Example for Configuring N+1 Backup
Service Requirements
A large enterprise has branches in different areas. ACs are deployed in the branches to manage APs, providing WLAN access and email services. These services require low network reliability and allow temporary service interruption. An AC is required to be a backup of all ACs to save costs. In this scenario, the enterprise can deploy a high-performance AC at the headquarters as a standby AC to provide backup services for active ACs in the branches.
Networking Requirements
- AC networking mode: Layer 3 networking in bypass mode
- DHCP deployment mode: Router_3 functions as a DHCP server to assign IP addresses to APs and STAs.
- Service data forwarding mode: direct forwarding
Data Planning
Item |
Data |
---|---|
Management VLANs for APs |
AC_1 (active AC): VLAN 99 |
AC_2 (active AC): VLAN 100 |
|
Service VLAN for STAs |
AC_1 (active AC): VLAN 101 |
AC_2 (active AC): VLAN 102 |
|
DHCP server |
Router_3 functions as the DHCP server to assign IP addresses to APs and STAs. STAs' gateway:
APs' gateway:
|
IP address pool for APs |
AP_1: 10.23.99.2-10.23.99.254/24 AP_2: 10.23.100.2-10.23.100.254/24 |
IP address pool for STAs |
STA_1: 10.23.101.2-10.23.101.254/24 STA_2: 10.23.102.2-10.23.102.254/24 |
AC's source interface |
AC_1: VLANIF 201 AC_2: VLANIF 202 AC_3: VLANIF 203 |
Source IP address of AC_1 |
VLANIF 201: 10.23.201.1/24 |
Source IP address of AC_2 |
VLANIF 202: 10.23.202.1/24 |
Source IP address of AC_3 |
VLANIF 203: 10.23.203.1/24 |
AP group |
On AC_1:
|
On AC_2:
|
|
On AC_3 (standby AC):
|
|
Regulatory domain profile |
|
SSID profile |
On AC_1:
|
On AC_2:
|
|
On AC_3:
|
|
Security profile |
On AC_1 and AC_3:
On AC_2 and AC_3:
|
AP system profile |
On AC_1:
|
On AC_2:
|
|
On AC_3:
|
|
VAP profile |
On AC_1:
|
On AC_2:
|
|
On AC_3:
|
Configuration Roadmap
- Configure network connectivity between ACs and other network devices. Configure Router_3 as a DHCP server to assign IP addresses to APs and STAs.
- Configure AC_1 and AC_2 as the active ACs of AP_1 and AP_2, respectively, and configure basic WLAN services on AC_1 and AC_2.
- Configure AC_3 as the standby AC of AP_1 and AP_2, and configure basic WLAN services on AC_3. Ensure that service configurations on AC_3 are the same as those on AC_1 and AC_2.
- Configure N+1 backup on the active ACs first and then on the standby AC. After the configuration, restart all the APs.
Configuration Notes
- No ACK mechanism is available for multicast packet transmission over unstable wireless links of air interfaces, so multicast packets are usually sent at low rates to ensure stable transmission. If a large number of multicast packets are sent from the network side, air interfaces may be congested. Therefore, you are advised to configure multicast packet suppression to reduce impact of large numbers of low-rate multicast packets on the wireless network. Exercise caution when configuring the rate limit if there are multicast services on the network; otherwise, the multicast services may be affected.
- In direct forwarding mode, you are advised to configure multicast packet suppression on switch interfaces connected to APs.
- In tunnel forwarding mode, you are advised to configure multicast packet suppression in traffic profiles of the AC.
The port isolation configuration is recommended on the interfaces of the device directly connected to APs. If port isolation is not configured and direct forwarding is used, a large number of unnecessary broadcast packets may be generated in the VLAN, blocking the network and degrading user experience.
In tunnel forwarding mode, the management VLAN and service VLAN cannot be the same. Only packets from the management VLAN are transmitted between the AC and APs. Packets from the service VLAN are not allowed between the AC and APs.
Procedure
- Configure the routers, switches, and ACs to communicate with each other.# On Router_1, create VLAN 99, VLAN 101, and VLAN 201. VLAN 99 is used as the management VLAN and VLAN 101 is used as the service VLAN. Add Eth2/0/0 connected to Switch_1 to VLAN 99 and VLAN 101, and Eth2/0/1 connected to AC_1 to VLAN 201. Configure the IP address 10.23.99.1/24 for VLANIF 99, 10.23.101.1/24 for VLANIF 101, and 10.23.201.2/24 for VLANIF 201.
