, and the following only describes how to configure AP 1
for illustration.
To bind the wireless service to AP 1:
1. Select AP > AP Setup from the navigation tree.
2. Click Add.
3. On the page that appears, enter the AP name ap1, select the model MSM460-WW, select Manual
from the Serial ID list, enter the AP serial ID in the field, and click Apply.
771
Figure 794 Creating an AP
4. Select Wireless Service > Access Service from the navigation tree.
5. Click Add.
6. On the page that appears, specify the Wireless Service Name as service, select clear from the
Wireless Service Type list, and click Apply.
Figure 795 Creating a wireless service
7. Select Wireless Service > Access Service from the navigation tree.
8. On the page that appears, select the box to the left of service.
9. Click Enable.
772
Figure 796 Enabling the wireless service
10. Select Wireless Service > Access Service from the navigation tree.
11. On the page that appears, click the icon for wireless service service.
12. Select the box to the left of 802.11n(2.4GHz).
13. Click Bind.
773
Figure 797 Binding the wireless service to a radio
Enabling 802.11n
1. Select Radio > Radio from the navigation tree.
2. Select the target AP.
3. Click Enable.
774
Figure 798 Enabling 802.11n (2.4 GHz)
775
Figure 799 Enabling wireless location
776
Figure 800 Network diagram
Client
AP 1
Switch
AC Capture AP
Rogue AP
AP 2
PDA
PC
Configuring Capture_AP
1. Select AP > AP Setup from the navigation tree.
2. Click Add.
3. On the page that appears, enter the AP name capture_ap, select the model MSM460-WW, select
Manual from the Serial ID list, enter the AP serial ID in the field, and click Apply.
Figure 801 Creating a Capture AP
777
Figure 802 Setting the channel
778
Figure 803 Enabling 802.11n (2.4 GHz)
779
Verifying the configuration
• Capture AP captures wireless packets and saves the packets to a CAP file in the default storage
medium. Administrators can download the file to the PC and get the packet information by using
tools such as Ethereal.
• When the total number of captured packets reaches the upper limit, Capture AP stops capturing
packets.
Configuring AC 1
Make sure AP 1 and AP 2 have established connections to AC. Otherwise, AC 1 cannot assign the
network settings to them.
1. Configure global provision information so that AP 1 and AP 2 can discover AC 2 with IP address
2.2.2.1:
a. Select Advanced > AP Provision from the navigation tree.
b. Click the Global Provision tab.
c. Enter IP address 2.2.2.1 in the AC IPv4 Address field.
d. Click Apply.
780
Figure 806 Configuring global provision
781
Figure 808 Configuring provision APs
782
− 802.1X client function.
− Username test and password test.
− Authentication method peap-mschapv2.
j. Click the Provision APs tab.
Figure 810 Configuring provision APs
Configuring AC 2
Configure wireless service on AC 2. For more information, see "Configuring access services."
783
Figure 812 AP information page on AC 2
Configuring the AC
To enable band navigation to operate correctly, make sure of the following:
• The fast association function is disabled. By default, the fast association function is disabled.
• Band navigation is enabled for the AP. By default, band navigation is enabled for the AP.
1. Create an AP:
a. Select AP > AP Setup from the navigation tree.
b. Click New.
c. On the page that appears, enter the AP name ap 1, select the model MSM460-WW, select
Manual from the Serial ID list, and enter the AP serial ID in the field.
d. Click Apply.
2. Configure wireless service:
a. Select Wireless Service > Access Service from the navigation tree.
784
b. Click Add.
c. On the page that appears, set the service name to band-navigation, select the wireless service
type Clear, and click Apply.
3. Enable wireless service:
a. Select Wireless Service > Access Service from the navigation tree.
b. Set the band-navigation box.
c. Click Enable.
4. Bind an AP radio to the wireless service:
a. Select Wireless Service > Access Service from the navigation tree.
b. Click the icon for the wireless service band-navigation.
c. Select the boxes next to ap1 with radio types 802.11n(2.4GHz) and 802.11n(5GHz).
d. Click Bind.
Figure 814 Binding an AP radio
785
Figure 815 Configuring band navigation
Client
AC Switch AP
Client
Client
Configuring the AC
1. Create a VLAN pool:
a. Select Advanced > VLAN Pool from the navigation tree.
b. On the page that appears, set the VLAN pool name to office and set the VLAN list to 2-5.
786
c. Click Apply.
Figure 817 Creating a VLAN pool
2. Create an AP:
a. Select AP > AP Setup from the navigation tree.
b. Click Add.
c. On the page that appears, enter the AP name ap, select the model MSM460-WW, select
Manual from the Serial ID list, and enter the AP serial ID in the field.
d. Click Apply.
3. Configure wireless service:
a. Select Wireless Service > Access Service from the navigation tree.
b. Click Add.
c. On the page that appears, set the service name to office and select the wireless service type
Clear. You are placed on the access service configuration page.
d. Enable MAC VLAN.
e. Click Apply.
787
Figure 818 Enabling MAC VLAN
788
Figure 819 Binding a VLAN pool to a wireless service
789
Figure 820 Network diagram
Configuring the AC
1. Select Advanced > Multicast Optimization from the navigation tree.
2. Set the Aging Time to 300 seconds, the Multicast Optimization Max Clients to 2, and Max Client
Limit Exceeded Action to Exclude New Clients for Multicast Optimization.
3. Click Apply.
4. Select the target wireless service.
5. Click Enable.
Figure 821 Configuring multicast optimization
790
Guest access tunnel configuration example
Network requirements
As shown in Figure 822, AC 1 is an edge AC and AC 2 is an aggregation AC. Configure a guest access
tunnel so that guest traffic is separated from the traffic of the inner network. Guests get online through
guest VLAN VLAN 5.
Figure 822 Network diagram
Configuring AC 1
Before configuring the edge AC, complete the following configurations:
• Configure wireless services on AC 1. For more information, see "Configuring access services".
• Configure guest VLAN VLAN 5. (Details not shown.)
To configure AC 1:
1. Select Advanced > Guest Tunnel from the navigation tree.
2. On the page that appears, select Edge AC, enter 192.168.2.3 as the Aggregation AC Address,
and enter 192.168.2.1 as the Edge AC Address. Specify VLAN 5 as the guest VLAN.
3. Click Add.
4. Click Apply.
Figure 823 Configuring the edge AC
Configuring AC 2
1. Select Advanced > Guest Tunnel from the navigation tree.
791
2. On the page that appears, select Aggregation AC, enter 192.168.2.1 as the Edge AC Address,
and specify VLAN 5 as the guest VLAN.
3. Click Add.
4. Click Apply.
Figure 824 Configuring the aggregation AC
Apple TV Print
SSID:apple_tv SSID:print
iPad 1 iPad 2
792
Configuration procedures
1. Configure wireless services on the AC. (Details not shown.)
2. Configure the DHCP server to assign an IP address of the AC as the gateway IP address of the
clients. (Details not shown.)
3. Enable Bonjour gateway:
a. Select Advanced > Bonjour Gateway from the navigation tree, and click the Bonjour Gateway
tab.
b. Select Enable for Bonjour Gateway.
c. Click Apply.
Figure 826 Enabling Bonjour gateway
793
Figure 827 Configuring Bonjour policies
794
Figure 828 Applying Bonjour policies
795
Configuring stateful failover
NOTE:
Support for the stateful failover feature might vary depending on your device model. For more
information, see "About the Web-based configuration guide for HP unified wired-WLAN products."
Overview
Introduction to stateful failover
Some customers require their wireless networks to be highly reliable to ensure continuous data
transmission. In Figure 829, deploying only one AC (even with high reliability) risks a single point of
failure and therefore cannot meet the requirement.
Figure 829 Network with one AC deployed
Internet
AC
AP
Host
The stateful failover feature (supporting portal, 802.1X, and DHCP services) was introduced to meet the
requirement. In Figure 830, two ACs that are enabled with stateful failover are deployed in the network.
