H3c-technologies H3C WA2600 Series WLAN Access Points Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Směrovače H3c-technologies H3C WA2600 Series WLAN Access Points. H3C Technologies H3C WA2600 Series WLAN Access Points User Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 84
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
H3C WA Series WLAN Access Points
WLAN Configuration Guide
Hangzhou H3C Technologies Co., Ltd.
http://www.h3c.com
Document Version: 6W100-20100910
Zobrazit stránku 0
1 2 3 4 5 6 ... 83 84

Shrnutí obsahu

Strany 1 - WLAN Configuration Guide

H3C WA Series WLAN Access PointsWLAN Configuration GuideHangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document Version: 6W100-20100910

Strany 2 - Trademarks

2-1 2 Feature Matrix z Support of the H3C WA series WLAN access points for features, commands and parameters may vary by device model. See this do

Strany 3 - Preface

3-1 3 Command/Parameter Matrix Table 3-1 Command/Parameter matrix Document Module Command/Parameter WA2200 series WA2600 series display ip https

Strany 4 - Symbols

3-2 Document Module Command/Parameter WA2200 series WA2600 series The maximum number of broadcast packets that can be forwarded on an Ethernet int

Strany 5 - Documentation Feedback

4-1 z The models listed in this document are not applicable to all regions. Please consult your local sales office for the models applicable to you

Strany 6 - Table of Contents

4-2 To do… Use the Command… Remarks Set the description string for the interface description text Optional By default, the description string of an

Strany 7

4-3 WLAN Mesh Interface Introduction WLAN mesh interfaces are Layer 2 virtual interfaces. You can use them as configuration templates to make and sav

Strany 8

5-1 z The models listed in this document are not applicable to all regions. Please consult your local sales office for the models applicable to you

Strany 9

5-2 Figure 5-1 Open system authentication process APClientAuthentication requestAuthentication response z Shared key authentication The following f

Strany 10 - 2 Feature Matrix

5-3 Wired Equivalent Privacy (WEP) was developed to protect data exchanged among authorized users in a wireless LAN from casual eavesdropping. WEP us

Strany 11 - 3 Command/Parameter Matrix

5-4 1) PSK authentication Both WPA wireless access and WPA2 wireless access support PSK authentication. To implement PSK authentication, the client a

Strany 12

Copyright © 2010, Hangzhou H3C Technologies Co., Ltd. and its licensors All Rights Reserved No part of this manual may be reproduced or transmitted

Strany 13 - WLAN Interface Configuration

5-5 Follow these steps to enable the authentication method: To do… Use the command… Remarks Enter system view system-view — Enter WLAN service temp

Strany 14 - WLAN-BSS Interface

5-6 To do… Use the command… Remarks Enter system view system-view — Enter WLAN service template view wlan service-template service-template-number

Strany 15 - WLAN Mesh Link Interface

5-7 Disable 802.1X online user handshake function before starting PTK and GTK negotiation. Configuring WPA security IE Wi-Fi Protected Access (WPA)

Strany 16 - WLAN Security Configuration

5-8 z In open system authentication mode, a WEP key is used for encryption only. A client can go online without having the same key as the authentic

Strany 17 - WLAN Data Security

5-9 Configuring TKIP Follow these steps to configure TKIP: To do… Use the command… Remarks Enter system view system-view — Enter WLAN service templ

Strany 18 - Client Access Authentication

5-10 To do… Use the command… Remarks Enter system view system-view — Enter WLAN-BSS interface view interface wlan-bss interface-number Required Ena

Strany 19 - Configuring WLAN Security

5-11 To do… Use the command… Remarks Enable 11key negotiation port-security tx-key-type 11key Required Not enabled by default. Enable the PSK and

Strany 20 - Configuring the PTK Lifetime

5-12 WLAN Security Configuration Examples PSK Authentication Configuration Example Network requirements z As shown in Figure 5-3, the AP is connecte

Strany 21 - Configuring Security IE

5-13 z You can use the display wlan client and display port-security preshared-key user commands to view the online clients. MAC-and-PSK Authenticat

Strany 22 - Configuring Cipher Suit

5-14 authorization, and accounting servers as 12345678, specify the extended RADIUS server type, and configure the scheme to exclude the ISP domain n

Strany 23

Preface The H3C WA documentation set includes 10 configuration guides, which describe the software features for the H3C WA series WLAN access points a

Strany 24 - Configuring Port Security

5-15 Figure 5-5 Add access device # Add service. Select the Service tab, and then select Access Service > Access Device from the navigation tree

Strany 25 - Configure MAC authentication

5-16 z Add an account and password 00146c8a43ff. z Select the service mac. Figure 5-7 Add account 3) Verify the configuration z After the clien

Strany 26

5-17 [AP] dot1x authentication-method eap # Configure a RADIUS scheme name rad. Configure the IP addresses of both the primary authentication and aut

