Example for Configuring N+1 Backup and VRRP HSB
Service Requirements
A large enterprise has branches in different areas. ACs are deployed in the branches to manage APs, providing WLAN access and email services. These services require low network reliability and allow temporary service interruption. An AC is required to be a backup of all ACs to save costs. In this scenario, the enterprise can deploy a high-performance AC at the headquarters as a standby AC to provide backup services for active ACs in the branches. To further improve reliability of ACs, VRRP HSB can be configured for each AC.
Networking Requirements
- AC networking mode: Layer 3 networking in bypass mode
- DHCP deployment mode: Router_3 functions as a DHCP server to assign IP addresses to APs and STAs.
- Service data forwarding mode: direct forwarding
Data Planning
Item |
Data |
---|---|
Active and standby ACs in N+1 backup mode |
|
Management VLANs for APs |
AC_1 and AC_1b: VLAN 99 |
AC_2 and AC_2b: VLAN 100 |
|
Service VLAN for STAs |
AC_1 and AC_1b: VLAN 101 |
AC_2 and AC_2b: VLAN 102 |
|
DHCP server |
Router_3 functions as the DHCP server to assign IP addresses to APs and STAs. STAs' gateway:
APs' gateway:
|
IP address pool for APs |
AP_1: 10.23.99.2 to 10.23.99.254/24 AP_2: 10.23.100.2 to 10.23.100.254/24 |
IP address pool for STAs |
STA_1: 10.23.101.2 to 10.23.101.254/24 STA_2: 10.23.102.2 to 10.23.102.254/24 |
Source IP address of AC_1 and AC_1b |
10.23.201.1/24 |
Source IP address of AC_2 and AC_2b |
10.23.202.1/24 |
Source IP address of AC_3 and AC_3b |
10.23.203.1/24 |
AP group |
AC_1 and AC_1b:
|
AC_2 and AC_2b:
|
|
AC_3 and AC_3b:
|
|
Regulatory domain profile |
|
SSID profile |
AC_1 and AC_1b:
|
AC_2 and AC_2b:
|
|
AC_3 and AC_3b:
|
|
Security profile |
AC_1, AC_1b, AC_3, and AC_3b:
AC_2, AC_2b, AC_3, and AC_3b:
|
AP system profile |
ap-system:
ap-system1:
|
VAP profile |
AC_1 and AC_1b:
|
AC_2 and AC_2b:
|
|
AC_3 and AC_3b:
|
|
IP address and port number of the HSB channel between AC_1 and AC_1b |
|
IP address and port number of the HSB channel between AC_2 and AC_2b |
|
IP address and port number of the HSB channel between AC_3 and AC_3b |
|
Configuration Roadmap
- Set up connections between each AC and other network devices. Configure Router_3 as a DHCP server to assign IP addresses to APs and STAs.
- Configure VRRP groups on AC_1 and AC_1b, on AC_2 and AC_2b, and on AC_3 and AC_3b, respectively.
- Configure the VRRP group consisting of AC_1 and AC_1b as the active AC of AP_1 and the VRRP group consisting of AC_2 and AC_2b as the active AC of AP_2. Configure basic WLAN services on the active ACs.
- Configure AC_3 and AC_3b as the standby ACs of AP_1 and AP_2, and configure basic WLAN services on the standby ACs. Ensure that service configurations on standby ACs and are the same as those on the active ACs.
- Configure N+1 backup on the active ACs first and then on the standby AC. After the configuration, restart all the APs.
Configuration Notes
- No ACK mechanism is available for multicast packet transmission over unstable wireless links of air interfaces, so multicast packets are usually sent at low rates to ensure stable transmission. If a large number of multicast packets are sent from the network side, air interfaces may be congested. Therefore, you are advised to configure multicast packet suppression to reduce impact of large numbers of low-rate multicast packets on the wireless network. Exercise caution when configuring the rate limit if there are multicast services on the network; otherwise, the multicast services may be affected.
- In direct forwarding mode, you are advised to configure multicast packet suppression on switch interfaces connected to APs.
- In tunnel forwarding mode, you are advised to configure multicast packet suppression in traffic profiles of the AC.
The port isolation configuration is recommended on the interfaces of the device directly connected to APs. If port isolation is not configured and direct forwarding is used, a large number of unnecessary broadcast packets may be generated in the VLAN, blocking the network and degrading user experience.
In tunnel forwarding mode, the management VLAN and service VLAN cannot be the same. Only packets from the management VLAN are transmitted between the AC and APs. Packets from the service VLAN are not allowed between the AC and APs.
If ACs and switches form a ring network, configure interfaces on two directly connected ACs not to allow packets in VLAN 1 to pass.
Procedure
- Configure the routers, switches, and ACs to communicate with each other.# On Router_1, create VLAN 99, VLAN 101, and VLAN 201. VLAN 99 is used as the management VLAN and VLAN 101 is used as the service VLAN. Add Eth2/0/0 connected to Switch_1 to VLAN 99 and VLAN 101, and Eth2/0/1 and Eth2/0/2 connected to AC_1 and AC_1b to VLAN 201. Configure the IP address 10.23.99.1/24 for VLANIF 99, 10.23.101.1/24 for VLANIF 101, and 10.23.201.2/24 for VLANIF 201.