You need to specify a VLAN on the two ACs as the backup VLAN, and add the interfaces between the
ACs to the backup VLAN. The backup VLAN is like a failover link, through which the two ACs exchange
state negotiation messages periodically. After the two ACs enter the synchronization state, they back up
the service entries of each other to make sure the service entries on them are consistent. If one AC fails,
the other AC, which has already backed up the service information, takes over to avoid service
interruption.
796
Figure 830 Network diagram for stateful failover
Internet
VLAN 2
Failover link
AC 1 AC 2
Configuration guidelines
When you configure stateful failover, follow these guidelines:
• You must configure the AC and AP to support backup function to make sure the traffic can
automatically switch to the other device if one device fails. For more information, see "Advanced
settings."
797
• To back up portal or 802.1X related information from the active device to the standby device, you
must configure portal or 802.1X to support stateful failover besides the configurations described in
this chapter. For more information, see "About the Web-based configuration guide for HP unified
wired-WLAN products."
• Stateful failover can be implemented only between two devices rather than among more than two
devices.
3. Configure stateful failover parameters at the upper part of the page, as described in Table 253.
4. Click Apply.
Table 253 Configuration items
Item Description
Enable Stateful Failover Enable/disable the stateful failover feature.
798
Item Description
Set the backup VLAN.
After a VLAN is configured as a backup VLAN, the interfaces in the VLAN are used
to transmit stateful failover packets.
IMPORTANT:
Backup VLAN • A device uses VLAN tag+protocol number to identify stateful failover packets,
and broadcasts stateful failover packets to the peer within the backup VLAN.
Therefore, HP recommends not configuring other services (such as voice VLAN)
for a backup VLAN to avoid impact on the operation of stateful failover.
• An interface added to the backup VLAN can transmit other packets besides
stateful failover packets.
Field Description
Configure the NAS Device ID used for AAA authentication.
NAS Device ID Configure the NAS Device IDs of the two devices to 1 and 2.
If you modify the NAS Device ID, all online clients on the device are forced offline.
799
Configuring AC 1
1. Configure AC 1 to support link backup between AC and AP to make sure traffic can be switched
to AC 2 when AC 1 fails:
a. From the navigation tree, select Advanced > AC Backup.
The default Setup page appears.
b. Select IPv4 and enter the IPv4 address of AC 2 (8.190.1.61) as the backup AC address, and
select Enable from the Fast Backup Mode list.
c. Click Apply.
Figure 834 Setup page
800
Figure 835 Configuring stateful failover
801
Figure 837 Configuring a RADIUS accounting server
l. After the configurations are complete, click Apply on the RADIUS scheme configuration page.
Figure 838 RADIUS scheme configuration page
802
Figure 839 Configuring AAA authentication scheme for the ISP domain
803
Figure 841 Configuring AAA accounting scheme for the ISP domain
804
Figure 842 Configuring a portal server
805
9. Configure portal to support stateful failover at the command line interface (CLI):
# Specify AC 1's device ID to be used in stateful failover mode as 1, and specify portal group 2
for interface VLAN-interface 1.
<AC1>system-view
[AC1]interface Vlan-interface 1
[AC1-Vlan-interface1]portal backup-group 2
# Configure the virtual IP address of VRRP group 1 as 8.190.1.100, and specify the priority of AC
1 as 200. AC 2 uses the default priority.
[AC1-Vlan-interface1]vrrp vrid 1 virtual-ip 8.190.1.100
[AC1-Vlan-interface1]vrrp vrid 1 priority 200
[AC1-Vlan-interface1]quit
# Configure the source IP address for RADIUS packets as 8.190.1.100.
[AC1]radius nas-ip 8.190.1.100
# Configure the source IP address for portal packets as 8.190.1.100 (same as the AC's IP address
configured on the IMC server for portal authentication).
[AC1-Vlan-interface1]portal nas-ip 8.190.1.100
Configuring AC 2
Configure AC 2 in the same way you configure AC 1 except that:
• When you configure AC backup, specify AC 1's IP address as the backup AC address.
• Specify the NAS device ID to be used in stateful failover mode as 2.
For more information, see the configuration on AC 1.
The portal group configuration on the two stateful failover devices must be consistent.
806
Configuring IKE
Support for VPN depends on the device model. For more information, see "About the Web-based
configuration guide for HP unified wired-WLAN products."
Overview
Built on a framework defined by the ISAKMP, IKE provides automatic key negotiation and SA
establishment services for IPsec. This simplifies the application, management, configuration and
maintenance of IPsec dramatically.
Instead of transmitting keys directly across a network, IKE peers transmit keying materials between them,
and calculate shared keys, respectively. Even if a third party captures all exchanged data for calculating
the keys, it cannot calculate the keys.
Unless otherwise specified, the term "IKE" in this chapter refers to the IKE version 1 protocol.
Data authentication
Data authentication involves the following concepts:
• Identity authentication—Mutual identity authentication between peers. Two authentication
methods are available: pre-shared key authentication and PKI-based digital signature
authentication (RSA signature).
• Identity protection—Encrypts the identity information with the generated keys before sending the
information.
DH
The DH algorithm is a public key algorithm. With this algorithm, two peers can exchange keying material
and then use the material to calculate the shared keys. Due to the decryption complexity, a third party
cannot decrypt the keys even after intercepting all keying materials.
PFS
The PFS feature is a security feature based on the DH algorithm. By making sure keys have no derivative
relations, it guarantees a broken key brings no threats to other keys. For IPsec, PFS is implemented by
adding an additional key exchange at IKE negotiation phase 2.
IKE operation
IKE negotiates keys and establishes SAs for IPsec in two phases:
1. Phase 1—Two peers establish an ISAKMP SA, a secure, authenticated channel for communication.
In this phase, two modes are available: main mode and aggressive mode.
807
2. Phase 2—Using the ISAKMP SA established in phase 1, the two peers negotiate to establish IPsec
SAs.
Figure 844 IKE exchange process in main mode
As shown in Figure 844, the main mode of IKE negotiation in phase 1 involves three pairs of messages:
• SA exchange—Used for negotiating the security policy.
• Key exchange—Used for exchanging the Diffie-Hellman public value and other values like the
random number. Key data is generated in this stage.
• ID and authentication data exchange—Used for authentication of identity and exchanged data in
phase 1.
The main difference between main mode and aggressive mode is that aggressive mode does not provide
identity protection and only exchanges the above three messages. Aggressive mode exchanges less
information and features higher negotiation speed. It applies to scenarios where the requirement for
identity protection is lower. For scenarios with higher requirement for identity protection, use the main
mode.
808
Relationship between IKE and IPsec
Figure 845 Relationship between IKE and IPsec
Configuration prerequisites
Before you configure IKE, verify the following parameters:
• The strength of the algorithms for IKE negotiation (the security protection level), including the
identity authentication method, encryption algorithm, authentication algorithm, and DH group.
Different algorithms provide different levels of protection. A stronger algorithm means more resistant
to decryption of protected data but requires more resources. Generally, the longer the key, the
stronger the algorithm.
• The pre-shared key or the PKI domain to which the certificate belongs. For more information about
PKI configuration, see "Managing certificates."
809
Step Remarks
Required when IKE peers need to specify an IKE proposal.
An IKE proposal defines a set of attributes describing how IKE negotiation
should take place. You can create multiple IKE proposals with different
preferences. The preference of an IKE proposal is represented by its
sequence number, and the smaller the sequence number, the higher the
preference.
Two peers must have at least one pair of matched IKE proposals for
successful IKE negotiation. During IKE negotiation, the negotiation initiator
sends its IKE proposals to the peer. The peer will match the IKE proposals
against its own IKE proposals, starting with the one with the smallest
sequence number. The match goes on until a match is found or all IKE
proposals are found mismatched. The matched IKE proposals will be used to
2. Configuring an IKE
establish the security tunnel.
proposal
Two matched IKE proposals have the same encryption algorithm,
authentication method, authentication algorithm, and DH group. The
ISAKMP SA lifetime will take the smaller one of the two matched IKE
proposals.
