advertisement
IPv4 and IPv6 routing configuration
NOTE:
The term router in this document refers to routers, access controllers, unified switches, and access controller modules.
Overview
Upon receiving a packet, a router determines the optimal route based on the destination address and forwards the packet to the next router in the path. When the packet reaches the last router, it then forwards the packet to the destination host. Routing provides the path information that guides the forwarding of packets.
A router selects optimal routes from the routing table, and sends them to the forwarding information base
(FIB) table to guide packet forwarding. Each router maintains a routing table and a FIB table.
Static routes are manually configured. If a network's topology is simple, you only need to configure static routes for the network to work properly. Static routes cannot adapt to network topology changes. If a fault or a topological change occurs in the network, the network administrator must modify the static routes manually.
For more information about routing table and static routing, see H3C WX Series Access Controllers Layer
3 Configuration Guide.
Displaying the IPv4 active route table
Select Network > IPv4 Routing from the navigation tree to enter the page shown in
Figure 145 IPv4 active route table
163
Table 66 Field description
Field Description
Destination IP Address
Destination IP address and subnet mask of the IPv4 route.
Mask
Protocol Protocol that discovered the IPv4 route.
Preference
Next Hop
Interface
Preference value for the IPv4 route.
The smaller the number, the higher the preference.
Next hop IP address of the IPv4 route.
Outgoing interface of the IPv4 route. Packets destined for the specified network segment will be sent out the interface.
Creating an IPv4 static route
1.
2.
Select Network > IPv4 Routing from the navigation tree.
Click the Create tab to enter the IPv4 static route configuration page, as shown in Figure 146
.
Figure 146 Creating an IPv4 static route
3.
4.
Specify relevant information as described in Table 67
.
Click Apply.
Table 67 Configuration items
Item Description
Destination IP Address
Enter the destination host or network IP address, in dotted decimal notation.
164
Item Description
Mask
Enter the mask of the destination IP address.
You can enter a mask length or a mask in dotted decimal notation.
Preference
Set a preference value for the static route. The smaller the number, the higher the preference.
For example, specifying the same preference for multiple static routes to the same destination enables load sharing on the routes, while specifying different preferences enables route backup.
Next Hop
Interface
Enter the next hop IP address, in dotted decimal notation.
Select the outgoing interface.
You can select any available Layer 3 interface, for example, a virtual interface, of the device. If you select NULL 0, the destination IP address is unreachable.
Displaying the IPv6 active route table
Select Network > IPv6 Routing from the navigation tree to enter the page shown in
Figure 147 IPv6 active route table
Table 68 Field description
Field Description
Destination IP Address
Destination IP address and prefix length of the IPv6 route.
Prefix Length
Protocol Protocol that discovered the IPv6 route.
Preference
Next Hop
Interface
Preference value for the IPv6 route.
The smaller the number, the higher the preference.
Next hop IP address of the IPv6 route.
Outgoing interface of the IPv6 route. Packets destined for the specified network segment will be sent out the interface.
165
Creating an IPv6 static route
1.
2.
Select Network > IPv6 Routing from the navigation tree.
Click the Create tab to enter the IPv6 static route configuration page, as shown in
.
Figure 148 Creating an IPv6 static route
3.
4.
Specify relevant information as described in Table 69
.
Click Apply.
Table 69 Configuration items
Item Description
Destination IP Address
Enter the destination host or network IP address, in the X:X::X:X format. The 128-bit destination IPv6 address is a hexadecimal address with eight parts separated by colons (:). Each part is represented by a 4-digit hexadecimal integer.
Prefix Length
Preference
Next Hop
Enter the prefix length of the destination IPv6 address.
Set a preference value for the static route. The smaller the number, the higher the preference.
For example, specifying the same preference for multiple static routes to the same destination enables load sharing on the routes, while specifying different priorities for them enables route backup.
Enter the next hop address, in the same format as the destination IP address.
166
Item Description
Interface
Select the outgoing interface.
You can select any available Layer 3 interface, for example, a virtual interface, of the device. If you select NULL 0, the destination IPv6 address is unreachable.
IPv4 static route configuration example
Network requirements
Switch B and AC for Host A and Host B to communicate with each other.
Figure 149 Network diagram
Configuration outlines
1.
2.
3.
On Switch A, configure a default route with Switch B as the next hop.
On Switch B, configure one static route with Switch A as the next hop and the other with AC as the next hop.
On AC, configure a default route with Switch B as the next hop.
Configuration procedure
1.
2.
3.
Configure a default route with the next hop address 1.1.4.2 on Switch A.