<Huawei> system-view [Huawei] sysname Router_1 [Router_1] vlan batch 99 101 201 [Router_1] interface ethernet 2/0/0 [Router_1-Ethernet2/0/0] port link-type trunk [Router_1-Ethernet2/0/0] port trunk allow-pass vlan 99 101 [Router_1-Ethernet2/0/0] quit [Router_1] interface ethernet 2/0/1 [Router_1-Ethernet2/0/1] port link-type trunk [Router_1-Ethernet2/0/1] port trunk allow-pass vlan 201 [Router_1-Ethernet2/0/1] quit [Router_1] interface vlanif 99 [Router_1-Vlanif99] ip address 10.23.99.1 255.255.255.0 [Router_1-Vlanif99] quit [Router_1] interface vlanif 101 [Router_1-Vlanif101] ip address 10.23.101.1 255.255.255.0 [Router_1-Vlanif101] quit [Router_1] interface vlanif 201 [Router_1-Vlanif201] ip address 10.23.201.2 255.255.255.0 [Router_1-Vlanif201] quit
# On Router_2, create VLAN 100, VLAN 102, and VLAN 202. VLAN 100 is used as the management VLAN and VLAN 102 is used as the service VLAN. Add Eth2/0/0 connected to Switch_2 to VLAN 100 and VLAN 102, and Eth2/0/1 connected to AC_2 to VLAN 202. Configure the IP address 10.23.100.1/24 for VLANIF 100, 10.23.102.1/24 for VLANIF 102, and 10.23.202.2/24 for VLANIF 202. The configuration procedure is the same as that on Router_1.
# On Router_3, create VLAN 200 and VLAN 203. Add Eth2/0/0 connected to the Internet to VLAN 200, and Eth2/0/1 connected to AC_3 to VLAN 203. Configure the IP address 10.23.200.1/24 for VLANIF 200 and 10.23.203.2/24 for VLANIF 203. The configuration procedure is the same as that on Router_1.
# On Switch_1, create VLAN 99 and VLAN 101. Add GE0/0/2 connected to Router_1 and GE0/0/1 connected to AP_1 to VLAN 99 and VLAN 101. Set the PVID of the interfaces to VLAN 99.
<HUAWEI> system-view [HUAWEI] sysname Switch_1 [Switch_1] vlan batch 99 101 [Switch_1] interface gigabitethernet 0/0/1 [Switch_1-GigabitEthernet0/0/1] port link-type trunk [Switch_1-GigabitEthernet0/0/1] port trunk pvid vlan 99 [Switch_1-GigabitEthernet0/0/1] port trunk allow-pass vlan 99 101 [Switch_1-GigabitEthernet0/0/1] port-isolate enable [Switch_1-GigabitEthernet0/0/1] quit [Switch_1] interface gigabitethernet 0/0/2 [Switch_1-GigabitEthernet0/0/2] port link-type trunk [Switch_1-GigabitEthernet0/0/2] port trunk allow-pass vlan 99 101 [Switch_1-GigabitEthernet0/0/2] quit
# On Switch_2, create VLAN 100 and VLAN 102. Add GE0/0/2 connected to Router_2 and GE0/0/1 connected to AP_2 to VLAN 100 and VLAN 102. Set the PVID of the interfaces to VLAN 100. The configuration procedure is the same as that on Switch_1.
# On AC_1, create VLAN 101 and VLAN 201, and add GE0/0/1 connected to Router_1 to VLAN 201. Configure the IP address 10.23.201.1/24 for VLANIF 201.
<HUAWEI> system-view [HUAWEI] sysname AC_1 [AC_1] vlan batch 101 201 [AC_1] interface gigabitethernet 0/0/1 [AC_1-GigabitEthernet0/0/1] port link-type trunk [AC_1-GigabitEthernet0/0/1] port trunk allow-pass vlan 201 [AC_1-GigabitEthernet0/0/1] quit [AC_1] interface vlanif 201 [AC_1-Vlanif201] ip address 10.23.201.1 255.255.255.0 [AC_1-Vlanif201] quit
# On AC_2, create VLAN 102 and VLAN 202, and add GE0/0/1 connected to Router_2 to VLAN 202. Configure the IP address 10.23.202.1/24 for VLANIF 202. The configuration procedure is the same as that on AC_1.