By default, there is an IKE proposal, which has the lowest preference and
uses these default settings:
• Pre-shared key authentication method
• SHA authentication algorithm
• DES-CBC encryption algorithm
• DH group named Group1
• SA lifetime of 86400 seconds
Optional.
DPD irregularly detects dead IKE peers. When the local end sends an IPsec
packet, DPD checks the time the last IPsec packet was received from the peer.
If the time exceeds the DPD interval, it sends a DPD hello to the peer. If the
3. Configuring IKE DPD local end receives no DPD acknowledgement within the DPD packet
retransmission interval, it retransmits the DPD hello. If the local end still
receives no DPD acknowledgement after having made the maximum number
of retransmission attempts (two by default), it considers the peer already
dead, and clears the IKE SA and the IPsec SAs based on the IKE SA.
Required.
Create an IKE peer and configure the related parameters.
IMPORTANT:
4. Configuring an IKE peer
If you change the settings of an IKE peer, make sure you clear the established
IPsec SAs and ISAKMP SAs on the pages displayed after you select VPN >
IKE > IKE SA and select VPN > IPSec > IPSec SA, respectively. Otherwise, SA
renegotiation will fail.
Optional.
5. Viewing IKE SAs
View the summary information of the current ISAKMP SA.
810
Configuring global IKE parameters
1. From the navigation tree, select VPN > IKE.
The IKE Global Configuration page appears.
Figure 846 IKE global configuration page
Item Description
Enter a name for the local security gateway.
If the local device acts as the IKE negotiation initiator and uses the ID type of FQDN or the
user FQDN of the security gateway for IKE negotiation, you must configure this
parameter on the local device. Then, the local device sends its gateway name as
IKE Local Name
identification to its peer and the peer uses the locally configured remote gateway name
to authenticate the local device. Make sure that the local gateway name configured here
is identical to the remote gateway name configured on its peer.
By default, the device name is used as the local gateway name.
Set the interval at which the ISAKMP SA sends NAT keepalive packets to its peer.
NAT mappings on a NAT gateway might get aged. If no packet traverses an IPsec tunnel
NAT Keepalive in a certain period of time, the NAT mapping will be deleted, disabling the tunnel beyond
Interval the NAT gateway from transferring data. To prevent NAT mappings from being aged, an
ISAKMP SA sends to its peer NAT keepalive packets at a certain interval to keep the NAT
session alive.
811
Figure 847 IKE proposal list
3. Click Add.
The IKE Proposal Configuration page appears.
Figure 848 Adding an IKE proposal
Item Description
Enter the IKE proposal number.
IKE Proposal The number also stands for the priority of the IKE proposal, with a smaller value meaning
Number a higher priority. During IKE negotiation, the system matches IKE proposals in order of
proposal number, starting from the smallest one.
Select the authentication method to be used by the IKE proposal. Options include:
Authentication
• Preshared Key—Uses the pre-shared key method.
Method
• RSA Signature—Uses the RSA digital signature method.
812
Item Description
Select the authentication algorithm to be used by the IKE proposal. Options include:
Authentication
• SHA1—Uses HMAC-SHA1.
Algorithm
• MD5—Uses HMAC-MD5.
Select the encryption algorithm to be used by the IKE proposal. Options include:
• DES-CBC—Uses the DES algorithm in CBC mode and 56-bit keys for encryption.
Encryption • 3DES-CBC—Uses the 3DES algorithm in CBC mode and 168-bit keys for encryption.
Algorithm • AES-128—Uses the AES algorithm in CBC mode and 128-bit keys for encryption.
• AES-192—Uses the AES algorithm in CBC mode and 192-bit keys for encryption.
• AES-256—Uses the AES algorithm in CBC mode and 256-bit keys for encryption.
3. Click Add.
The Add IKE DPD page appears.
813
Figure 850 Adding an IKE DPD detector
Item Description
DPD Name Enter a name for the IKE DPD.
Enter the interval after which DPD is triggered if no IPsec protected packets is
DPD Query Triggering Interval
received from the peer.
DPD Packet Retransmission Enter the interval after which DPD packet retransmission will occur if no DPD
Interval response is received.
3. Click Add.
The Add IKE Peer page appears.
814
Figure 852 Adding an IKE peer
Item Description
Peer Name Enter a name for the IKE peer.
Select the IKE negotiation mode in phase 1, which can be Main or Aggressive.
IMPORTANT:
• If you configure one end of an IPsec tunnel to obtain an IP address
IKE Negotiation Mode dynamically, the IKE negotiation mode must be Aggressive. In this case, SAs
can be established as long as the username and password are correct.
• The specified negotiated mode is used when the local peer is the negotiation
initiator. When acting as the responder, the negotiation mode of the initiator
is used.
815
Item Description
Select the local ID type for IKE negotiation phase 1. Options include:
• IP Address—Uses an IP address as the ID in IKE negotiation.
• FQDN—Uses the FQDN type as the ID in IKE negotiation. If this option is
selected, type a name string without any at sign (@) for the local security
gateway, for example, foo.bar.com.
Local ID Type • User FQDN—Uses a user FQDN type as the ID in IKE negotiation. If this
option is selected, type a name string with an at sign (@) for the local security
gateway, for example, [email protected].
IMPORTANT:
In main mode, only the ID type of IP address can be used in IKE negotiation and
SA establishment.
Enter the IP address of the local security gateway.
By default, it is the primary IP address of the interface referencing the security
policy. Configure this item when you want to specify a special address for the
local security gateway.
Local IP Address
IMPORTANT:
Typically, you do not need to specify the local IP address unless you want to specify
a special address, such as the loopback interface address. For the local peer to act
as the initiator, you must configure the remote security gateway name or IP
address, so that the initiator can find the remote peer during the negotiation.
Enter the IP address or host name of the remote security gateway.
• IP Address—Specify an IP address or a range of IP addresses for the remote
gateway. If the local end is the initiator of IKE negotiation, it can have only
one remote IP address and its remote IP address must match the local IP
address configured on its peer. If the local end is the responder of IKE
Remote Gateway Address negotiation, it can have more than one remote IP address and one of its
remote IP addresses must match the local IP address configured on its peer.
• Hostname—Enter the host name of the remote gateway, which is the only
identifier of the IPsec peer in the network. The host name can be resolved into
an IP address by the DNS server. If host name is used, the local end can serve
as the initiator of IKE negotiation.
To use the authentication method of pre-shared key, select Pre-Shared Key and
enter consistent pre-shared keys in the Key and Confirm Key fields.
Pre-Shared Key To use the authentication method of RSA signature, select PKI Domain and then
PKI Domain select the PKI domain to which the certificate belongs in the following list.
Available PKI domains are those configured on the page you enter by selecting
VPN > Certificate Manager > Domain from the navigation tree.
Enable DPD Select the IKE DPD to be applied to the IKE peer.
816
Item Description
Enable the NAT traversal function for IPsec/IKE.
The NAT traversal function must be enabled if a NAT security gateway exists in
an IPsec/IKE VPN tunnel.
You can click Delete All to remove all ISAKMP SAs. To clear a local IPsec SA, the local end must
send a Delete Message to the remote end over the corresponding ISAKMP SA. The message
notifies the remote end to delete the IPsec SA. If the corresponding ISAKMP SA does not exist, the
local end cannot notify the remote end to clear the IPsec SA.
Table 259 Field description
Field Description
Connection ID Identifier of the ISAKMP SA.
817
Field Description
Status of the SA. Possible values include:
• RD—Ready. The SA has already been established and is ready for use.
• ST—Stayalive. The local end is the tunnel negotiation initiator.
• RL—Replaced. The tunnel has been replaced and will be cleared soon.
• FD—Fading. The soft lifetime expires but the tunnel is still in use. The
tunnel will be deleted when the hard lifetime expires.
