WLAN Typical Configuration Examples (V200)
Example for Configuring Navi AC + Built-in Portal Authentication for Local Users
Service Requirements
When deploying a WLAN, an enterprise needs to provide wireless access for both employees and guests. The Navi AC networking allows guest traffic to be directed to the specified access control point in the DMZ for centralized management, therefore isolating access of employees and guests. Employees can access intranet servers, and their traffic is forwarded within the enterprise intranet. Guest traffic is forwarded through a CAPWAP tunnel to the DMZ where the guest users are assigned IP addresses and authenticated in built-in Portal authentication mode.
Networking Requirements
- AC networking: Layer 3 connectivity is configured between the local and Navi ACs.
- Guest service data forwarding mode: Data is centralized to the Navi AC through a CAPWAP tunnel for forwarding.
- Built-in Portal authentication is performed for guest traffic.
Data Planning
Item |
Data |
---|---|
Data planning on the Navi AC |
|
Data planning on the local AC |
|
Configuration Roadmap
- On the Navi AC, create and configure a DHCP server and a VAP profile, enable the Navi AC function, specify a local AC, enable service VLAN check on the Navi AC, and bind the VAP profile to the local AC.
- On the local AC, specify the Navi AC, create and configure a VAP profile (the same as that on the Navi AC), and bind the VAP profile to the AP group.
- Configure built-in Portal authentication for local users on the Navi AC.
- Configure local authentication parameters.
- Configure a Portal access profile for the built-in Portal server to manage Portal access control parameters.
- Configure an authentication-free rule profile to enable the AC to permit packets destined for the DNS server.
- Configure an authentication profile to manage built-in Portal authentication configurations.
- Configure external Portal authentication on the local AC.
- Configure a URL redirected to the built-in Portal server on the Navi AC.
- Set the IP address of the Portal server to the same as that of the built-in Portal server on the Navi AC.
Configuration Prerequisites
- The network is reachable between the local and Navi ACs.
- Configure a source interface or source address for both the Navi AC and local AC.
- Add APs on the local AC.
- Configure DTLS encryption of inter-AC tunnels for both the Navi AC and local AC.
Configuration Notes
- The local AC and Navi AC require the same authorization parameters, including the ACL number, VLAN, user group, and service scheme.
- In the built-in Portal authentication scenario where Navi ACs work in VRRP HSB mode:
- The IP address of the built-in Portal server on the Navi AC must be set to the VRRP virtual IP address (for example, VRRP_VIP), and the port number must be set to Port (as an example).
- The IP address of the Portal server on the local AC must be to VRRP_VIP, and the URL must be set to http://VRRP_VIP:Port/index.html.
- Ensure that the DNS server IP address is permitted in the authentication-free rule profile.
- No ACK mechanism is provided for multicast packet transmission on air interfaces. In addition, wireless links are unstable. To ensure stable transmission of multicast packets, they are usually sent at low rates. If a large number of such multicast packets are sent from the network side, the air interfaces may be congested. You are advised to configure multicast packet suppression to reduce impact of a large number of low-rate multicast packets on the wireless network. Exercise caution when configuring the rate limit; otherwise, the multicast services may be affected.
- In direct forwarding mode, you are advised to configure multicast packet suppression on switch interfaces connected to APs.
- In tunnel forwarding mode, you are advised to configure multicast packet suppression in traffic profiles of the AC.
Configure port isolation on the interfaces of the device directly connected to APs. If port isolation is not configured and direct forwarding is used, a large number of unnecessary broadcast packets may be generated in the VLAN, blocking the network and degrading user experience.
In tunnel forwarding mode, the management VLAN and service VLAN cannot be the same. Only packets from the management VLAN are transmitted between the AC and APs. Packets from the service VLAN are not allowed between the AC and APs.
- From V200R021C00, when the CAPWAP source interface or source address is configured, the system checks whether security-related configurations exist, including the PSK for DTLS encryption, PSK for DTLS encryption between ACs, user name and password for logging in to the AP, and password for logging in to the global offline management VAP, the configuration can be successful only when both of them exist. Otherwise, the system prompts you to complete the configuration first.
- From V200R021C00, DTLS encryption is enabled for CAPWAP control tunnels on the AC by default. After this function is enabled, an AP will fail to go online when it is added. In this case, you need to enable CAPWAP DTLS non-authentication (capwap dtls no-auth enable) for the AP so that the AP can obtain a security credential. After the AP goes online, disable this function (undo capwap dtls no-auth enable) to prevent unauthorized APs from going online.
Procedure
- On the Navi AC, create and configure DHCP servers and a VAP profile, enable the Navi AC function, specify a local AC, and bind the VAP profile to the local AC.
- On the local AC, specify the Navi AC, create and configure a VAP profile (the same as that on the Navi AC), and bind the VAP profile to the AP group.
- Configure built-in Portal authentication for local users on the Navi AC.
- Configure external Portal authentication on the local AC.