<Huawei> system-view [Huawei] sysname Router_1 [Router_1] vlan batch 99 101 201 [Router_1] interface ethernet 2/0/0 [Router_1-Ethernet2/0/0] port link-type trunk [Router_1-Ethernet2/0/0] port trunk allow-pass vlan 99 101 [Router_1-Ethernet2/0/0] quit [Router_1] interface ethernet 2/0/1 [Router_1-Ethernet2/0/1] port link-type trunk [Router_1-Ethernet2/0/1] port trunk allow-pass vlan 201 [Router_1-Ethernet2/0/1] quit [Router_1] interface ethernet 2/0/2 [Router_1-Ethernet2/0/2] port link-type trunk [Router_1-Ethernet2/0/2] port trunk allow-pass vlan 201 [Router_1-Ethernet2/0/2] quit [Router_1] interface vlanif 99 [Router_1-Vlanif99] ip address 10.23.99.1 255.255.255.0 [Router_1-Vlanif99] quit [Router_1] interface vlanif 101 [Router_1-Vlanif101] ip address 10.23.101.1 255.255.255.0 [Router_1-Vlanif101] quit [Router_1] interface vlanif 201 [Router_1-Vlanif201] ip address 10.23.201.2 255.255.255.0 [Router_1-Vlanif201] quit
# On Router_2, create VLAN 100, VLAN 102, and VLAN 202. VLAN 100 is used as the management VLAN and VLAN 102 is used as the service VLAN. Add Eth2/0/0 connected to Switch_2 to VLAN 100 and VLAN 102, and Eth2/0/1 and Eth2/0/2 connected to AC_2 and AC_2b to VLAN 202. Configure the IP address 10.23.100.1/24 for VLANIF 100, 10.23.102.1/24 for VLANIF 102, and 10.23.202.2/24 for VLANIF 202. The configuration procedure is the same as that on Router_1.
# On Router_3, create VLAN 200 and VLAN 203. Add Eth2/0/0 connected to the Internet to VLAN 200, and Eth2/0/1 and Eth2/0/2 connected to AC_3 and AC_3b to VLAN 203. Configure the IP address 10.23.200.1/24 for VLANIF 200 and 10.23.203.2/24 for VLANIF 203. The configuration procedure is the same as that on Router_1.
# On Switch_1, create VLAN 99 and VLAN 101. Add GE0/0/2 connected to Router_1 and GE0/0/1 connected to AP_1 to VLAN 99 and VLAN 101. Set the PVID of the interfaces to VLAN 99.
<HUAWEI> system-view [HUAWEI] sysname Switch_1 [Switch_1] vlan batch 99 101 [Switch_1] interface gigabitethernet 0/0/1 [Switch_1-GigabitEthernet0/0/1] port link-type trunk [Switch_1-GigabitEthernet0/0/1] port trunk pvid vlan 99 [Switch_1-GigabitEthernet0/0/1] port trunk allow-pass vlan 99 101 [Switch_1-GigabitEthernet0/0/1] port-isolate enable [Switch_1-GigabitEthernet0/0/1] quit [Switch_1] interface gigabitethernet 0/0/2 [Switch_1-GigabitEthernet0/0/2] port link-type trunk [Switch_1-GigabitEthernet0/0/2] port trunk allow-pass vlan 99 101 [Switch_1-GigabitEthernet0/0/2] quit
# On Switch_2, create VLAN 100 and VLAN 102. Add GE0/0/2 connected to Router_2 and GE0/0/1 connected to AP_2 to VLAN 100 and VLAN 102. Set the PVID of the interfaces to VLAN 100. The configuration procedure is the same as that on Switch_1.
# On AC_1, create VLAN 101 and VLAN 201, and add GE0/0/1 connected to Router_1 to VLAN 201. Configure the IP address 10.23.201.3/24 for VLANIF 201.
<HUAWEI> system-view [HUAWEI] sysname AC_1 [AC_1] vlan batch 101 201 [AC_1] interface gigabitethernet 0/0/1 [AC_1-GigabitEthernet0/0/1] port link-type trunk [AC_1-GigabitEthernet0/0/1] port trunk allow-pass vlan 201 [AC_1-GigabitEthernet0/0/1] quit [AC_1] interface vlanif 201 [AC_1-Vlanif201] ip address 10.23.201.3 255.255.255.0 [AC_1-Vlanif201] quit
# Configure AC_1b in the same way of configuring AC_1. The difference is that the IP address for VLANIF 201 on AC_1b is 10.23.201.4/24.
# On AC_2, create VLAN 102 and VLAN 202, and add GE0/0/1 connected to Router_2 to VLAN 202. Configure the IP address 10.23.202.3/24 for VLANIF 202. The configuration procedure is the same as that on AC_1.
# Configure AC_2b in the same way of configuring AC_2. The difference is that the IP address for VLANIF 202 on AC_2b is 10.23.202.4/24.
# On AC_3, create VLAN 101, VLAN 102, and VLAN 203, and add GE0/0/1 connected to Router_3 to VLAN 203. Configure the IP address 10.23.203.3/24 for VLANIF 203. The configuration procedure is the same as that on AC_1.
# Configure AC_3b in the same way of configuring AC_3. The difference is that the IP address for VLANIF 203 on AC_3b is 10.23.203.4/24.
# On AC_1, configure a route to AP_1 with the next hop as Router_1's VLANIF 201.[AC_1] ip route-static 10.23.99.0 24 10.23.201.2
# Configure AC_1b in the same way.
# On AC_2, configure a route to AP_2 with the next hop as Router_2's VLANIF 202.[AC_2] ip route-static 10.23.100.0 24 10.23.202.2
# Configure AC_2b in the same way.
- Configure network interworking between ACs in each VRRP group.
# Create VLAN 111 on AC_1, add GE0/0/2 on AC_1 connected to AC_1b to VLAN 111, and set the IP address of VLANIF 111 to 10.23.111.1/24.
[AC_1] vlan batch 111 [AC_1] interface gigabitethernet 0/0/2 [AC_1-GigabitEthernet0/0/2] port link-type trunk [AC_1-GigabitEthernet0/0/2] port trunk allow-pass vlan 111 [AC_1-GigabitEthernet0/0/2] undo port trunk allow-pass vlan 1 [AC_1-GigabitEthernet0/0/2] quit [AC_1] interface vlanif 111 [AC_1-Vlanif111] ip address 10.23.111.1 255.255.255.0 [AC_1-Vlanif111] quit
# Configure AC_1b, AC_2, AC_2b, AC_3, and AC_3b in the same way. The difference relies on the IP address of VLANIF 111.- VLANIF 111 on AC_1b: 10.23.111.2/24
- VLANIF 111 on AC_2: 10.23.111.3/24
- VLANIF 111 on AC_2b: 10.23.111.4/24
- VLANIF 111 on AC_3: 10.23.111.5/24
- VLANIF 111 on AC_3b: 10.23.111.6/24
- Configure a DHCP server to assign IP addresses to APs and STAs.