Configure two static routes on Switch B: one with destination address 1.1.2.0/24 and next hop address 1.1.4.1, and the other with destination address 1.1.3.0/24 and next hop address
1.1.5.6.
Configure a default route on AC: a.
Select Network > IPv4 Routing from the navigation tree. b. c. d.
Click the Create tab to enter the IPv4 static route configuration page, as shown in Figure 150
.
Enter 0.0.0.0 for Destination IP Address, 0 for Mask, and 1.1.5.5 for Next Hop.
Click Apply.
167
Figure 150 Configuring a default route
Verifying the configuration
1.
2.
Display the route table:
Enter the IPv4 route page of Switch A, Switch B, and AC, respectively, to verify that the newly configured static routes are displayed as active routes on the page.
Ping Host B from Host A (assuming both hosts run Windows XP):
C:\Documents and Settings\Administrator>ping 1.1.3.2
Pinging 1.1.3.2 with 32 bytes of data:
Reply from 1.1.3.2: bytes=32 time=1ms TTL=128
Reply from 1.1.3.2: bytes=32 time=1ms TTL=128
Reply from 1.1.3.2: bytes=32 time=1ms TTL=128
Reply from 1.1.3.2: bytes=32 time=1ms TTL=128
Ping statistics for 1.1.3.2:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 1ms, Maximum = 1ms, Average = 1ms
IPv6 static route configuration example
Network requirements
The IP addresses of devices are shown in
Figure 151 . IPv6 static routes must be configured on Switch A,
Switch B and AC for Host A and Host B to communicate with each other.
168
Figure 151 Network diagram
Vlan-int200
4::2/64
Switch B
Vlan-int300
5::2/64
Vlan-int200
4::1/64
Vlan-int300
5::1/64
Host A
1::2/64
Vlan-int100
1::1/64
Switch A
Vlan-int500
3::1/64
AC AP
Host B
3::2/64
Configuration outlines
1.
2.
3.
On Switch A, configure a default route with Switch B as the next hop.
On Switch B, configure one static route with Switch A as the next hop and the other with AC as the next hop.
On AC, configure a default route with Switch B as the next hop.
Configuration procedure
1.
2.
3.
Configure a default route with the next hop address 4::2 on Switch A.
Configure two static routes on Switch B: one with destination address 1::/64 and next hop address 4::1, and the other with destination address 3::/64 and next hop address 5::1.
Configure a default route on AC: a.
Select Network > IPv6 Routing from the navigation tree. b. c. d.
Click the Create tab to enter the IPv6 static route configuration page, as shown in Figure 152
.
Enter :: for Destination IP Address, select 0 for Prefix Length, and enter 5::2 for Next Hop.
Click Apply.
Figure 152 Configuring a default route
169
Verifying the configuration
1.
2.
Display the route table:
Enter the IPv6 route page of Switch A, Switch B, and AC, respectively, to verify that the newly configured static routes are displayed as active routes on the page.
Ping Host B from Switch A:
<SwitchA> system-view
[SwitchA] ping ipv6 3::2
PING 3::2 : 56 data bytes, press CTRL_C to break
Reply from 3::2
bytes=56 Sequence=1 hop limit=254 time = 63 ms
Reply from 3::2
bytes=56 Sequence=2 hop limit=254 time = 62 ms
Reply from 3::2
bytes=56 Sequence=3 hop limit=254 time = 62 ms
Reply from 3::2
bytes=56 Sequence=4 hop limit=254 time = 63 ms
Reply from 3::2
bytes=56 Sequence=5 hop limit=254 time = 63 ms
--- 3::2 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 62/62/63 ms
Configuration guidelines
When you configure a static route, follow these guidelines:
1.
If you do not specify the preference when you configure a static route, the default preference is used. Reconfiguration of the default preference applies only to newly created static routes.
Currently, the Web interface does not support configuration of the default preference.
2.
3.
When you configure a static route, the static route does not take effect if you specify the next hop address first and then configure it as the IP address of a local interface, such as an Ethernet interface and VLAN interface.
When specifying the output interface, note that:
If NULL 0 or a loopback interface is specified as the output interface, there is no need to configure the next hop address.
If a point-to-point interface is specified as the output interface, you do not need to specify the next hop or change the configuration after the peer address has changed. For example, a PPP interface obtains the peer's IP address through PPP negotiation, and therefore, you only need to specify it as the output interface.
If the output interface is an NBMA or P2MP interface, which supports point-to-multipoint networks, the IP address-to-link layer address mapping must be established. Therefore, H3C recommends that you specify the next hop IP address when you configure it as the output interface.
170
If you want to specify a broadcast interface (such as an Ethernet interface, virtual template, or
VLAN interface) as the output interface, which may have multiple next hops, you must specify the next hop at the same time.