# On AC_3, create VLAN 101, VLAN 102, and VLAN 203, and add GE0/0/1 connected to Router_3 to VLAN 203. Configure the IP address 10.23.203.1/24 for VLANIF 203. The configuration procedure is the same as that on AC_1.
# Configure routes to enable AP_1 and AP_2 to communicate with AC_3. Perform the configurations according to networking requirements. The configuration procedure is not provided here.
# On AC_1, configure a route to AP_1 with the next hop as Router_1's VLANIF 201.[AC_1] ip route-static 10.23.99.0 24 10.23.201.2
# On AC_2, configure a route to AP_2 with the next hop as Router_2's VLANIF 202.[AC_2] ip route-static 10.23.100.0 24 10.23.202.2
- Configure a DHCP server to assign IP addresses to APs and STAs.
# Configure Router_1 as a DHCP relay agent.
[Router_1] dhcp enable [Router_1] interface vlanif 99 [Router_1-Vlanif99] dhcp select relay [Router_1-Vlanif99] dhcp relay server-ip 10.23.200.1 [Router_1-Vlanif99] quit [Router_1] interface vlanif 101 [Router_1-Vlanif101] dhcp select relay [Router_1-Vlanif101] dhcp relay server-ip 10.23.200.1 [Router_1-Vlanif101] quit
# Configure Router_2 as a DHCP relay agent.
[Router_2] dhcp enable [Router_2] interface vlanif 100 [Router_2-Vlanif100] dhcp select relay [Router_2-Vlanif100] dhcp relay server-ip 10.23.200.1 [Router_2-Vlanif100] quit [Router_2] interface vlanif 102 [Router_2-Vlanif102] dhcp select relay [Router_2-Vlanif102] dhcp relay server-ip 10.23.200.1 [Router_2-Vlanif102] quit
# Configure Router_3 as the DHCP server to assign IP addresses to APs and STAs, and configure the Option 43 field to advertise the IP addresses of AC_1 and AC_3 to AP_1, and to advertise the IP addresses of AC_2 and AC_3 to AP_2. Configure the DHCP server to assign IP addresses to AP_1 from the IP address pool ap_1_pool, to AP_2 from ap_2_pool, to STA_1 from sta_1_pool, and to STA_2 from sta_2_pool.
In this example, AP_1 and AP_2 cannot share an IP address pool; otherwise, AP_1 can discover AC_2 and AP_2 can discover AC_1, which will cause APs unable to connect to the correct AC based on the AC priority.
Configure the DNS server as required. The common methods are as follows:- In the interface address pool scenario, run the dhcp server dns-list ip-address &<1-8> command in the VLANIF interface view.
- In the global address pool scenario, run the dns-list ip-address &<1-8> command in the IP address pool view.
[Router_3] dhcp enable [Router_3] ip pool ap_1_pool [Router_3-ip-pool-ap_1_pool] network 10.23.99.0 mask 24 [Router_3-ip-pool-ap_1_pool] gateway-list 10.23.99.1 [Router_3-ip-pool-ap_1_pool] option 43 sub-option 2 ip-address 10.23.201.1 10.23.203.1 [Router_3-ip-pool-ap_1_pool] quit [Router_3] ip pool ap_2_pool [Router_3-ip-pool-ap_2_pool] network 10.23.100.0 mask 24 [Router_3-ip-pool-ap_2_pool] gateway-list 10.23.100.1 [Router_3-ip-pool-ap_2_pool] option 43 sub-option 2 ip-address 10.23.202.1 10.23.203.1 [Router_3-ip-pool-ap_2_pool] quit [Router_3] ip pool sta_1_pool [Router_3-ip-pool-sta_1_pool] network 10.23.101.0 mask 24 [Router_3-ip-pool-sta_1_pool] gateway-list 10.23.101.1 [Router_3-ip-pool-sta_1_pool] quit [Router_3] ip pool sta_2_pool [Router_3-ip-pool-sta_2_pool] network 10.23.102.0 mask 24 [Router_3-ip-pool-sta_2_pool] gateway-list 10.23.102.1 [Router_3-ip-pool-sta_2_pool] quit [Router_3] interface Vlanif200 [Router_3-Vlanif200] dhcp select global [Router_3-Vlanif200] quit
- Configure basic WLAN services on AC_1.