Strany 27 - Configuration procedure

5-18 2) Configure the RADIUS server (iMC) The following takes the iMC (the iMC versions are iMC PLAT 3.20-R2602 and iMC UAM 3.60-E6102) as an exam

Strany 28 - Network Requirements

5-19 Figure 5-10 Add service # Add account. Select the User tab, and then select Users > All Access Users from the navigation tree to enter the

Strany 29

5-20 Double click the icon at the bottom right corner of your desktop. The Wireless Network Connection Status window appears. Click the Properties

Strany 30

5-21 Figure 5-12 Configure the wireless card (I)

Strany 31

5-22 Figure 5-13 Configure the wireless card (II)

Strany 32

5-23 Figure 5-14 Configure the wireless card (III) 4) Verify the configuration. z The client can pass 802.1X authentication and associate with th

Strany 33

5-24 Figure 5-15 Network diagram for dynamic WEP encryption-802.1X authentication Configuration procedure 1) Configure the AP <Sysname> syst

Strany 34

Convention Description &<1-n> The argument or keyword and argument combination before the ampersand (&) sign can be entered 1 to n time

Strany 35

5-25 2) Configure the RADIUS server (iMC) See Configure the RADIUS server (iMC). 3) Configure the wireless card See Configure the wireless card. Co

Strany 36

5-26 WPA For WPA, the WLAN-WSEC module supports the CCMP and TKIP ciphers as the pair wise ciphers and WEP cipher suites will only be used as group c

Strany 37

6-1 z The models listed in this document are not applicable to all regions. Please consult your local sales office for the models applicable to you

Strany 38

6-2 Task Remarks Configuring Data Transmission Rates Optional Configuring Power Constraint Optional Configuring Only Non-802.11h Channels to Be Sc

Strany 39

6-3 For example, if you specify the maximum MCS index as 5 for mandatory rates, rates corresponding to MCS indexes 0 through 5 are configured as 802.

Strany 40 - Configuration verification

6-4 Configuring Only Non-802.11h Channels to Be Scanned Configuring Only Non-802.11h Channels to Be Scanned Follow these steps to configure only non-

Strany 41 - Pre-RSN

7-1 z The models listed in this document are not applicable to all regions. Please consult your local sales office for the models applicable to you

Strany 42 - 6 WLAN RRM Configuration

7-2 z Ad-hoc mode: A station in ad-hoc mode can directly communicate with other stations without support from any other device. WLAN IDS IPS WLAN ID

Strany 43 - Configuring 802.11n Rates

7-3 Configuring IDS Attack Detection Configuring IDS Attack Detection Follow these steps to configure IDS attack detection: To do… Use the command…

Strany 44 - Configuring Power Constraint

7-4 When an AP receives an 802.11 frame, it checks the source MAC address of the frame and processes the frame as follows: 1) If the source MAC addr

Strany 45 - Enabling 802.11g Protection

Category Documents Purposes User FAQ Provides answers to some of the most frequently asked questions on how to troubleshoot your AP. Operations and

Strany 46 - 7 WLAN IDS Configuration

7-5 Configuring Static White and Black Lists Follow these steps to configure static white and black lists: To do… Use the command… Remarks Enter sy

Strany 47 - WLAN IDS IPS

7-6 Figure 7-2 WLAN IDS frame filtering configuration Configuration procedure # Add MAC address 0000-000f-1211 of Client 1 into the blacklist. <

Strany 48 - Frame Filtering

8-1 z The models listed in this document are not applicable to all regions. Please consult your local sales office for the models applicable to you

Strany 49 - IP network

8-2 4) CAC Connection admission control (CAC) limits the number of clients that are using high-priority ACs (AC-VO and AC-VI) to guarantee sufficient

Strany 50

8-3 Figure 8-1 Per-AC channel contention parameters in WMM CAC admission policies CAC requires that a client obtain permission of the AP before it

Strany 51

8-4 SVP SVP can assign packets with the protocol ID 119 in the IP header to a specific AC. SVP stipulates that random backoff is not performed for SV

Strany 52 - 8 WLAN QoS Configuration

8-5 To do… Use the command… Remarks Set the EDCA parameters of AC-BE or AC-BK for clients wmm edca client { ac-be | ac-bk } { aifsn aifsn-value | e

Strany 53 - WMM Protocol Overview

8-6 Table 8-2 Default EDCA parameters for APs AC AIFSN ECWmin ECWmax TXOP Limit AC-BK 7 4 10 0 AC-BE 3 4 6 0 AC-VI 1 3 4 94 AC-VO 1 2 3 47 Displ

Strany 54 - U-APSD power-save mechanism

8-7 [AP-Ethernet1/0/1] quit # Create a clear-type WLAN service template, configure its SSID as market, configure its authentication method as open-sy

Strany 55 - WMM Configuration

8-8 # Create a clear-type WLAN service template, configure its SSID as market, configure its authentication method as open-system, and then enable th

Strany 56

i Table of Contents 1 Applicable Models and Software Versions...