# Configure Router_1 as a DHCP relay agent.
[Router_1] dhcp enable [Router_1] interface vlanif 99 [Router_1-Vlanif99] dhcp select relay [Router_1-Vlanif99] dhcp relay server-ip 10.23.200.1 [Router_1-Vlanif99] quit [Router_1] interface vlanif 101 [Router_1-Vlanif101] dhcp select relay [Router_1-Vlanif101] dhcp relay server-ip 10.23.200.1 [Router_1-Vlanif101] quit
# Configure Router_2 as a DHCP relay agent.
[Router_2] dhcp enable [Router_2] interface vlanif 100 [Router_2-Vlanif100] dhcp select relay [Router_2-Vlanif100] dhcp relay server-ip 10.23.200.1 [Router_2-Vlanif100] quit [Router_2] interface vlanif 102 [Router_2-Vlanif102] dhcp select relay [Router_2-Vlanif102] dhcp relay server-ip 10.23.200.1 [Router_2-Vlanif102] quit
# Configure Router_3 as the DHCP server to assign IP addresses to APs and STAs, and configure the Option 43 field to advertise the IP addresses of AC_1 and AC_3 to AP_1, and to advertise the IP addresses of AC_2 and AC_3 to AP_2. Configure the DHCP server to assign IP address to AP_1 from the IP address pool ap_1_pool, to AP_2 from ap_2_pool, to STA_1 from sta_1_pool, and to STA_2 from sta_2_pool.
In this example, AP_1 and AP_2 cannot share an IP address pool; otherwise, AP_1 can discover AC_2 and AP_2 can discover AC_1, which will cause APs unable to connect to the correct AC based on the AC priority.
Configure the DNS server as required. The common methods are as follows:- In the interface address pool scenario, run the dhcp server dns-list ip-address &<1-8> command in the VLANIF interface view.
- In the global address pool scenario, run the dns-list ip-address &<1-8> command in the IP address pool view.
[Router_3] dhcp enable [Router_3] ip pool ap_1_pool [Router_3-ip-pool-ap_1_pool] network 10.23.99.0 mask 24 [Router_3-ip-pool-ap_1_pool] gateway-list 10.23.99.1 [Router_3-ip-pool-ap_1_pool] option 43 sub-option 2 ip-address 10.23.201.1 10.23.203.1 [Router_3-ip-pool-ap_1_pool] quit [Router_3] ip pool ap_2_pool [Router_3-ip-pool-ap_2_pool] network 10.23.100.0 mask 24 [Router_3-ip-pool-ap_2_pool] gateway-list 10.23.100.1 [Router_3-ip-pool-ap_2_pool] option 43 sub-option 2 ip-address 10.23.202.1 10.23.203.1 [Router_3-ip-pool-ap_2_pool] quit [Router_3] ip pool sta_1_pool [Router_3-ip-pool-sta_1_pool] network 10.23.101.0 mask 24 [Router_3-ip-pool-sta_1_pool] gateway-list 10.23.101.1 [Router_3-ip-pool-sta_1_pool] quit [Router_3] ip pool sta_2_pool [Router_3-ip-pool-sta_2_pool] network 10.23.102.0 mask 24 [Router_3-ip-pool-sta_2_pool] gateway-list 10.23.102.1 [Router_3-ip-pool-sta_2_pool] quit
- Configure VRRP HSB.
# Configure VRRP HSB on AC_1.
[AC_1] vrrp recover-delay 60 [AC_1] interface vlanif 201 [AC_1-Vlanif201] vrrp vrid 1 virtual-ip 10.23.201.1 [AC_1-Vlanif201] vrrp vrid 1 priority 120 [AC_1-Vlanif201] vrrp vrid 1 preempt-mode timer delay 1800 [AC_1-Vlanif201] admin-vrrp vrid 1 [AC_1-Vlanif201] quit [AC_1] hsb-service 0 [AC_1-hsb-service-0] service-ip-port local-ip 10.23.111.1 peer-ip 10.23.111.2 local-data-port 10241 peer-data-port 10241 [AC_1-hsb-service-0] service-keep-alive detect retransmit 3 interval 6 [AC_1-hsb-service-0] quit [AC_1] hsb-group 0 [AC_1-hsb-group-0] bind-service 0 [AC_1-hsb-group-0] track vrrp vrid 1 interface vlanif 201 [AC_1-hsb-group-0] quit [AC_1] hsb-service-type access-user hsb-group 0 [AC_1] hsb-service-type ap hsb-group 0 [AC_1] hsb-service-type dhcp hsb-group 0 [AC_1] hsb-group 0 [AC_1-hsb-group-0] hsb enable [AC_1-hsb-group-0] quit
# Configure VRRP HSB on AC_1b.
[AC_1b] vrrp recover-delay 60 [AC_1b] interface vlanif 201 [AC_1b-Vlanif201] vrrp vrid 1 virtual-ip 10.23.201.1 [AC_1b-Vlanif201] admin-vrrp vrid 1 [AC_1b-Vlanif201] quit [AC_1b] hsb-service 0 [AC_1b-hsb-service-0] service-ip-port local-ip 10.23.111.2 peer-ip 10.23.111.1 local-data-port 10241 peer-data-port 10241 [AC_1b-hsb-service-0] service-keep-alive detect retransmit 3 interval 6 [AC_1b-hsb-service-0] quit [AC_1b] hsb-group 0 [AC_1b-hsb-group-0] bind-service 0 [AC_1b-hsb-group-0] track vrrp vrid 1 interface vlanif 201 [AC_1b-hsb-group-0] quit [AC_1b] hsb-service-type access-user hsb-group 0 [AC_1b] hsb-service-type ap hsb-group 0 [AC_1b] hsb-service-type dhcp hsb-group 0 [AC_1b] hsb-group 0 [AC_1b-hsb-group-0] hsb enable [AC_1b-hsb-group-0] quit