- On the STA gateway, configure a route to the Portal server address. The configuration is not provided in this example.
- Verify the configuration.
- Associate a STA with the WLAN. When the user attempts to access the network on a browser, the user is automatically redirected to the authentication page provided by the Portal server. After the user enters the correct user name and password on the page, the STA is authenticated successfully and can access the network.
- Run the display station all command on the local AC to check access STA information.
[Local_AC] display station all Rf/WLAN: Radio ID/WLAN ID Rx/Tx: link receive rate/link transmit rate(Mbps) -------------------------------------------------------------------------------------------------------------------------------------- STA MAC AP ID Ap name Rf/WLAN Band Type Rx/Tx RSSI VLAN IP address SSID Status AC ID -------------------------------------------------------------------------------------------------------------------------------------- 00e0-fc78-0a7d 0 00e0-fc76-e360 1/2 5G 11ax 573/573 -17 100 192.168.183.195 guest Normal 1 -------------------------------------------------------------------------------------------------------------------------------------- Total: 1 2.4G: 0 5G: 1 6G: 0
- Run the display access-user command on the Navi AC to check access STA information.
[Navi_AC] display access-user ------------------------------------------------------------------------------------------------------ UserID Username IP address MAC Status ------------------------------------------------------------------------------------------------------ 196629 guest 192.168.183.195 00e0-fc78-0a7d Success ------------------------------------------------------------------------------------------------------ Total: 1, printed: 1 [Navi_AC] display access-user user-id 196629 Basic: User ID : 196629 User name : guest User MAC : 00e0-fc78-0a7d User IP address : 192.168.183.195 User vpn-instance : - User IPv6 address : - User access Interface : Wlan-Dbss17496 User vlan event : Success QinQVlan/UserVlan : 0/100 User vlan source : user request User access time : 2023/05/26 17:59:25 User accounting session ID : AirEngi000000000018313e****0300011 User accounting mult session ID : 942533EE1D86FCB3BC780A7D64708****F5EDB45 User access type : WEB AP name : 00e0-fcee-1d86 Radio ID : 0 AP MAC : 00e0-fcee-1d86 SSID : guest Online time : 148(s) Web-server IP address : 10.1.1.1 User Group Priority : 0 AAA: User authentication type : WEB authentication Current authentication method : Local Current authorization method : - Current accounting method : None
Configuration Files
Navi AC configuration file
# dhcp enable # interface Vlanif100 ip address 10.23.100.3 255.255.255.0 dhcp select interface # interface Vlanif101 ip address 10.23.101.3 255.255.255.0 dhcp select interface # portal local-server ip 10.1.1.1 portal local-server http port 20001 # authentication-profile name auth-prof portal-access-profile portal-access-navi free-rule-template default_free_rule authentication-scheme auth-scheme # free-rule-template name default_free_rule free-rule 1 destination ip 10.23.200.2 mask 255.255.255.255 # portal-access-profile name portal-access-navi portal local-server enable # aaa authentication-scheme auth-scheme authentication-mode local local-user guest password cipher %^%#2P[q%mo}.J|oi5DU/bc2^P]X9ZLnqVa\!CF45_g!%^%# local-user guest privilege level 0 local-user guest service-type web # interface LoopBack1 ip address 10.1.1.1 255.255.255.0 # wlan security-profile name security-prof security open ssid-profile name ssid1 ssid guest vap-profile name navi-ac forward-mode tunnel service-vlan vlan-id 100 ssid-profile ssid1 security-profile security-prof authentication-profile auth-prof navi-ac service-vlan-check enable navi-ac enable navi-ac local-ac ac-id 1 ip-address 10.23.102.3 description LocalAC1 vap-profile navi-ac wlan 8 # return
Local AC configuration file
# vlan batch 100 # authentication-profile name auth-prof portal-access-profile portal-access-local free-rule-template default_free_rule # free-rule-template name default_free_rule free-rule 1 destination ip 10.23.200.2 mask 255.255.255.255 # portal web-authen-server server-source all-interface # url-template name url-template url http://10.1.1.1:20001/index.html url-parameter ssid ssid redirect-url url # web-auth-server web-auth-server server-ip 10.1.1.1 port 50100 url-template url-template # portal-access-profile name portal-access-local web-auth-server web-auth-server direct # wlan security-profile name security-prof security open ssid-profile name ssid1 ssid guest vap-profile name navi-ac forward-mode tunnel service-vlan vlan-id 100 ssid-profile ssid1 security-profile security-prof authentication-profile auth-prof type service-navi navi-ac-id 1 navi-wlan-id 8 ap-group name group1 radio 0 vap-profile navi-ac wlan 2 radio 1 vap-profile navi-ac wlan 2 radio 2 vap-profile navi-ac wlan 2 ap-id 0 type-id 35 ap-mac 00e0-fc76-e360 ap-sn 210235554710CB000042 ap-name area_1 ap-group group1 navi-ac ac-id 1 ip-address 10.23.101.3 description NaviAC # return