• TO—Timeout. The SA has received no keepalive packets after the last
Flag keepalive timeout. If no keepalive packets are received before the next
keepalive timeout, the SA will be deleted.
IMPORTANT:
IKE maintains the link status of an ISAKMP SA by keepalive packets.
Generally, if the peer is configured with the keepalive timeout, you must
configure the keepalive packet transmission interval on the local end. If the
peer receives no keepalive packet during the timeout interval, the ISAKMP SA
will be tagged with the TIMEOUT tag (if it does not have the tag), or be deleted
along with the IPsec SAs it negotiated (when it has the tag already).
Domain of Interpretation Interpretation domain to which the SA belongs.
818
Configuring AC 1
1. Configure IP addresses for the interfaces, and assign the interfaces to security zones. (Details not
shown.)
2. Create ACL 3101:
a. From the navigation tree, select QoS > ACL IPv4.
b. Click the Add tab.
c. Enter the ACL number 3101, and select the match order Config.
d. Click Apply.
Figure 855 Creating ACL 3101
819
Figure 856 Configuring a rule to allow packets from subnet 10.1.1.0/24 to subnet 10.1.2.0/24
820
Figure 857 Configuring an IKE peer named peer
821
Figure 858 Creating an IKE proposal numbered 10
822
6. Create an IPsec policy named map1:
a. From the navigation tree, select VPN > IPSec.
b. Click the Policy tab.
c. Click Add.
d. Enter the IPsec policy name map1.
e. Enter the sequence number 10.
f. Select the IKE peer peer.
g. Select the IPsec proposal tran1 from the Available Proposal list, and click <<.
h. Enter the ACL number 3101.
i. Click Apply.
Figure 860 Creating an IPsec proposal named map1
823
7. Apply the IPsec policy to VLAN-interface 1:
a. From the navigation tree, select VPN > IPSec.
The IPSec Application page appears.
无法显示链接的图像。该文
Configuring AC 2
1. Configure IP addresses for the interfaces, and assign the interfaces to security zones. (Details not
shown.)
2. Create ACL 3101:
a. From the navigation tree, select QoS > ACL IPv4.
b. Click the Add tab.
c. Enter the ACL number 3101, and select the match order Config.
824
d. Click Apply.
e. Click the Advanced Setup tab.
f. Select Permit from the Action list.
g. Select Source IP Address, and enter 10.1.2.0 and 0.0.0.255 as the source IP address and
mask.
h. Select Destination IP Address, and enter 10.1.1.0 and 0.0.0.255 as the destination IP address
and mask.
i. Click Apply.
3. Configure an IKE peer named peer:
a. From the navigation tree, select VPN > IKE.
b. Click the Peer tab.
c. Click Add.
d. Enter the peer name peer.
e. Select the negotiation mode Main.
f. Enter the remote gateway IP address 1.1.1.1.
g. Select Pre-Shared Key, and enter the pre-shared key abcde in the Key and Confirm Key fields.
h. Click Apply.
4. Create an IPsec proposal named tran1:
a. From the navigation tree, select VPN > IPSec.
b. Click the Proposal tab.
c. Click Add.
d. From the IPSec Proposal Configuration Wizard page, select Custom mode.
e. Enter the IPsec proposal name tran1.
f. Select the packet encapsulation mode Tunnel.
g. Select the security protocol ESP.
h. Select the authentication algorithm SHA1.
i. Select the encryption algorithm DES.
j. Click Apply.
5. Create an IPsec policy named map1:
a. From the navigation tree, select VPN > IPSec.
b. Click the Policy tab.
c. Click Add.
d. Enter the IPsec policy name map1.
e. Enter the sequence number 10.
f. Select the IKE peer peer.
g. Select the IPsec proposal tran1 from the Available Proposal list, and click <<.
h. Enter the ACL number 3101.
i. Click Apply.
825
6. Apply the IPsec policy to VLAN-interface 1:
a. From the navigation tree, select VPN > IPSec.
The IPSec Application page appears.
无法显示链接的图像。该文
826
Configuring IPsec
Overview
IP Security (IPsec) is a security framework defined by IETF for securing IP communications. It is a Layer 3
VPN technology that transmits data in a secure tunnel established between two endpoints.
IPsec guarantees the confidentiality, integrity, and authenticity of data and provides anti-replay service at
the IP layer in an insecure network environment:
• Confidentiality—The sender encrypts packets before transmitting them over the Internet.
• Data integrity—The receiver verifies the packets received from the sender to ensure they are not
tampered with during transmission.
• Data origin authentication—The receiver verifies the authenticity of the sender.
• Anti-replay—The receiver examines packets, and drops outdated or repeated packets.
IPsec delivers these benefits:
• Reduced key negotiation overheads and simplified maintenance by supporting the IKE protocol.
IKE provides automatic key negotiation and automatic IPsec security association (SA) setup and
maintenance.
• Good compatibility. IPsec can be applied to all IP-based application systems and services without
any modification to them.
• Encryption on a per-packet rather than per-flow basis. This allows for flexibility and greatly
enhances IP security.
IPsec comprises a set of protocols for IP data security, including AH, ESP, IKE, and algorithms for
authentication and encryption. AH and ESP provides security services and IKE performs key exchange.
For more information about IKE, see "Configuring IKE."
Basic concepts
Security protocols
IPsec comes with two security protocols:
• AH (protocol 51)—Provides data origin authentication, data integrity, and anti-replay services. For
these purposes, an AH header is added to each IP packet. AH is suitable for transmitting
non-critical data because it cannot prevent eavesdropping even though it works fine in preventing
data tampering. AH supports authentication algorithms such as MD5 and SHA-1.
• ESP (protocol 50)—Provides data encryption in addition to origin authentication, data integrity, and
anti-replay services. ESP works by inserting an ESP header and an ESP trailer in IP packets. Unlike
AH, ESP encrypts data before encapsulating the data to ensure data confidentiality. ESP supports
encryption algorithms such as DES, 3DES, and AES, and authentication algorithms such as MD5
and SHA-1. The authentication function is optional to ESP.
Both AH and ESP provide authentication services, but the authentication service provided by AH is
stronger. In practice, you can choose either or both security protocols. When both AH and ESP are used,
an IP packet is encapsulated first by ESP and then by AH.
827
Security association
A security association is an agreement negotiated between two communicating parties called IPsec
peers. It comprises a set of parameters for data protection, including security protocols, encapsulation
mode, authentication and encryption algorithms, and privacy keys and their lifetime. SAs can be set up
manually or through IKE.
An SA is unidirectional. At least two SAs are needed to protect data flows in a bidirectional
communication. Moreover, if two peers want to use both AH and ESP to protect data flows between them,
they construct an independent SA for each protocol.
An SA is uniquely identified by a triplet, which consists of the security parameter index (SPI), destination
IP address, and security protocol (AH or ESP).
An SPI is a 32-bit number for uniquely identifying an SA. It is transmitted in the AH/ESP header. A
manually configured SA requires an SPI to be specified manually for it. An IKE created SA will have an
SPI generated at random.
A manually configured SA never ages out. An IKE created SA has a specified period of lifetime, which
comes in two types:
• Time-based lifetime—Defines how long an SA can be valid after it is created.
• Traffic-based lifetime—Defines the maximum traffic that an SA is allowed to process.
The SA becomes invalid when either of the lifetime timers expires. Before the SA expires, IKE negotiates
a new SA, which takes over immediately after its creation.
Encapsulation modes
IPsec supports the following IP packet encapsulation modes:
• Tunnel mode—IPsec protects the entire IP packet (the IP header and the payload). It uses the entire
IP packet to calculate an AH or ESP header, and then encapsulates the original IP packet and the
AH or ESP header with a new IP header. If you use ESP, an ESP trailer is also encapsulated. Tunnel
mode typically is used for protecting gateway-to-gateway communications.
• Transport mode—IPsec protects only the IP payload. It uses only the IP payload to calculate the AH
or ESP header, and inserts the calculated header between the original IP header and payload. If
you use ESP, an ESP trailer is also encapsulated. The transport mode typically is used for protecting
host-to-host or host-to-gateway communications.