- Configure basic WLAN services on AC_2.
# Configure basic WLAN parameters for AC_2. The configuration procedure is the same as that on AC_1.
# Configure the source interface of AC_2.[AC_2] capwap source interface vlanif 202
# Create AP group ap-group2.
[AC_2] wlan [AC_2-wlan-view] ap-group name ap-group2 [AC_2-wlan-ap-group-ap-group2] quit
# Import the APs offline on the AC and add the APs to AP group ap-group2. Assume that the AP's MAC address is 00e0-fc74-9640. Configure a name for the AP based on the AP's deployment location, so that you can know where the AP is deployed from its name. For example, name the AP area_2 if it is deployed in area 2.
[AC_2] wlan [AC_2-wlan-view] ap auth-mode mac-auth [AC_2-wlan-view] ap-id 1 ap-mac 00e0-fc74-9640 [AC_2-wlan-ap-1] ap-name area_2 Warning: This operation may cause AP reset. Continue? [Y/N]:y [AC_2-wlan-ap-1] ap-group ap-group2 Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power and antenna gain configurati ons of the radio, Whether to continue? [Y/N]:y [AC_2-wlan-ap-1] quit
# Create security profile wlan-net1 and configure a security policy in the profile.In this example, the security policy is set to WPA-WPA2+PSK+AES and the password to a1234567. In actual situations, configure the security policy according to service requirements.
[AC_2-wlan-view] security-profile name wlan-net1 [AC_2-wlan-sec-prof-wlan-net1] security wpa-wpa2 psk pass-phrase a1234567 aes [AC_2-wlan-sec-prof-wlan-net1] quit
# Create an SSID named wlan-net1.
[AC_2-wlan-view] ssid-profile name wlan-net1 [AC_2-wlan-ssid-prof-wlan-net1] ssid wlan-net1 [AC_2-wlan-ssid-prof-wlan-net1] quit
# Create VAP profile wlan-net1, set the data forwarding mode and service VLAN, and apply the security profile and SSID profile to the VAP profile.
[AC_2-wlan-view] vap-profile name wlan-net1 [AC_2-wlan-vap-prof-wlan-net1] forward-mode direct-forward [AC_2-wlan-vap-prof-wlan-net1] service-vlan vlan-id 102 [AC_2-wlan-vap-prof-wlan-net1] security-profile wlan-net1 [AC_2-wlan-vap-prof-wlan-net1] ssid-profile wlan-net1 [AC_2-wlan-vap-prof-wlan-net1] quit
# Bind VAP profile wlan-net1 to the AP group and apply the profile to radio 0 and radio 1 of the AP.
[AC_2-wlan-view] ap-group name ap-group2 [AC_2-wlan-ap-group-ap-group2] vap-profile wlan-net1 wlan 1 radio 0 [AC_2-wlan-ap-group-ap-group2] vap-profile wlan-net1 wlan 1 radio 1 [AC_2-wlan-ap-group-ap-group2] quit
# Set other parameters similarly as those of AC_1.
- Configure basic WLAN services on AC_3.
- Enable N+1 backup on AC_1, AC_2, and AC_3.# On AC_1, specify the IP addresses of the active and standby ACs for N+1 backup.