171
advertisement
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Related manuals
advertisement
Table of contents
- 1 Title Page
- 3 Preface
- 3 Audience
- 3 Conventions
- 3 GUI conventions
- 4 Symbols
- 4 Network topology icons
- 4 Port numbering in examples
- 4 About the H3C WX Series documentation set
- 5 Obtaining documentation
- 5 Technical support
- 5 Documentation feedback
- 6 Contents
- 17 Models of WX series access controllers
- 18 Typical network scenarios
- 18 Access controller network scenario
- 18 Access controller module network scenario
- 19 Wireless switch network scenario
- 20 Feature matrixes
- 20 Feature matrix for the WX5000 series
- 21 Feature matrix for the WX6000 series
- 24 Feature matrix for the WX3024E
- 25 Quick Start
- 25 Quick start wizard home page
- 25 Basic configuration
- 26 Admin configuration
- 27 IP configuration
- 28 Wireless configuration
- 29 RADIUS configuration
- 31 Portal configuration
- 32 Encryption configuration
- 33 AP configuration
- 35 Configuration summary
- 36 Web overview
- 36 Logging in to the Web interface
- 37 Logging out of the Web interface
- 37 Introduction to the Web interface
- 38 Web user level
- 39 Introduction to the Web-based NM functions
- 51 Common Web interface elements
- 51 Common buttons and icons
- 51 Content display by pages
- 52 Searching function
- 54 Sorting function
- 55 Configuration guidelines
- 56 Troubleshooting Web browser
- 56 Failure to access the device through the Web interface
- 56 Symptom
- 56 Analysis
- 56 Configuring the Internet Explorer settings
- 57 Configuring Firefox Web browser settings
- 59 Summary
- 59 Device information
- 60 Device info
- 60 System resource state
- 60 Device interface information
- 61 Recent system logs
- 61 Displaying WLAN service
- 61 Displaying detailed information of WLAN service
- 64 Displaying statistics of WLAN service
- 64 Displaying connection history information of WLAN service
- 65 Displaying AP
- 65 Displaying WLAN service information of an AP
- 65 Displaying AP connection history information
- 66 Displaying AP radio information
- 68 Displaying AP detailed information
- 73 Displaying clients
- 73 Displaying client detailed information
- 76 Displaying client statistics
- 77 Displaying client roaming information
- 78 Displaying RF ping information
- 80 License management
- 80 Configuring licenses
- 80 Adding a license
- 81 Displaying license information
- 81 Configuring enhanced licenses
- 81 Registering an enhanced license
- 82 Displaying registered enhanced licenses
- 83 Device basic information configuration
- 83 Configuring system name
- 83 Configuring Web idle timeout period
- 85 Device maintenance
- 85 Software upgrade
- 86 Rebooting the device
- 87 Generating the diagnostic information file
- 89 System time
- 89 Displaying the system time
- 89 Configuring the system time
- 90 Configuring the network time
- 92 System time configuration example
- 92 Network requirements
- 92 Configuring the switch
- 92 Configuring the AC
- 93 Verifying the configuration
- 93 Configuration guidelines
- 94 Log management
- 94 Displaying syslog
- 95 Setting the log host
- 96 Setting buffer capacity and refresh interval
- 98 Configuration management
- 98 Backing up the configuration
- 98 Restoring the configuration
- 99 Saving the configuration
- 99 Fast
- 100 Common
- 100 Initializing the configuration
- 101 File management
- 101 Displaying file list
- 102 Downloading a file
- 102 Uploading a file
- 102 Removing a file
- 102 Specifying the main boot file
- 103 Interface management
- 103 Interface management overview
- 103 Displaying interface information and statistics
- 105 Creating an interface
- 108 Modifying a Layer 2 interface
- 111 Modifying a Layer 3 interface
- 113 Interface management configuration example
- 113 Network requirements
- 113 Configuration procedure
- 115 Port mirroring
- 115 Introduction to port mirroring
- 116 Port mirroring configuration task list
- 116 Adding a mirroring group
- 117 Configuring ports for a mirroring group
- 118 Configuration examples
- 118 Network requirements
- 118 Adding a mirroring group
- 119 Configuring the mirroring ports
- 120 Configuring the monitor port
- 120 Configuration guidelines
- 121 User management
- 121 Creating a user
- 122 Setting the super password
- 123 Switching the user access level to the management level
- 124 SNMP configuration
- 124 SNMP overview
- 124 SNMP configuration task list