Figure 863 shows how the security protocols encapsulate an IP packet in different encapsulation modes.
Figure 863 Encapsulation by security protocols in different modes
828
Authentication algorithms and encryption algorithms
• Authentication algorithms
IPsec uses hash algorithms to perform authentication. A hash algorithm produces a fixed-length
digest for an arbitrary-length message. IPsec peers calculate message digests for each packet. If
the resulting digests are identical, the packet is considered intact.
IPsec supports the following hash algorithms for authentication:
MD5—Takes a message of arbitrary length as input and produces a 128-bit message digest.
SHA-1—Takes a message of a maximum length less than the 64th power of 2 in bits as input
and produces a 160-bit message digest.
Compared with SHA-1, MD5 is faster but less secure.
• Encryption algorithms
IPsec typically uses symmetric encryption algorithms, which encrypt and decrypt data by using the
same keys. The following encryption algorithms are available for IPsec on the device:
DES—Encrypts a 64-bit plain text block with a 56-bit key. DES is the least secure but the fastest
algorithm. It is sufficient for general security requirements.
3DES—Encrypts plain text data with three 56-bit DES keys. The key length totals up to 168 bits.
It provides moderate security strength and is slower than DES.
AES—Encrypts plain text data with a 128-bit, 192-bit, or 256-bit key. AES provides the highest
security strength and is slower than 3DES.
IPsec tunnel
An IPsec tunnel is a bidirectional channel created between two peers. An IPsec tunnel comprises one or
more pairs of SAs.
IPsec RRI
With IPsec Reverse Route Inject (RRI), an IPsec tunnel gateway can automatically add static routes
destined for its peer IPsec tunnel gateways to a routing table.
IPsec RRI frees you from the tedious work of manually configuring and maintaining static routes for IPsec
tunnels. For example, if you enable RRI on Device A in Figure 864, Device A can automatically create a
static route to branch network 192.168.2.0/24 for the IPsec protected traffic from the headquarters to the
branch. You do not need to add the route manually.
829
Figure 864 An IPsec VPN
You can advertise the static routes created by IPsec RRI in the internal network. IPsec RRI can quickly
create new routes for forwarding IPsec VPN traffic when an active link fails in a load balanced or stateful
failover environment, or when IPsec VPN traffic cannot reach the peer gateway through the default local
gateway.
IPsec RRI dynamically creates static routes based on IPsec SAs. In each static route, the destination
address is the address of a protected branch network, and the next hop is the user-specified remote peer
address or the remote tunnel endpoint's address learned during IPsec SA negotiation.
In an MPLS L3VPN network, an RRI-configured IPsec VPN gateway can add static routes into the IP
routing table of the VPN instance that is bound to the interface applied with an IPsec policy.
IPsec RRI creates static routes when the IPsec SAs are established, and deletes the static routes when the
IPsec SAs are deleted.
830
Figure 865 IPsec stateful failover
LAN
Virtual router 2
Master Backup
Failover link
el
Internet
nn
tu
c
se
IP
Device C
LAN
As shown in Figure 865, Device A and Device B form an IPsec stateful failover system and Device A is
elected the master in the VRRP group. When Device A operates correctly, it establishes an IPsec tunnel to
Device C, and synchronizes its IPsec service data to Device B. The synchronized IPsec service data
includes the IKE SA, IPsec SAs, anti-replay sequence number and window, SA lifetime in bytes, and DPD
packet sequence number. Based on the IPsec service data, Device B creates standby IKE SA and standby
IPsec SAs to back up the active IKE SA and active IPsec SAs on Device A. When Device A fails, the VRRP
mechanism switches IPsec traffic from Device A to Device B. Because Device B has an instant copy of
Device A's IPsec service data, Device B can immediately process IPsec traffic to provide nonstop IPsec
service.
Configuration guidelines
When you configure IPsec, follow these guidelines:
• Typically, IKE uses UDP port 500 for communication, and AH and ESP use the protocol numbers 51
and 50, respectively. You must make sure flows of these protocols are not denied on the interfaces
with IKE or IPsec configured.
831
• If you enable both IPsec and QoS on an interface, traffic of an IPsec SA might be put into different
queues by QoS, causing some packets to be sent out of order. As IPsec performs anti-replay
operation, packets outside the anti-replay window in the inbound direction might be discarded,
resulting in packet loss. When using IPsec together with QoS, make sure they use the same
classification rules. IPsec classification rules depend on the referenced ACL rules.
Configuration considerations
You configure IPsec tunnels on the device by configuring IPsec polices. The IPsec policies use ACLs to
identify protected traffic, and take effect after being applied to physical interfaces.
Configure IPsec policies by using the following steps:
1. Configure ACLs for identifying the data flows to be protected by IPsec.
2. Configure IPsec proposals to specify the security protocols, authentication and encryption
algorithms, and encapsulation mode. An IPsec proposal applies to data flows associated with it.
3. Configure IPsec policies to associate data flows with IPsec proposals and specify the SA
negotiation mode, the start and end points of the IPsec tunnels, the privacy keys, and the SA
lifetime.
4. Apply the IPsec policies to interfaces.
Required.
An IPsec proposal defines a set of security parameters for IPsec SA
negotiation, including the security protocol, encryption and
2. Configuring an IPsec proposal authentication algorithms, and encapsulation mode.
IMPORTANT:
Changes to an IPsec proposal affect only SAs negotiated after the
changes are made.
Required if you are using an IPsec policy template group to create an
IPsec policy.
3. Configuring an IPsec policy An IPsec policy template group is a collection of IPsec policy templates
template with the same name but different sequence numbers. In an IPsec policy
template group, an IPsec policy template with a smaller sequence
number has a higher priority.
832
Step Remarks
Required.
Configure an IPsec policy by specifying the parameters directly or using
a created IPsec policy template. The device supports only IPsec policies
that use IKE.
An IPsec policy group is a collection of IPsec policies with the same
name but different sequence numbers. The smaller the sequence
4. Configuring an IPsec policy number, the higher the priority of the IPsec policy in the policy group.
IMPORTANT:
An IPsec policy referencing a template cannot be used to initiate SA
negotiations but can be used to respond to a negotiation request. The
parameters specified in the IPsec policy template must match those of the
remote end. The parameters not defined in the template are determined
by the initiator.
Required.
5. Applying an IPsec policy group Apply an IPsec policy group to an interface (logical or physical) to
protect certain data flows.
Optional.
6. Viewing IPsec SAs View brief information about established IPsec SAs to verify your
configuration.
Optional.
7. Viewing packet statistics
View packet statistics to verify your configuration.
Configuring ACLs
For more information about ACL configuration, see "QoS > ACL IPv4," and "QoS > ACL IPv6."
If you enable both IPsec and QoS on an interface, traffic of an IPsec SA might be put into different queues
by QoS, causing some packets to be sent out of order. Because IPsec performs anti-replay operation,
packets outside the anti-replay window in the inbound direction might be discarded, resulting in packet
loss. When using IPsec together with QoS, make sure that they use the same classification rules. IPsec
classification rules depend on the referenced ACL rules. For more information about QoS classification
rules, see "Configuring QoS."
When defining ACL rules for IPsec, follow these guidelines:
• Make sure that only the data flows to be protected by IPsec are defined in permit statements. If a
packet is protected at the entry of the IPsec tunnel but not at the exit of the IPsec tunnel, it will be
dropped.
• Avoid statement conflicts in the scope of IPsec policy groups. When creating a deny statement, be
careful with its matching scope and matching order relative to permit statements. The policies in an
IPsec policy group have different match priorities. ACL rule conflicts between them are prone to
cause mistreatment of packets. For example, when configuring a permit statement for an IPsec
policy to protect an outbound traffic flow, you must avoid the situation that the traffic flow matches
a deny statement in a higher priority IPsec policy. Otherwise, the packets will be sent out as normal
packets; if they match a permit statement at the receiving end, they will be dropped by IPsec.