# Configure VRRP HSB on AC_2.
[AC_2] vrrp recover-delay 60 [AC_2] interface vlanif 202 [AC_2-Vlanif202] vrrp vrid 1 virtual-ip 10.23.202.1 [AC_2-Vlanif202] vrrp vrid 1 priority 120 [AC_2-Vlanif202] vrrp vrid 1 preempt-mode timer delay 1800 [AC_2-Vlanif202] admin-vrrp vrid 1 [AC_2-Vlanif202] quit [AC_2] hsb-service 0 [AC_2-hsb-service-0] service-ip-port local-ip 10.23.111.3 peer-ip 10.23.111.4 local-data-port 10241 peer-data-port 10241 [AC_2-hsb-service-0] service-keep-alive detect retransmit 3 interval 6 [AC_2-hsb-service-0] quit [AC_2] hsb-group 0 [AC_2-hsb-group-0] bind-service 0 [AC_2-hsb-group-0] track vrrp vrid 1 interface vlanif 202 [AC_2-hsb-group-0] quit [AC_2] hsb-service-type access-user hsb-group 0 [AC_2] hsb-service-type ap hsb-group 0 [AC_2] hsb-service-type dhcp hsb-group 0 [AC_2] hsb-group 0 [AC_2-hsb-group-0] hsb enable [AC_2-hsb-group-0] quit
# Configure VRRP HSB on AC_2b.
[AC_2b] vrrp recover-delay 60 [AC_2b] interface vlanif 202 [AC_2b-Vlanif202] vrrp vrid 1 virtual-ip 10.23.202.1 [AC_2b-Vlanif202] admin-vrrp vrid 1 [AC_2b-Vlanif202] quit [AC_2b] hsb-service 0 [AC_2b-hsb-service-0] service-ip-port local-ip 10.23.111.4 peer-ip 10.23.111.3 local-data-port 10241 peer-data-port 10241 [AC_2b-hsb-service-0] service-keep-alive detect retransmit 3 interval 6 [AC_2b-hsb-service-0] quit [AC_2b] hsb-group 0 [AC_2b-hsb-group-0] bind-service 0 [AC_2b-hsb-group-0] track vrrp vrid 1 interface vlanif 202 [AC_2b-hsb-group-0] quit [AC_2b] hsb-service-type access-user hsb-group 0 [AC_2b] hsb-service-type ap hsb-group 0 [AC_2b] hsb-service-type dhcp hsb-group 0 [AC_2b] hsb-group 0 [AC_2b-hsb-group-0] hsb enable [AC_2b-hsb-group-0] quit
# Configure VRRP HSB on AC_3.
[AC_3] vrrp recover-delay 60 [AC_3] interface vlanif 203 [AC_3-Vlanif203] vrrp vrid 1 virtual-ip 10.23.203.1 [AC_3-Vlanif203] vrrp vrid 1 priority 120 [AC_3-Vlanif203] vrrp vrid 1 preempt-mode timer delay 1800 [AC_3-Vlanif203] admin-vrrp vrid 1 [AC_3-Vlanif203] quit [AC_3] hsb-service 0 [AC_3-hsb-service-0] service-ip-port local-ip 10.23.111.5 peer-ip 10.23.111.6 local-data-port 10241 peer-data-port 10241 [AC_3-hsb-service-0] service-keep-alive detect retransmit 3 interval 6 [AC_3-hsb-service-0] quit [AC_3] hsb-group 0 [AC_3-hsb-group-0] bind-service 0 [AC_3-hsb-group-0] track vrrp vrid 1 interface vlanif 203 [AC_3-hsb-group-0] quit [AC_3] hsb-service-type access-user hsb-group 0 [AC_3] hsb-service-type ap hsb-group 0 [AC_3] hsb-service-type dhcp hsb-group 0 [AC_3] hsb-group 0 [AC_3-hsb-group-0] hsb enable [AC_3-hsb-group-0] quit
# Configure VRRP HSB on AC_3b.
[AC_3b] vrrp recover-delay 60 [AC_3b] interface vlanif 203 [AC_3b-Vlanif203] vrrp vrid 1 virtual-ip 10.23.203.1 [AC_3b-Vlanif203] admin-vrrp vrid 1 [AC_3b-Vlanif203] quit [AC_3b] hsb-service 0 [AC_3b-hsb-service-0] service-ip-port local-ip 10.23.111.6 peer-ip 10.23.111.5 local-data-port 10241 peer-data-port 10241 [AC_3b-hsb-service-0] service-keep-alive detect retransmit 3 interval 6 [AC_3b-hsb-service-0] quit [AC_3b] hsb-group 0 [AC_3b-hsb-group-0] bind-service 0 [AC_3b-hsb-group-0] track vrrp vrid 1 interface vlanif 203 [AC_3b-hsb-group-0] quit [AC_3b] hsb-service-type access-user hsb-group 0 [AC_3b] hsb-service-type ap hsb-group 0 [AC_3b] hsb-service-type dhcp hsb-group 0 [AC_3b] hsb-group 0 [AC_3b-hsb-group-0] hsb enable [AC_3b-hsb-group-0] quit
# Use virtual IP addresses of VRRP groups to configure static routes based on actual network conditions. The configuration procedure is not provided here.- Enable AP_1 to communicate with the VRRP group consisting of AC_3 and AC_3b.
- Enable AP_2 to communicate with the VRRP group consisting of AC_3 and AC_3b.
- Configure basic WLAN services on AC_1. The configuration on AC_1b is the same as that on AC_1. The difference is that when an AP is in normal state on AC_1, it is in standby state on AC_1b.
- Configure basic WLAN services on AC_2. The configuration on AC_2b is the same as that on AC_2.
# Configure basic WLAN parameters for AC_2. The configuration procedure is the same as that on AC_1.
# Configure the source address of AC_2.
[AC_2] capwap source ip-address 10.23.202.1
# Create AP group ap-group2.
[AC_2] wlan [AC_2-wlan-view] ap-group name ap-group2 [AC_2-wlan-ap-group-ap-group2] quit
# Import the APs offline on the AC and add the APs to AP group ap-group2. Assume that the AP's MAC address is 00e0-fc74-9640. Configure a name for the AP based on the AP's deployment location, so that you can know where the AP is deployed from its name. For example, name the AP area_2 if it is deployed in area 2.