[AC_1-wlan-view] ap-system-profile name ap-system [AC_1-wlan-ap-system-prof-ap-system] primary-access ip-address 10.23.201.1 [AC_1-wlan-ap-system-prof-ap-system] backup-access ip-address 10.23.203.1 [AC_1-wlan-ap-system-prof-ap-system] quit [AC_1-wlan-view] ap-group name ap-group1 [AC_1-wlan-ap-group-ap-group1] ap-system-profile ap-system [AC_1-wlan-ap-group-ap-group1] quit
# On AC_2, specify the IP addresses of the active and standby ACs for N+1 backup.[AC_2-wlan-view] ap-system-profile name ap-system1 [AC_2-wlan-ap-system-prof-ap-system1] primary-access ip-address 10.23.202.1 [AC_2-wlan-ap-system-prof-ap-system1] backup-access ip-address 10.23.203.1 [AC_2-wlan-ap-system-prof-ap-system1] quit [AC_2-wlan-view] ap-group name ap-group2 [AC_2-wlan-ap-group-ap-group2] ap-system-profile ap-system1 [AC_2-wlan-ap-group-ap-group2] quit
# On AC_3, specify the IP addresses of the active and standby ACs for N+1 backup.[AC_3-wlan-view] ap-system-profile name ap-system [AC_3-wlan-ap-system-prof-ap-system] primary-access ip-address 10.23.201.1 [AC_3-wlan-ap-system-prof-ap-system] backup-access ip-address 10.23.203.1 [AC_3-wlan-ap-system-prof-ap-system] quit [AC_3-wlan-view] ap-group name ap-group1 [AC_3-wlan-ap-group-ap-group1] ap-system-profile ap-system [AC_3-wlan-ap-group-ap-group1] quit [AC_3-wlan-view] ap-system-profile name ap-system1 [AC_3-wlan-ap-system-prof-ap-system1] primary-access ip-address 10.23.202.1 [AC_3-wlan-ap-system-prof-ap-system1] backup-access ip-address 10.23.203.1 [AC_3-wlan-ap-system-prof-ap-system1] quit [AC_3-wlan-view] ap-group name ap-group2 [AC_3-wlan-ap-group-ap-group2] ap-system-profile ap-system1 [AC_3-wlan-ap-group-ap-group2] quit
# On AC_1, enable N+1 backup and restart all APs to make the function take effect.By default, N+1 backup is enabled. The system displays an Info message if you run the undo ac protect enable command. Run the ap-reset all command on the active AC to restart all APs. After the APs are restarted, N+1 backup starts to take effect.
[AC_1-wlan-view] undo ac protect enable Info: Backup function has already disabled. [AC_1-wlan-view] ap-reset all Warning: Reset AP(s), continue?[Y/N]:y
# On AC_2, enable N+1 backup and restart all APs to make the function take effect.[AC_2-wlan-view] undo ac protect enable Info: Backup function has already disabled. [AC_2-wlan-view] ap-reset all Warning: Reset AP(s), continue?[Y/N]:y
# Enable revertive switchover and N+1 backup on AC_3.By default, global revertive switchover is enabled. The system displays an Info message if you run the undo ac protect restore disable command.
[AC_3-wlan-view] undo ac protect restore disable Info: Protect restore has already enabled. [AC_3-wlan-view] undo ac protect enable Info: Backup function has already disabled. [AC_3-wlan-view] ap-reset all Warning: Reset AP(s), continue?[Y/N]:y
- Verify the configuration.
# Run the display ac protect and display ap-system-profile commands on AC_1 to check N+1 backup information.
[AC_1-wlan-view] display ac protect ------------------------------------------------------------ Protect state : disable Protect AC IPv4 : - Protect AC IPv6 : - Priority : 0 Protect restore : enable ... ------------------------------------------------------------ [AC_1-wlan-view] display ap-system-profile name ap-system ------------------------------------------------------------------------------ AC priority : - Protect AC IP address : - Primary AC : 10.23.201.1 Backup AC : 10.23.203.1 ... ------------------------------------------------------------------------------
# Run the display ac protect and display ap-system-profile commands on AC_2 to check N+1 backup information.
[AC_2-wlan-view] display ac protect ------------------------------------------------------------ Protect state : disable Protect AC IPv4 : - Protect AC IPv6 : - Priority : 0 Protect restore : enable ... ------------------------------------------------------------ [AC_2-wlan-view] display ap-system-profile name ap-system1 ------------------------------------------------------------------------------ AC priority : - Protect AC IP address : - Primary AC : 10.23.202.1 Backup AC : 10.23.203.1 ... ------------------------------------------------------------------------------
# Run the display ac protect and display ap-system-profile commands on AC_3 to check N+1 backup information.
[AC_3-wlan-view] display ac protect ------------------------------------------------------------ Protect state : disable Protect AC IPv4 : - Protect AC IPv6 : - Priority : 0 Protect restore : enable ... ------------------------------------------------------------ [AC_3-wlan-view] display ap-system-profile name ap-system ------------------------------------------------------------------------------ AC priority : - Protect AC IP address : - Primary AC : 10.23.201.1 Backup AC : 10.23.203.1 ... ------------------------------------------------------------------------------ [AC_3-wlan-view] display ap-system-profile name ap-system1 ------------------------------------------------------------------------------ AC priority : - Protect AC IP address : - Primary AC : 10.23.202.1 Backup AC : 10.23.203.1 ... ------------------------------------------------------------------------------
# The WLAN with the SSID wlan-net or wlan-net1 is available for STAs connected to the APs, and these STAs can connect to the WLAN and go online normally.