833
Use of the Permit/Deny Actions in ACLs
IPsec uses ACLs to identify data flows. An ACL is a collection of ACL rules. Each ACL rule is a deny or
permit statement. A permit statement identifies a data flow protected by IPsec, and a deny statement
identifies a data flow that is not protected by IPsec. IPsec uses referenced ACL to match against packets.
The matching process stops once a match is found or ends with no match hit. The packet is handled as
follows:
• Each ACL rule matches both the outbound traffic and the returned inbound traffic. Suppose there is
a rule as shown in Figure 866. This rule matches both traffic from 1.1.1.0 to 2.2.2.0 and returned
traffic from 2.2.2.0 to 1.1.1.0.
Figure 866 An ACL referenced in an IPsec policy
• In the outbound direction, if a permit statement is matched, IPsec considers the packet as requiring
protection and continues to process it. If a deny statement is matched or no match is found, IPsec
considers the packet as not requiring protection and delivers it to the next function module.
• In the inbound direction, if the packet is an IPsec packet and matches a permit statement, IPsec
receives and processes the packet. If the packet is not an IPsec packet and matches a permit
statement, it is discarded.
The following uses a configuration example to show how a statement conflict causes packet drop. In this
example, only the ACL-related configurations are presented.
Device A connects the segment 1.1.2.0/24 and Device B connects the segment 3.3.3.0/24. On Device
A, apply the IPsec policy group test to the outbound interface to Device B. The IPsec policy group
contains two policies, test 1 and test 2. The ACLs referenced by the two policies each contain a rule that
matches traffic from 1.1.2.0/24 to 3.3.3.0/24. The one referenced in policy test 1 is a deny statement
and the one referenced in policy test 2 is a permit statement. Because test 1 is matched prior to test 2,
traffic from 1.1.2.0/24 to 3.3.3.0/24 will match the deny statement and sent as normal traffic. When the
traffic arrives at Device B, it will be dropped if it matches a permit statement in the ACL referenced in the
applied IPsec policy.
The configurations on Device A are shown in Figure 867, Figure 868, and Figure 869.
834
Figure 867 ACL 3000 configuration on Device A
The configurations on Device B are shown in Figure 870 and Figure 871.
835
Figure 870 ACL 3001 configuration on Device B
Host B Host D
Mirror image ACLs at Device A GE0/1 and Device B GE0/2
836
If the ACL rules on the peers do not form mirror images of each other, SAs can be set up only when both
of the following requirements are met:
• The range specified by an ACL rule on one peer is covered by its counterpart ACL rule on the other
peer. As shown in Figure 873, the range specified by the ACL rule configured on Device A is
covered by its counterpart on Device B.
• The peer with the narrower rule initiates SA negotiation. If a wider ACL rule is used by the SA
initiator, the negotiation request might be rejected because the matching traffic is beyond the scope
of the responder. As shown in Figure 873, the SA negotiation initiated by Host A to Host C is
accepted, but the SA negotiation from Host C to Host B or from Host D to Host A is rejected.
Figure 873 Non-mirror image ACLs
Protection modes
Data flows can be protected in the following modes:
• Standard mode—One tunnel is used to protect one data flow. The data flow permitted by each ACL
rule is protected by one tunnel that is established separately for it.
• Aggregation mode—One tunnel is used to protect all data flows permitted by all the rules of an ACL.
This mode applies to only scenarios that use IKE for negotiation.
837
Figure 874 IPsec proposal list
3. Click Add.
The IPSec Proposal Configuration Wizard page appears.
Figure 875 IPsec proposal configuration wizard page
838
Tunnel-AH-MD5-ESP-3DES—Uses the ESP and AH security protocols successively, making ESP
use the 3DES encryption algorithm and perform no authentication, and making AH use the
MD5 authentication algorithm.
All these suites use the tunnel mode for IP packet encapsulation.
7. Click Apply.
Item Description
Proposal Name Enter a name for the IPsec proposal.
Select an IP packet encapsulation mode for the IPsec proposal. Options include:
Encapsulation
• Tunnel—Uses the tunnel mode.
Mode
• Transport—Uses the transport mode.
Select a security protocol setting for the proposal. Options include:
• AH—Uses the AH protocol.
Security Protocol
• ESP—Uses the ESP protocol.
• AH-ESP—Uses ESP first and then AH.
839
Item Description
Select an authentication algorithm for AH when the security protocol setting is AH or
AH Authentication AH-ESP.
Algorithm
Available authentication algorithms include MD5 and SHA1.
Select an authentication algorithm for ESP when the security protocol setting is ESP or
AH-ESP.
ESP Authentication You can select MD5 or SHA1, or leave it null so the ESP performs no authentication.
Algorithm
IMPORTANT:
The ESP authentication algorithm and ESP encryption algorithm cannot be both null.
Select an encryption algorithm for ESP when the security protocol is ESP or AH-ESP.
Options include:
• DES—Uses the DES algorithm and 56-bit keys for encryption.
• 3DES—Uses the 3DES algorithm and 168-bit keys for encryption.
• AES128—Uses the AES algorithm and 128-bit keys for encryption.
• AES192—Uses the AES algorithm and 192-bit keys for encryption.
ESP Encryption
• AES256—Uses the AES algorithm and 256-bit keys for encryption.
Algorithm
• Leave it null so the ESP performs no encryption.
IMPORTANT:
• Higher security means increased complexity and decreased speed. DES is sufficient
for general security requirements. Use 3DES if you require high confidentiality and
security.
• The ESP authentication and encryption algorithms cannot be both null.
3. Click Add.
The Add IPSec Template page appears.
840
Figure 879 Adding an IPsec policy template
Item Description
Template Name Enter a name for the IPsec policy template.
841
Item Description
Select up to six IPsec proposals for the IPsec policy template.
IPSec Proposal IPsec SAs can be set up only when the IPsec peers have at least one matching IPsec
proposal. If no matching IPsec proposal is available, the IPsec SAs cannot be
established, and the packets that need to be protected are discarded.
Enable and configure the PFS feature or disable the feature. Options include:
• dh-group1—Uses the 768-bit Diffie-Hellman group.
• dh-group2—Uses the 1024-bit Diffie-Hellman group.
• dh-group5—Uses the 1536-bit Diffie-Hellman group.
• dh-group14—Uses the 2048-bit Diffie-Hellman group.
PFS
IMPORTANT:
• dh-group14, dh-group5, dh-group2, and dh-group1 are in descending order of
security and calculation time.
• When IPsec uses an IPsec policy configured with PFS to initiate negotiation, an
additional key exchange is performed in phase 2 for higher security.
• Two peers must use the same Diffie-Hellman. Otherwise, negotiation will fail.
Select an ACL for identifying protected traffic.
The specified ACL must be created already and contains at least one rule.
ACL ACL configuration supports VPN multi-instance.
Make sure that this ACL has been created and contains at least one rule.
You can use an ACL to identify traffic between VPN instances.
842
Configuring an IPsec policy
1. From the navigation tree, select VPN > IPSec.
2. Click the Policy tab.
The IPsec policy list page appears.
Figure 880 IPsec policy list
3. Click Add.
The Add IPSec Policy page appears.
843
Figure 881 Adding an IPsec policy
Item Description
Policy Name Enter a name for the IPsec policy.
844
Item Description
Select an IPsec policy template.
Template IMPORTANT:
If you select an IPsec policy template, all subsequent configuration items except the
aggregation setting are unavailable.
Select an IKE peer for the IPsec policy.
IKE Peer
You configure IKE peers by selecting VPN > IKE from the navigation tree.
IPSec Proposal IPsec SAs can be set up only when the IPsec peers have at least one matching IPsec
proposal. If no matching IPsec proposal is available, the IPsec SAs cannot be established
and the packets that need to be protected are discarded.
Enable and configure the PFS feature or disable the feature. Options include:
• dh-group1—Uses the 768-bit Diffie-Hellman group.