[AC_2] wlan [AC_2-wlan-view] ap auth-mode mac-auth [AC_2-wlan-view] ap-id 1 ap-mac 00e0-fc74-9640 [AC_2-wlan-ap-1] ap-name area_2 Warning: This operation may cause AP reset. Continue? [Y/N]:y [AC_2-wlan-ap-1] ap-group ap-group2 Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power and antenna gain configurati ons of the radio, Whether to continue? [Y/N]:y [AC_2-wlan-ap-1] quit
# Create security profile wlan-net1 and configure a security policy in the profile.In this example, the security policy is set to WPA-WPA2+PSK+AES and the password to a1234567. In actual situations, configure the security policy according to service requirements.
[AC_2-wlan-view] security-profile name wlan-net1 [AC_2-wlan-sec-prof-wlan-net1] security wpa-wpa2 psk pass-phrase a1234567 aes [AC_2-wlan-sec-prof-wlan-net1] quit
# Create an SSID named wlan-net1.
[AC_2-wlan-view] ssid-profile name wlan-net1 [AC_2-wlan-ssid-prof-wlan-net1] ssid wlan-net1 [AC_2-wlan-ssid-prof-wlan-net1] quit
# Create AP system profile ap-system1 and specify the IP address of the standby AC.
[AC_2-wlan-view] ap-system-profile name ap-system1 [AC_2-wlan-ap-system-prof-ap-system1] primary-access ip-address 10.23.202.1 [AC_2-wlan-ap-system-prof-ap-system1] backup-access ip-address 10.23.203.1 [AC_2-wlan-ap-system-prof-ap-system1] quit
# Create VAP profile wlan-net1, set the data forwarding mode and service VLAN, and apply the security profile and SSID profile to the VAP profile.
[AC_2-wlan-view] vap-profile name wlan-net1 [AC_2-wlan-vap-prof-wlan-net1] forward-mode direct-forward [AC_2-wlan-vap-prof-wlan-net1] service-vlan vlan-id 102 [AC_2-wlan-vap-prof-wlan-net1] security-profile wlan-net1 [AC_2-wlan-vap-prof-wlan-net1] ssid-profile wlan-net1 [AC_2-wlan-vap-prof-wlan-net1] quit
# Bind the VAP profile and AP system profile to the AP group and apply the VAP profile wlan-net1 to radio 0 and radio 1 of the APs.
[AC_2-wlan-view] ap-group name ap-group2 [AC_2-wlan-ap-group-ap-group2] vap-profile wlan-net1 wlan 1 radio 0 [AC_2-wlan-ap-group-ap-group2] vap-profile wlan-net1 wlan 1 radio 1 [AC_2-wlan-ap-group-ap-group2] ap-system-profile ap-system1 [AC_2-wlan-ap-group-ap-group2] quit
# Set other parameters similarly as those of AC_1.
- Configure basic WLAN services on AC_3. The configuration on AC_3b is the same as that on AC_3.
- Enable N+1 backup on AC_1, AC_2, and AC_3. Enable N+1 backup on AC_1b, AC_2b, and AC_3b in the same way.# On AC_1, enable N+1 backup and restart all APs to make the function take effect.
By default, N+1 backup is enabled. The system displays an Info message if you run the undo ac protect enable command. Run the ap-reset all command on the active AC to restart all APs. After the APs are restarted, N+1 backup starts to take effect.
[AC_1-wlan-view] undo ac protect enable Info: Backup function has already disabled. [AC_1-wlan-view] ap-reset all Warning: Reset AP(s), continue?[Y/N]:y
# On AC_2, enable N+1 backup and restart all APs to make the function take effect.[AC_2-wlan-view] undo ac protect enable Info: Backup function has already disabled. [AC_2-wlan-view] ap-reset all Warning: Reset AP(s), continue?[Y/N]:y
# Enable revertive switchover and N+1 backup on AC_3.By default, global revertive switchover is enabled. The system displays an Info message if you run the undo ac protect restore disable command.
[AC_3-wlan-view] undo ac protect restore disable Info: Protect restore has already enabled. [AC_3-wlan-view] undo ac protect enable Info: Backup function has already disabled. [AC_3-wlan-view] ap-reset all Warning: Reset AP(s), continue?[Y/N]:y
- Verify the configuration.
# Run the display ac protect and display ap-system-profile commands on AC_1 to check N+1 backup information.
[AC_1-wlan-view] display ac protect ------------------------------------------------------------ Protect state : disable Protect AC IPv4 : - Protect AC IPv6 : - Priority : 0 Protect restore : enable ... ------------------------------------------------------------ [AC_1-wlan-view] display ap-system-profile name ap-system ------------------------------------------------------------------------------ AC priority : - Protect AC IP address : - Primary AC : 10.23.201.1 Backup AC : 10.23.203.1 ... ------------------------------------------------------------------------------
# Run the display ac protect and display ap-system-profile commands on AC_2 to check N+1 backup information.
[AC_2-wlan-view] display ac protect ------------------------------------------------------------ Protect state : disable Protect AC IPv4 : - Protect AC IPv6 : - Priority : 0 Protect restore : enable ... ------------------------------------------------------------ [AC_2-wlan-view] display ap-system-profile name ap-system1 ------------------------------------------------------------------------------ AC priority : - Protect AC IP address : - Primary AC : 10.23.202.1 Backup AC : 10.23.203.1 ... ------------------------------------------------------------------------------
# Run the display ac protect and display ap-system-profile commands on AC_3 to check N+1 backup information.
[AC_3-wlan-view] display ac protect ------------------------------------------------------------ Protect state : disable Protect AC IPv4 : - Protect AC IPv6 : - Priority : 0 Protect restore : enable ... ------------------------------------------------------------ [AC_3-wlan-view] display ap-system-profile name ap-system ------------------------------------------------------------------------------ AC priority : - Protect AC IP address : - Primary AC : 10.23.201.1 Backup AC : 10.23.203.1 ... ------------------------------------------------------------------------------ [AC_3-wlan-view] display ap-system-profile name ap-system1 ------------------------------------------------------------------------------ AC priority : - Protect AC IP address : - Primary AC : 10.23.202.1 Backup AC : 10.23.203.1 ... ------------------------------------------------------------------------------
# The WLAN with the SSID wlan-net or wlan-net1 is available for STAs connected to the APs, and these STAs can connect to the WLAN and go online normally.