# Simulate an active AC fault by restarting the active AC to verify the backup configuration. Restart AC_1. When AP_1 detects a fault on the link connected to AC_1, AC_3 takes the active role, ensuring service stability.Before restarting the AC, run the save command to save the configuration file on the AC to prevent configuration loss after the restart.
# When AC_1 is restarted, AP_1 goes online on AC_3. Run the display ap all command on AC_3. The command output shows that the AP status changes from fault to normal.
# After AC_1 recovers from the restart, an active/standby switchback is triggered. AP_1 automatically goes online on AC_1.
Configuration Files
Switch_1 configuration file
# sysname Switch_1 # vlan batch 99 101 # interface GigabitEthernet0/0/1 port link-type trunk port trunk pvid vlan 99 port trunk allow-pass vlan 99 101 port-isolate enable group 1 # interface GigabitEthernet0/0/2 port link-type trunk port trunk allow-pass vlan 99 101 # return
Switch_2 configuration file
# sysname Switch_2 # vlan batch 100 102 # interface GigabitEthernet0/0/1 port link-type trunk port trunk pvid vlan 100 port trunk allow-pass vlan 100 102 port-isolate enable group 1 # interface GigabitEthernet0/0/2 port link-type trunk port trunk allow-pass vlan 100 102 # return
AC_1 configuration file
# sysname AC_1 # vlan batch 101 201 # interface Vlanif201 ip address 10.23.201.1 255.255.255.0 # interface GigabitEthernet0/0/1 port link-type trunk port trunk allow-pass vlan 201 # ip route-static 10.23.99.0 255.255.255.0 10.23.201.2 # capwap source interface vlanif201 # wlan security-profile name wlan-net security wpa-wpa2 psk pass-phrase %^%#m"tz0f>~7.[`^6RWdzwCy16hJj/Mc!,}s`X*B]}A%^%# aes ssid-profile name wlan-net ssid wlan-net vap-profile name wlan-net service-vlan vlan-id 101 ssid-profile wlan-net security-profile wlan-net regulatory-domain-profile name default ap-system-profile name ap-system primary-access ip-address 10.23.201.1 backup-access ip-address 10.23.203.1 ap-group name ap-group1 ap-system-profile ap-system radio 0 vap-profile wlan-net wlan 1 radio 1 vap-profile wlan-net wlan 1 ap-id 0 type-id 35 ap-mac 00e0-fc76-e360 ap-sn 210235554710CB000042 ap-name area_1 ap-group ap-group1 # return
AC_2 configuration file
# sysname AC_2 # vlan batch 102 202 # interface Vlanif202 ip address 10.23.202.1 255.255.255.0 # interface GigabitEthernet0/0/1 port link-type trunk port trunk allow-pass vlan 202 # ip route-static 10.23.100.0 255.255.255.0 10.23.202.2 # capwap source interface vlanif202 # wlan security-profile name wlan-net1 security wpa-wpa2 psk pass-phrase %^%#m"tz0f>~7.[`^6RWdzwCy16hJj/Mc!,}s`X*B]}A%^%# aes ssid-profile name wlan-net1 ssid wlan-net1 vap-profile name wlan-net1 service-vlan vlan-id 102 ssid-profile wlan-net1 security-profile wlan-net1 regulatory-domain-profile name default ap-system-profile name ap-system1 primary-access ip-address 10.23.202.1 backup-access ip-address 10.23.203.1 ap-group name ap-group2 ap-system-profile ap-system1 radio 0 vap-profile wlan-net1 wlan 1 radio 1 vap-profile wlan-net1 wlan 1 ap-id 1 type-id 35 ap-mac 00e0-fc74-9640 ap-sn 210235419610D2000097 ap-name area_2 ap-group ap-group2 # return
AC_3 configuration file