• dh-group2—Uses the 1024-bit Diffie-Hellman group.
• dh-group5—Uses the 1536-bit Diffie-Hellman group.
• dh-group14—Uses the 2048-bit Diffie-Hellman group.
PFS
IMPORTANT:
• dh-group14, dh-group5, dh-group2, and dh-group1 are in descending order of
security and calculation time.
• When IPsec uses an IPsec policy configured with PFS to initiate negotiation, an
additional key exchange is performed in phase 2 for higher security.
• Two peers must use the same Diffie-Hellman. Otherwise, negotiation will fail.
Select an ACL for identifying protected traffic.
ACL Make sure that this ACL has been created and contains at least one rule.
You can use an ACL to identify traffic between VPN instances.
Select this option if you are using one tunnel to protect all data flows permitted by the
ACL. If you do not select the aggregation mode, the standard mode applies and one
tunnel is set up for each data flow permitted by the ACL.
Aggregation This configuration item is available after you specify an ACL.
IMPORTANT:
The two ends of a tunnel must operate in the same mode.
845
Item Description
Enable or disable IPsec RRI. When enabling IPsec RRI, you can specify a next hop and
change the preference of the static routes.
After an outbound IPsec SA is created, IPsec RRI automatically creates a static route to the
peer private network. You do not have to manually configure the static route.
无法显示链接的图像。该文
846
3. Select an IPsec policy for the interface.
4. Click Apply.
Field Description
Source IP IP address of the local end of the IPsec SA.
847
Figure 885 Packet statistics
Headquarter Branch
Host A Host B
10.1.1.2/24 10.1.2.2/24
Configuring AC 1
1. Configure IP addresses for the interfaces, and assign the interfaces to target zones. (Details not
shown.)
2. Define ACL 3101 to permit packets from subnet 10.1.1.0/24 to subnet 10.1.2.0/24:
848
a. From the navigation tree, select QoS > ACL IPv4.
b. Click the Add tab.
c. Enter the ACL number 3101, and select the match order Config.
d. Click Apply.
Figure 887 Creating ACL 3101
849
Figure 888 Configuring a rule to permit packets from 10.1.1.0/24 to 10.1.2.0/24
850
Figure 889 Configuring IPsec proposal tran1
851
Figure 890 Configuring an IKE peer
852
Figure 891 Configuring an IPsec policy
853
Figure 892 Applying IPsec policy to VLAN-interface 1
Configuring Device B
The configuration steps on Device B are similar to those on Device A. The configuration pages are not
shown.
1. Configure IP addresses for the interfaces, and assign the interfaces to the target zones. (Details not
shown.)
2. Define an ACL to permit traffic from subnet 10.1.2.0/24 to subnet 10.1.1.0/24:
a. From the navigation tree, select QoS > ACL IPv4.
b. Click the Add tab.
c. Enter the ACL number 3101, and select the match order Config.
d. Click Apply.
e. Click the Advanced Setup tab.
f. Select the ACL number 3101.
g. Select Permit from the Action list.
h. Select Source IP Address, and enter 10.1.2.0 and 0.0.0.255 as the source IP address and
mask.
i. Select Destination IP Address, and enter 10.1.1.0 and 0.0.0.255 as the destination IP address
and mask.
j. Click Apply.
3. Configure a static route to Host 1:
a. From the navigation tree, select Network > IPv4 Routing.
b. Click the Add tab.
c. Enter the destination IP address 10.1.1.0 and mask 255.255.255.0.
d. Select the outbound interface Vlan-interface1.
e. Click Apply.
4. Configure an IPsec proposal named tran1:
a. From the navigation tree, select VPN > IPSec.
b. Click the Proposal tab.
c. Click Add.
d. From the IPSec Proposal Configuration Wizard page, select Custom mode.
e. Enter the IPsec proposal name tran1.
f. Select the packet encapsulation mode Tunnel.
854
g. Select the security protocol ESP.
h. Select the authentication algorithm SHA1.
i. Select the encryption algorithm DES.
j. Click Apply.
5. Configure IKE peer peer:
a. From the navigation tree, select VPN > IKE.
b. Click the Peer tab.
c. Click Add.
d. Enter the peer name peer.
e. Select the negotiation mode Main.
f. Enter the remote gateway IP address 2.2.2.1.
g. Select Pre-Shared Key, and enter abcde for both the Key and Confirm Key fields.
h. Click Apply.
6. Configure IPsec policy map1:
a. From the navigation tree, select VPN > IPSec.
b. Click the Policy tab.
c. Click Add.
d. Enter the policy name map1.
e. Enter the sequence number 10.
f. Select the IKE peer peer.
g. Select the IPsec proposal tran1 and click <<.
h. Enter the ACL number 3101.
i. Click Apply.
7. Apply IPsec policy map1 to VLAN-interface 1:
a. From the navigation tree, select VPN > IPSec.
The page for the IPSec Application tab appears.
b. Click the icon of interface Vlan-interface 1.
c. Select the policy of map1.
d. Click Apply.
855
Support and other resources
Contacting HP
For worldwide technical support information, see the HP support website:
http://www.hp.com/support
Before contacting HP, collect the following information:
• Product model names and numbers
• Technical support registration number (if applicable)
• Product serial numbers
• Error messages
• Operating system type and revision level
• Detailed questions
Subscription service
HP recommends that you register your product at the Subscriber's Choice for Business website:
http://www.hp.com/go/wwalerts
After registering, you will receive email notification of product enhancements, new driver versions,
firmware updates, and other product resources.
Related information
Documents
To find related documents, browse to the Manuals page of the HP Business Support Center website:
http://www.hp.com/support/manuals
• For related documentation, navigate to the Networking section, and select a networking category.
• For a complete list of acronyms and their definitions, see HP FlexNetwork Technology Acronyms.
Websites
• HP.com http://www.hp.com
• HP Networking http://www.hp.com/go/networking
• HP manuals http://www.hp.com/support/manuals
• HP download drivers and software http://www.hp.com/support/downloads
• HP software depot http://www.software.hp.com
• HP Education http://www.hp.com/learn
856
Conventions
This section describes the conventions used in this documentation set.
Command conventions
Convention Description
Boldface Bold text represents commands and keywords that you enter literally as shown.
Italic Italic text represents arguments that you replace with actual values.
[] Square brackets enclose syntax choices (keywords or arguments) that are optional.
Braces enclose a set of required syntax choices separated by vertical bars, from which
{ x | y | ... }
you select one.
Square brackets enclose a set of optional syntax choices separated by vertical bars, from
[ x | y | ... ]
which you select one or none.
The argument or keyword and argument combination before the ampersand (&) sign can
&<1-n>
be entered 1 to n times.
GUI conventions
Convention Description
Window names, button names, field names, and menu items are in bold text. For
Boldface
example, the New User window appears; click OK.
> Multi-level menus are separated by angle brackets. For example, File > Create > Folder.
Symbols
Convention Description
An alert that calls attention to important information that if not understood or followed can
WARNING result in personal injury.
An alert that calls attention to important information that if not understood or followed can
CAUTION result in data loss, data corruption, or damage to hardware or software.
857
Network topology icons
Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports
Layer 2 forwarding and other Layer 2 features.