# Simulate an active AC fault by restarting the active AC to verify the backup configuration. Restart AC_1. When AP_1 detects a fault on the link connected to AC_1, AC_1b takes the active role, ensuring service stability.Before restarting the AC, run the save command to save the configuration file on the AC to prevent configuration loss after the restart.
# During the restart of AC_1, services on the STAs are not interrupted. AP_1 goes online on AC_1b. Run the display ap all command on AC_1b. The command output shows that the AP status changes from standby to normal.
# After AC_1 recovers from the restart, an active/standby switchback is triggered. AP_1 automatically goes online on AC_1.
# Restart AC_1 and AC_2. When AP_1 detects a fault on the links connected to AC_1 and AC_1b, AC_3 takes the active role, ensuring service stability.
# During the restart process of AC_1 and AC_1b, AP_1 goes online on AC_3. Run the display ap all command on AC_3. The command output shows that the AP status changes from fault to normal.
# After AC_1 and AC_1b recover from the restart, an active/standby switchback is triggered. AP_1 automatically goes online on AC_1.
Configuration Files
Switch_1 configuration file
# sysname Switch_1 # vlan batch 99 101 # interface GigabitEthernet0/0/1 port link-type trunk port trunk pvid vlan 99 port trunk allow-pass vlan 99 101 port-isolate enable group 1 # interface GigabitEthernet0/0/2 port link-type trunk port trunk allow-pass vlan 99 101 # return
Switch_2 configuration file
# sysname Switch_2 # vlan batch 100 102 # interface GigabitEthernet0/0/1 port link-type trunk port trunk pvid vlan 100 port trunk allow-pass vlan 100 102 port-isolate enable group 1 # interface GigabitEthernet0/0/2 port link-type trunk port trunk allow-pass vlan 100 102 # return
AC_1 configuration file
# sysname AC_1 # vrrp recover-delay 60 # vlan batch 101 111 201 # interface Vlanif111 ip address 10.23.111.1 255.255.255.0 # interface Vlanif201 ip address 10.23.201.3 255.255.255.0 vrrp vrid 1 virtual-ip 10.23.201.1 admin-vrrp vrid 1 vrrp vrid 1 priority 120 vrrp vrid 1 preempt-mode timer delay 1800 # interface GigabitEthernet0/0/1 port link-type trunk port trunk allow-pass vlan 201 # interface GigabitEthernet0/0/2 port link-type trunk undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 111 # ip route-static 10.23.99.0 255.255.255.0 10.23.201.2 # capwap source ip-address 10.23.201.1 # hsb-service 0 service-ip-port local-ip 10.23.111.1 peer-ip 10.23.111.2 local-data-port 10241 peer-data-port 10241 service-keep-alive detect retransmit 3 interval 6 # hsb-group 0 track vrrp vrid 1 interface Vlanif201 bind-service 0 hsb enable # hsb-service-type access-user hsb-group 0 # hsb-service-type dhcp hsb-group 0 # hsb-service-type ap hsb-group 0 # wlan security-profile name wlan-net security wpa-wpa2 psk pass-phrase %^%#m"tz0f>~7.[`^6RWdzwCy16hJj/Mc!,}s`X*B]}A%^%# aes ssid-profile name wlan-net ssid wlan-net vap-profile name wlan-net service-vlan vlan-id 101 ssid-profile wlan-net security-profile wlan-net regulatory-domain-profile name default ap-system-profile name ap-system primary-access ip-address 10.23.201.1 backup-access ip-address 10.23.203.1 ap-group name ap-group1 ap-system-profile ap-system radio 0 vap-profile wlan-net wlan 1 radio 1 vap-profile wlan-net wlan 1 ap-id 0 type-id 35 ap-mac 00e0-fc76-e360 ap-sn 210235554710CB000042 ap-name area_1 ap-group ap-group1 # return
AC_1b configuration file
# sysname AC_1b # vrrp recover-delay 60 # vlan batch 101 111 201 # interface Vlanif111 ip address 10.23.111.2 255.255.255.0 # interface Vlanif201 ip address 10.23.201.4 255.255.255.0 vrrp vrid 1 virtual-ip 10.23.201.1 admin-vrrp vrid 1 # interface GigabitEthernet0/0/1 port link-type trunk port trunk allow-pass vlan 201 # interface GigabitEthernet0/0/2 port link-type trunk undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 111 # ip route-static 10.23.99.0 255.255.255.0 10.23.201.2 # capwap source ip-address 10.23.201.1 # hsb-service 0 service-ip-port local-ip 10.23.111.2 peer-ip 10.23.111.1 local-data-port 10241 peer-data-port 10241 service-keep-alive detect retransmit 3 interval 6 # hsb-group 0 track vrrp vrid 1 interface Vlanif201 bind-service 0 hsb enable # hsb-service-type access-user hsb-group 0 # hsb-service-type dhcp hsb-group 0 # hsb-service-type ap hsb-group 0 # wlan security-profile name wlan-net security wpa-wpa2 psk pass-phrase %^%#m"tz0f>~7.[`^6RWdzwCy16hJj/Mc!,}s`X*B]}A%^%# aes ssid-profile name wlan-net ssid wlan-net vap-profile name wlan-net service-vlan vlan-id 101 ssid-profile wlan-net security-profile wlan-net regulatory-domain-profile name default ap-system-profile name ap-system primary-access ip-address 10.23.201.1 backup-access ip-address 10.23.203.1 ap-group name ap-group1 ap-system-profile ap-system radio 0 vap-profile wlan-net wlan 1 radio 1 vap-profile wlan-net wlan 1 ap-id 0 type-id 35 ap-mac 00e0-fc76-e360 ap-sn 210235554710CB000042 ap-name area_1 ap-group ap-group1 # return
AC_2 configuration file