# sysname AC_3 # vlan batch 101 to 102 203 # interface Vlanif203 ip address 10.23.203.1 255.255.255.0 # interface GigabitEthernet0/0/1 port link-type trunk port trunk allow-pass vlan 203 # capwap source interface vlanif203 # wlan security-profile name wlan-net security wpa-wpa2 psk pass-phrase %^%#m"tz0f>~7.[`^6RWdzwCy16hJj/Mc!,}s`X*B]}A%^%# aes security-profile name wlan-net1 security wpa-wpa2 psk pass-phrase %^%#m"tz0f>~7.[`^6RWdzwCy16hJj/Mc!,}s`X*B]}A%^%# aes ssid-profile name wlan-net ssid wlan-net ssid-profile name wlan-net1 ssid wlan-net1 vap-profile name wlan-net service-vlan vlan-id 101 ssid-profile wlan-net security-profile wlan-net vap-profile name wlan-net1 service-vlan vlan-id 102 ssid-profile wlan-net1 security-profile wlan-net1 regulatory-domain-profile name default ap-system-profile name ap-system primary-access ip-address 10.23.201.1 backup-access ip-address 10.23.203.1 ap-system-profile name ap-system1 primary-access ip-address 10.23.202.1 backup-access ip-address 10.23.203.1 ap-group name ap-group1 ap-system-profile ap-system radio 0 vap-profile wlan-net wlan 1 radio 1 vap-profile wlan-net wlan 1 ap-group name ap-group2 ap-system-profile ap-system1 radio 0 vap-profile wlan-net1 wlan 1 radio 1 vap-profile wlan-net1 wlan 1 ap-id 0 type-id 35 ap-mac 00e0-fc76-e360 ap-sn 210235554710CB000042 ap-name area_1 ap-group ap-group1 ap-id 1 type-id 35 ap-mac 00e0-fc74-9640 ap-sn 210235419610D2000097 ap-name area_2 ap-group ap-group2 # return
Router_1 configuration file
# sysname Router_1 # vlan batch 99 101 201 # dhcp enable # interface Vlanif99 ip address 10.23.99.1 255.255.255.0 dhcp select relay dhcp relay server-ip 10.23.200.1 # interface Vlanif101 ip address 10.23.101.1 255.255.255.0 dhcp select relay dhcp relay server-ip 10.23.200.1 # interface Vlanif201 ip address 10.23.201.2 255.255.255.0 # interface Ethernet2/0/0 port link-type trunk port trunk allow-pass vlan 99 101 # interface Ethernet2/0/1 port link-type trunk port trunk allow-pass vlan 201 # return
Router_2 configuration file
# sysname Router_2 # vlan batch 100 102 202 # dhcp enable # interface Vlanif100 ip address 10.23.100.1 255.255.255.0 dhcp select relay dhcp relay server-ip 10.23.200.1 # interface Vlanif102 ip address 10.23.102.1 255.255.255.0 dhcp select relay dhcp relay server-ip 10.23.200.1 # interface Vlanif202 ip address 10.23.202.2 255.255.255.0 # interface Ethernet2/0/0 port link-type trunk port trunk allow-pass vlan 100 102 # interface Ethernet2/0/1 port link-type trunk port trunk allow-pass vlan 202 # return
Router_3 configuration file
# sysname Router_3 # vlan batch 200 203 # dhcp enable # ip pool ap_1_pool gateway-list 10.23.99.1 network 10.23.99.0 mask 255.255.255.0 option 43 sub-option 2 ip-address 10.23.201.1 10.23.203.1 # ip pool ap_2_pool gateway-list 10.23.100.1 network 10.23.100.0 mask 255.255.255.0 option 43 sub-option 2 ip-address 10.23.202.1 10.23.203.1 # ip pool sta_1_pool gateway-list 10.23.101.1 network 10.23.101.0 mask 255.255.255.0 # ip pool sta_2_pool gateway-list 10.23.102.1 network 10.23.102.0 mask 255.255.255.0 # interface Vlanif200 ip address 10.23.200.1 255.255.255.0 dhcp select global # interface Vlanif203 ip address 10.23.203.2 255.255.255.0 # interface Ethernet2/0/0 port link-type trunk port trunk allow-pass vlan 200 # interface Ethernet2/0/1 port link-type trunk port trunk allow-pass vlan 203 # return