Strany 57 - WMM Configuration Examples

8-9 Solution 1) Use the wmm enable command to enable the WMM function. 2) Check the state of the SVP priority mapping function or CAC again.

Strany 58

9-1 z The models listed in this document are not applicable to all regions. Please consult your local sales office for the models applicable to you

Strany 59 - Troubleshooting

9-2 z Easy to deploy in scenarios of metro, company, office, large warehouses, manufacturing, ports and waterfronts and so on Deployment Scenarios

Strany 60 - Solution

9-3 Figure 9-3 Mesh bridging MP 2MP 1LAN Segment 2LAN Segment 1MP 4MP 3 WDS Configuration Task List Complete the following tasks to configure WDS: T

Strany 61 - 9 WDS Configuration

9-4 For more information about the port-security tx-key-type, port-security preshared-key, and port-security port-mode commands, see Port Security

Strany 62 - Deployment Scenarios

9-5 To do… Use the command… Remarks Configure the link saturation RSSI link-saturation-rssi valueOptional 100 dBm by default Configure the probe re

Strany 63 - WDS Configuration Task List

9-6 Specifying a Peer MAC Address on the Radio You need to specify the MAC addresses of allowed peers on the local radio interface. Follow these ste

Strany 64 - Configuring an MP Policy

9-7 Figure 9-4 WDS point to point configuration AP 2AP 1LAN Segment 2LAN Segment 1 Configuration procedure Because the WDS point to point configurat

Strany 65

9-8 [AP1-WLAN-Radio1/0/1] mesh-profile 1 The configuration of AP 2 is the same as that of AP 1. You only need to configure the peer MAC address as th

Strany 66 - WDS Configuration Examples

10-1 z The models listed in this document are not applicable to all regions. Please consult your local sales office for the models applicable to yo

Strany 67

ii 6 WLAN RRM Configuration...6-1

Strany 68

10-2 Fat AP A fat AP controls and manages all associated wireless stations and bridges frames between wired and wireless networks. SSID The service s

Strany 69 - WLAN Service Configuration

10-3 Figure 10-2 Active scanning (the SSID of the probe request is null, that is, no SSID information is carried) z When the wireless c

Strany 70 - Wireless Client Access

10-4 Authentication To secure wireless links, a wireless client must be authenticated before accessing an AP, and only wireless clients passing the a

Strany 71

10-5 z Ethernet to Dot11 Frame Conversion z Keep Alive Mechanism z Idle Timeout Mechanism z Clear Channel Search WLAN Topologies WLAN has the fol

Strany 72 - 802.11 Overview

10-6 Figure 10-6 Multiple ESS network Generally, Fat AP can provide more than one logical ESS at the same time. The configuration of ESS in Fat AP

Strany 73 - WLAN Topologies

10-7 Protocols and Standards For more information on protocols and standards, see: z ANSI/IEEE Std 802.11, 1999 Edition z IEEE Std 802.11a z IEEE

Strany 74 - Internet

10-8 To do… Use the command… Remarks Enter system view system-view — Specify the country code wlan country-code code Required By default the count

Strany 75 - Configuring WLAN Service

10-9 Configuring the Radio of an AP Follow these steps to configure the radio of an AP: To do… Use the command… Remarks Enter system view system-vi

Strany 76

10-10 To do… Use the command… Remarks Set the maximum number of attempts for transmitting a frame larger than the RTS threshold long-retry threshol

Strany 77

10-11 To do… Use the command… Remarks Enable the short GI function short-gi enable Optional Enabled by default. Enable the A-MSDU function a-msdu e

Strany 78 - Configuring 802.11n

iii Deployment Scenarios ...9-2 WDS C

Strany 79 - Configuring Uplink Detection

10-12 To do… Use the command… Remarks Enter system view system-view — Specify the uplink interface (Ethernet interface) wlan uplink-interface inter

Strany 80 - Introduction

10-13 Figure 10-10 User isolation network diagram As shown in Figure 10-10, after the fat AP is enabled with user isolation, clients 1 through 4 ca

Strany 81

10-14 Configuration procedure 1) Configuration on the fat AP # Create a WLAN BSS interface. <AP> system-view [AP] interface WLAN-BSS 1 [AP-WLA

Strany 82

10-15 Configuration procedure 1) Configuration on the fat AP # Create a WLAN-ESS interface. <AP> system-view [AP] interface WLAN-BSS 1 [AP-WLA

Strany 83

11-1 11 Index 802.11 Overview 10-4 C Configuration Task list 6-1 Configuring Data Transmission Rates 6-2 Configuring IDS Attack Detection 7-3 Config

Strany 84 - 11 Index

1-1 z The models listed in this document are not applicable to all regions. Please consult your local sales office for the models applicable to your

Komentáře k této Příručce

Žádné komentáře