# sysname AC_2 # vrrp recover-delay 60 # vlan batch 102 111 202 # interface Vlanif111 ip address 10.23.111.3 255.255.255.0 # interface Vlanif202 ip address 10.23.202.3 255.255.255.0 vrrp vrid 1 virtual-ip 10.23.202.1 admin-vrrp vrid 1 vrrp vrid 1 priority 120 vrrp vrid 1 preempt-mode timer delay 1800 # interface GigabitEthernet0/0/1 port link-type trunk port trunk allow-pass vlan 202 # interface GigabitEthernet0/0/2 port link-type trunk undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 111 # ip route-static 10.23.100.0 255.255.255.0 10.23.202.2 # capwap source ip-address 10.23.202.1 # hsb-service 0 service-ip-port local-ip 10.23.111.3 peer-ip 10.23.111.4 local-data-port 10241 peer-data-port 10241 service-keep-alive detect retransmit 3 interval 6 # hsb-group 0 track vrrp vrid 1 interface Vlanif202 bind-service 0 hsb enable # hsb-service-type access-user hsb-group 0 # hsb-service-type dhcp hsb-group 0 # hsb-service-type ap hsb-group 0 # wlan security-profile name wlan-net1 security wpa-wpa2 psk pass-phrase %^%#m"tz0f>~7.[`^6RWdzwCy16hJj/Mc!,}s`X*B]}A%^%# aes ssid-profile name wlan-net1 ssid wlan-net1 vap-profile name wlan-net1 service-vlan vlan-id 102 ssid-profile wlan-net1 security-profile wlan-net1 regulatory-domain-profile name default ap-system-profile name ap-system1 primary-access ip-address 10.23.202.1 backup-access ip-address 10.23.203.1 ap-group name ap-group2 ap-system-profile ap-system1 radio 0 vap-profile wlan-net1 wlan 1 radio 1 vap-profile wlan-net1 wlan 1 ap-id 1 type-id 35 ap-mac 00e0-fc74-9640 ap-sn 210235419610D2000097 ap-name area_2 ap-group ap-group2 # return
AC_2b configuration file
# sysname AC_2b # vrrp recover-delay 60 # vlan batch 102 111 202 # interface Vlanif111 ip address 10.23.111.4 255.255.255.0 # interface Vlanif202 ip address 10.23.202.4 255.255.255.0 vrrp vrid 1 virtual-ip 10.23.202.1 admin-vrrp vrid 1 # interface GigabitEthernet0/0/1 port link-type trunk port trunk allow-pass vlan 202 # interface GigabitEthernet0/0/2 port link-type trunk undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 111 # ip route-static 10.23.100.0 255.255.255.0 10.23.202.2 # capwap source ip-address 10.23.202.1 # hsb-service 0 service-ip-port local-ip 10.23.111.4 peer-ip 10.23.111.3 local-data-port 10241 peer-data-port 10241 service-keep-alive detect retransmit 3 interval 6 # hsb-group 0 track vrrp vrid 1 interface Vlanif202 bind-service 0 hsb enable # hsb-service-type access-user hsb-group 0 # hsb-service-type dhcp hsb-group 0 # hsb-service-type ap hsb-group 0 # wlan security-profile name wlan-net1 security wpa-wpa2 psk pass-phrase %^%#m"tz0f>~7.[`^6RWdzwCy16hJj/Mc!,}s`X*B]}A%^%# aes ssid-profile name wlan-net1 ssid wlan-net1 vap-profile name wlan-net1 service-vlan vlan-id 102 ssid-profile wlan-net1 security-profile wlan-net1 regulatory-domain-profile name default ap-system-profile name ap-system1 primary-access ip-address 10.23.202.1 backup-access ip-address 10.23.203.1 ap-group name ap-group2 ap-system-profile ap-system1 radio 0 vap-profile wlan-net1 wlan 1 radio 1 vap-profile wlan-net1 wlan 1 ap-id 1 type-id 35 ap-mac 00e0-fc74-9640 ap-sn 210235419610D2000097 ap-name area_2 ap-group ap-group2 # return
AC_3 configuration file
# sysname AC_3 # vrrp recover-delay 60 # vlan batch 101 to 102 111 203 # interface Vlanif111 ip address 10.23.111.5 255.255.255.0 # interface Vlanif203 ip address 10.23.203.3 255.255.255.0 vrrp vrid 1 virtual-ip 10.23.203.1 admin-vrrp vrid 1 vrrp vrid 1 priority 120 vrrp vrid 1 preempt-mode timer delay 1800 # interface GigabitEthernet0/0/1 port link-type trunk port trunk allow-pass vlan 203 # interface GigabitEthernet0/0/2 port link-type trunk undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 111 # capwap source ip-address 10.23.203.1 # hsb-service 0 service-ip-port local-ip 10.23.111.5 peer-ip 10.23.111.6 local-data-port 10241 peer-data-port 10241 service-keep-alive detect retransmit 3 interval 6 # hsb-group 0 track vrrp vrid 1 interface Vlanif201 bind-service 0 hsb enable # hsb-service-type access-user hsb-group 0 # hsb-service-type dhcp hsb-group 0 # hsb-service-type ap hsb-group 0 # wlan security-profile name wlan-net security wpa-wpa2 psk pass-phrase %^%#uE[\Gj>>7~!wliJGW1YWgYpkKO*>S<J'^\:QFb-Z%^%# aes security-profile name wlan-net1 security wpa-wpa2 psk pass-phrase %^%#I/\D&_J<3Q\XPh#DL)5V^:1+.$8o@6uuo3/mLXEK%^%# aes ssid-profile name wlan-net ssid wlan-net ssid-profile name wlan-net1 ssid wlan-net1 vap-profile name wlan-net service-vlan vlan-id 101 ssid-profile wlan-net security-profile wlan-net vap-profile name wlan-net1 service-vlan vlan-id 102 ssid-profile wlan-net1 security-profile wlan-net1 regulatory-domain-profile name default ap-system-profile name ap-system primary-access ip-address 10.23.201.1 backup-access ip-address 10.23.203.1 ap-system-profile name ap-system1 primary-access ip-address 10.23.202.1 backup-access ip-address 10.23.203.1 ap-group name ap-group1 ap-system-profile ap-system radio 0 vap-profile wlan-net wlan 1 radio 1 vap-profile wlan-net wlan 1 ap-group name ap-group2 ap-system-profile ap-system1 radio 0 vap-profile wlan-net1 wlan 1 radio 1 vap-profile wlan-net1 wlan 1 ap-id 0 type-id 35 ap-mac 00e0-fc76-e360 ap-sn 210235554710CB000042 ap-name area_1 ap-group ap-group1 ap-id 1 type-id 35 ap-mac 00e0-fc74-9640 ap-sn 210235419610D2000097 ap-name area_2 ap-group ap-group2 # return
AC_3b configuration file