858
Index
ABCDEFGILMNOPQRSTUVW
A Configuration guidelines,172
Configuration guidelines,76
AAA configuration example,541
Configuration guidelines,631
AC-AP tunnel,280
Configuration guidelines,101
Access service overview,311
Configuration guidelines,797
ACL and QoS configuration example,667
Configuration guidelines,579
ACL overview,630
Configuration guidelines,831
Adding a DNS server address,218
Configuration guidelines,546
Adding a domain name suffix,219
Configuration guidelines,132
Adding a member to the IACTP tunnel,443
Configuration guidelines,206
Adding a mirroring group,102
Configuration prerequisites,510
Admin configuration,33
Configuration prerequisites,502
Advanced settings configuration examples,747
Configuration prerequisites,534
Advanced settings overview,700
Configuration prerequisites,809
ALG configuration examples,269
Configuration prerequisites,226
ALG process,267
Configuration procedure,510
AP configuration,40
Configuration procedure,559
AP configuration examples,303
Configuration procedure,534
AP group,280
Configuration procedure,269
Applying an IPsec policy group,846
Configuration procedure,503
Auto AP,280
Configuration procedure,226
Automatic power adjustment configuration
Configuration procedures,580
example,493
Configuration summary,42
B
Configuring 802.1X globally,503
Backing up the configuration,86 Configuring 802.1X on a port,505
Backup client authentication configuration Configuring a DNS mapping,260
example,395 Configuring a guest,572
Bandwidth guarantee configuration example,697 Configuring a local user,568
Basic configuration,32 Configuring a MAC address entry,137
C Configuring a management IP address,135
CAC service configuration example,692 Configuring a portal-free rule,517
Certificate management configuration example,591 Configuring a PPPoE client,233
Clearing dynamic DNS cache,219 Configuring a QoS policy,654
Common items on the Web pages,20 Configuring a RADIUS scheme,547
Configuration considerations,832 Configuring a user group,570
Configuration guidelines,251 Configuring a user profile,575
859
Configuring accounting methods for the ISP Configuring rate limit,649
domain,539 Configuring rogue device detection,601
Configuring ACLs,833 Configuring service management,240
Configuring advanced parameters for portal Configuring SNMP trap function,121
authentication,515 Configuring spectrum analysis,487
Configuring an ACL,632 Configuring stateful failover,798
Configuring an AP,281 Configuring static name resolution table,216
Configuring an AP group,294 Configuring system name,70
Configuring an IACTP tunnel,442 Configuring the bandwidth guarantee function,689
Configuring an IKE peer,814 Configuring the blacklist and whitelist functions,611
Configuring an IKE proposal,811 Configuring the network time,77
Configuring an internal server,257 Configuring the portal service,511
Configuring an IPsec policy,843 Configuring the priority trust mode of a port,651
Configuring an IPsec policy template,840 Configuring the system time,77
Configuring an IPsec proposal,837 Configuring the time zone and daylight saving time,79
Configuring an ISP domain,535 Configuring user isolation,620
Configuring an SNMP community,116 Configuring Web idle timeout,70
Configuring an SNMP group,117 Configuring WIDS,609
Configuring an SNMP user,119 Configuring WLAN advanced settings,713
Configuring an SNMP view,114 Configuring WLAN roaming,445
Configuring AP-based client access control,301 Contacting HP,856
Configuring ARP detection,158 Conventions,857
Configuring authentication methods for the ISP Creating a link aggregation group,208
domain,536
Creating a PKI domain,584
Configuring authorization methods for the ISP
Creating a PKI entity,582
domain,538
Creating a static address mapping,255
Configuring auto AP,288
Creating a static ARP entry,151
Configuring calibration,476
Creating a user,108
Configuring channel scanning,474
Creating a VLAN,142
Configuring data transmit rates,467
Creating an address pool,252
Configuring DNS proxy,218
Creating an interface,92
Configuring dynamic domain name resolution,217
Creating an IPv4 static route,173
Configuring dynamic NAT,254
Creating an IPv6 static route,175
Configuring global IKE parameters,811
Customizing authentication pages,518
Configuring gratuitous ARP,152
Configuring IGMP snooping on a port,165 D
Configuring IGMP snooping on a VLAN,163 DDNS configuration example,228
Configuring IKE DPD,813 Destroying the RSA key pair,587
Configuring IP address match criteria for an AP Device information,43
group,294 DHCP configuration examples,196
Configuring mesh service,417 DHCP overview,180
Configuring other ARP attack protection functions,159 DHCP snooping overview,181
Configuring policy-based forwarding,355 Displaying aggregate interface information,208
Configuring ports for a mirroring group,103 Displaying AP,50
Configuring radios,459 Displaying ARP entries,150
860
Displaying client statistics,686 IPv4 and IPv6 static route configuration examples,176
Displaying clients,60 L
Displaying file list,89
Link aggregation and LACP configuration example,212
Displaying IGMP snooping multicast entry
Local client authentication configuration example,403
information,166
Local EAP service configuration example,560
Displaying interface information and statistics,91
Local MAC authentication configuration example,367
Displaying LACP-enabled port information,211
Logging in to the Web interface,29
Displaying PPPoE client session information,235
Logging out of the Web interface,30
Displaying PPPoE client session statistic
information,234 Loopback operation,132
Displaying radio statistics,685 M
Displaying registered enhanced licenses,69 MAC address configuration example,139
Displaying session table information,628 Manual channel adjustment configuration
Displaying SNMP packet statistics,123 example,491
Displaying syslog,82 Mesh DFS configuration example,437
Displaying the IPv4 active route table,172 Mesh overview,415
Displaying the IPv6 active route table,174 Modifying a Layer 2 interface,94
Displaying the system time,76 Modifying a Layer 3 interface,97
Displaying WLAN service,45 Modifying a port,144
DNS configuration example,220 Modifying a VLAN,143
Downloading a file,89
N
Dynamic WEP encryption-802.1X authentication
configuration example,389 NAT configuration examples,261
E O
861
Overview,796 Restrictions and guidelines,25
Overview,101 Retrieving and displaying a certificate,588
P Retrieving and displaying a CRL,591
Rogue detection configuration example,614
Ping,242
Ping operation,243 S
Policy-based forwarding configuration example,409 Saving the configuration,87
Port mirroring configuration example,104 Selecting an antenna,486
Port mirroring configuration task list,102 Setting buffer capacity and refresh interval,84
Portal authentication configuration example,521 Setting CAC admission policy,681
Portal configuration,38 Setting EDCA parameters for wireless clients,683
PPPoE client configuration example,236 Setting LACP priority,210
Q Setting radio EDCA parameters for APs,682
Setting rate limiting,687
QoS overview,630
Setting the aging time of MAC address entries,138
Quick Start wizard home page,32
Setting the log host,83
R Setting the super password,109
Radio group configuration example,496 Setting the SVP service,680
Radio overview,455 SNMP configuration task list,111
RADIUS configuration,36 SNMP overview,111
RADIUS configuration example,554 SNMPv1/SNMPv2c configuration example,123
Rebooting the device,73 SNMPv3 configuration example,126
Recommended configuration procedure,161 Specifying the main boot file,90
Recommended configuration procedure,142 Spectrum analysis,458
Recommended configuration procedure,251 Spectrum analysis configuration example,498
Recommended configuration procedure,216 Stateful failover configuration example,799
Recommended configuration procedure,832 Static ARP configuration example,153
Recommended configuration procedure,809 Switching the user access level to the management
Recommended configuration procedure (for DHCP level,110
relay agent),188 System time configuration example,80
Recommended configuration procedure (for DHCP T
server),181
Trace route,242
Recommended configuration procedure (for DHCP
snooping),193 Trace route operation,245
Recommended link aggregation and LACP Typical network scenarios,1
configuration procedures,207 U
Registering an enhanced license,68
Upgrading software,72
Related information,856
Uploading a file,90
Remote 802.1X authentication configuration
User isolation configuration example,622
example,378
User isolation overview,619
Remote MAC authentication configuration
example,372 V
Removing a file,90 Viewing IKE SAs,817
Removing ARP entries,152 Viewing IPsec SAs,847
Requesting a local certificate,590 Viewing packet statistics,847
Restoring the configuration,86 VLAN configuration example,145
862
W Wireless service-based static rate limiting
configuration example,694
Web interface,6
WLAN mesh configuration example,432
Web user level,7
WLAN roaming configuration examples,446
Web-based NM functions,7
WLAN roaming overview,442
Wireless configuration,35
WLAN RRM overview,455
Wireless service configuration example,359
WLAN security overview,597
Wireless service-based dynamic rate limiting
configuration example,695 WPA-PSK authentication configuration example,362
863