# sysname AC_3b # vrrp recover-delay 60 # vlan batch 101 to 102 111 203 # interface Vlanif111 ip address 10.23.111.6 255.255.255.0 # interface Vlanif203 ip address 10.23.203.4 255.255.255.0 vrrp vrid 1 virtual-ip 10.23.203.1 admin-vrrp vrid 1 # interface GigabitEthernet0/0/1 port link-type trunk port trunk allow-pass vlan 203 # interface GigabitEthernet0/0/2 port link-type trunk undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 111 # capwap source ip-address 10.23.203.1 # hsb-service 0 service-ip-port local-ip 10.23.111.6 peer-ip 10.23.111.5 local-data-port 10241 peer-data-port 10241 service-keep-alive detect retransmit 3 interval 6 # hsb-group 0 track vrrp vrid 1 interface Vlanif201 bind-service 0 hsb enable # hsb-service-type access-user hsb-group 0 # hsb-service-type dhcp hsb-group 0 # hsb-service-type ap hsb-group 0 # wlan security-profile name wlan-net security wpa-wpa2 psk pass-phrase %^%#uE[\Gj>>7~!wliJGW1YWgYpkKO*>S<J'^\:QFb-Z%^%# aes security-profile name wlan-net1 security wpa-wpa2 psk pass-phrase %^%#I/\D&_J<3Q\XPh#DL)5V^:1+.$8o@6uuo3/mLXEK%^%# aes ssid-profile name wlan-net ssid wlan-net ssid-profile name wlan-net1 ssid wlan-net1 vap-profile name wlan-net service-vlan vlan-id 101 ssid-profile wlan-net security-profile wlan-net vap-profile name wlan-net1 service-vlan vlan-id 102 ssid-profile wlan-net1 security-profile wlan-net1 regulatory-domain-profile name default ap-system-profile name ap-system primary-access ip-address 10.23.201.1 backup-access ip-address 10.23.203.1 ap-system-profile name ap-system1 primary-access ip-address 10.23.202.1 backup-access ip-address 10.23.203.1 ap-group name ap-group1 ap-system-profile ap-system radio 0 vap-profile wlan-net wlan 1 radio 1 vap-profile wlan-net wlan 1 ap-group name ap-group2 ap-system-profile ap-system1 radio 0 vap-profile wlan-net1 wlan 1 radio 1 vap-profile wlan-net1 wlan 1 ap-id 0 type-id 35 ap-mac 00e0-fc76-e360 ap-sn 210235554710CB000042 ap-name area_1 ap-group ap-group1 ap-id 1 type-id 35 ap-mac 00e0-fc74-9640 ap-sn 210235419610D2000097 ap-name area_2 ap-group ap-group2 # return
Router_1 configuration file
# sysname Router_1 # vlan batch 99 101 201 # dhcp enable # interface Vlanif99 ip address 10.23.99.1 255.255.255.0 dhcp select relay dhcp relay server-ip 10.23.200.1 # interface Vlanif101 ip address 10.23.101.1 255.255.255.0 dhcp select relay dhcp relay server-ip 10.23.200.1 # interface Vlanif201 ip address 10.23.201.2 255.255.255.0 # interface Ethernet2/0/0 port link-type trunk port trunk allow-pass vlan 99 101 # interface Ethernet2/0/1 port link-type trunk port trunk allow-pass vlan 201 # interface Ethernet2/0/2 port link-type trunk port trunk allow-pass vlan 201 # return
Router_2 configuration file
# sysname Router_2 # vlan batch 100 102 202 # dhcp enable # interface Vlanif100 ip address 10.23.100.1 255.255.255.0 dhcp select relay dhcp relay server-ip 10.23.200.1 # interface Vlanif102 ip address 10.23.102.1 255.255.255.0 dhcp select relay dhcp relay server-ip 10.23.200.1 # interface Vlanif202 ip address 10.23.202.2 255.255.255.0 # interface Ethernet2/0/0 port link-type trunk port trunk allow-pass vlan 100 102 # interface Ethernet2/0/1 port link-type trunk port trunk allow-pass vlan 202 # interface Ethernet2/0/2 port link-type trunk port trunk allow-pass vlan 202 # return
Router_3 configuration file
# sysname Router_3 # vlan batch 200 203 # dhcp enable # ip pool ap_1_pool gateway-list 10.23.99.1 network 10.23.99.0 mask 255.255.255.0 option 43 sub-option 2 ip-address 10.23.201.1 10.23.203.1 # ip pool ap_2_pool gateway-list 10.23.100.1 network 10.23.100.0 mask 255.255.255.0 option 43 sub-option 2 ip-address 10.23.202.1 10.23.203.1 # ip pool sta_1_pool gateway-list 10.23.101.1 network 10.23.101.0 mask 255.255.255.0 # ip pool sta_2_pool gateway-list 10.23.102.1 network 10.23.102.0 mask 255.255.255.0 # interface Vlanif200 ip address 10.23.200.1 255.255.255.0 # interface Vlanif203 ip address 10.23.203.2 255.255.255.0 # interface Ethernet2/0/0 port link-type trunk port trunk allow-pass vlan 200 # interface Ethernet2/0/1 port link-type trunk port trunk allow-pass vlan 203 # interface Ethernet2/0/2 port link-type trunk port trunk allow-pass vlan 203 # return