- 124 SNMPv1 or SNMPv2c configuration task list
- 125 SNMPv3 configuration task list
- 125 Enabling SNMP
- 127 Configuring an SNMP view
- 127 Creating an SNMP view
- 128 Adding rules to an SNMP view
- 129 Configuring an SNMP community
- 130 Configuring an SNMP group
- 132 Configuring an SNMP user
- 134 Configuring SNMP trap function
- 135 Displaying SNMP packet statistics
- 136 SNMP configuration example
- 136 Network requirements
- 136 Configuring the agent
- 140 Configuring the NMS
- 141 Verifying the configuration
- 142 Loopback
- 142 Loopback operation
- 143 Configuration guidelines
- 144 MAC address configuration
- 144 Overview
- 145 Configuring a MAC address entry
- 146 Setting the aging time of MAC address entries
- 147 MAC address configuration example
- 147 Network requirements
- 147 Configuration procedure
- 149 VLAN configuration
- 149 Overview
- 149 Recommended configuration procedure
- 149 Creating a VLAN
- 150 Modifying a VLAN
- 151 Modifying a port
- 153 VLAN configuration examples
- 153 Network requirements
- 153 Configuring AC
- 156 Configuring Switch
- 156 Configuration guidelines
- 157 ARP configuration
- 157 Overview
- 157 Introduction to ARP
- 157 Introduction to gratuitous ARP
- 157 Gratuitous ARP packets
- 157 Learning of gratuitous ARP packets
- 157 Displaying ARP entries
- 158 Creating a static ARP entry
- 159 Removing ARP entries
- 159 Configuring gratuitous ARP
- 160 Static ARP configuration example
- 160 Network requirements
- 160 Configuration procedure
- 164 ARP attack protection configuration
- 164 ARP detection
- 164 Source MAC address based ARP attack detection
- 164 ARP active acknowledgement
- 165 ARP packet source MAC address consistency check
- 165 Configuring ARP detection
- 166 Configuring other ARP attack protection functions
- 168 IGMP snooping configuration
- 168 Overview
- 169 Recommended configuration procedure
- 169 Enabling IGMP snooping globally
- 170 Configuring IGMP snooping on a VLAN
- 171 Configuring IGMP snooping on a port
- 173 Displaying IGMP snooping multicast entry information
- 174 IGMP snooping configuration examples
- 174 Network requirements
- 174 Configuring IP addresses
- 174 Configuring Router A
- 174 Configuring the AC
- 177 Verifying the configuration
- 179 IPv4 and IPv6 routing configuration
- 179 Overview
- 179 Displaying the IPv4 active route table
- 180 Creating an IPv4 static route
- 181 Displaying the IPv6 active route table
- 182 Creating an IPv6 static route
- 183 IPv4 static route configuration example
- 183 Network requirements
- 183 Configuration outlines
- 183 Configuration procedure
- 184 Verifying the configuration
- 184 IPv6 static route configuration example
- 184 Network requirements
- 185 Configuration outlines
- 185 Configuration procedure
- 186 Verifying the configuration
- 186 Configuration guidelines
- 188 DHCP overview
- 188 Introduction to DHCP snooping
- 189 Recording IP-to-MAC mappings of DHCP clients
- 189 Ensuring DHCP clients to obtain IP addresses from authorized DHCP servers
- 189 Recommended configuration procedure (for DHCP server)
- 190 Enabling DHCP
- 191 Creating a static address pool for the DHCP server
- 192 Creating a dynamic address pool for the DHCP server
- 194 Enabling the DHCP server on an interface
- 194 Displaying information about assigned IP addresses
- 195 Recommended configuration procedure (for DHCP relay agent)
- 196 Enabling DHCP and configuring advanced parameters for the DHCP relay agent
- 198 Creating a DHCP server group
- 199 Enabling the DHCP relay agent on an interface
- 200 Configuring and displaying clients' IP-to-MAC bindings
- 201 Recommended configuration procedure (for DHCP snooping)
- 201 Enabling DHCP snooping
- 202 Configuring DHCP snooping functions on an interface
- 203 Displaying clients' IP-to-MAC bindings
- 204 DHCP server configuration example
- 204 Network requirements
- 204 Configuration procedure
- 206 DHCP relay agent configuration example
- 206 Network requirements
- 206 Configuration procedure
- 208 DHCP snooping configuration example
- 208 Network requirements
- 208 Configuration procedure
- 211 DNS configuration
- 211 Overview
- 211 Static domain name resolution
- 211 Dynamic domain name resolution
- 211 DNS proxy
- 211 Recommended configuration procedure
- 211 Configuring static name resolution table
- 212 Configuring dynamic domain name resolution
- 212 Configuring DNS proxy
- 212 Configuring static name resolution table
- 213 Configuring dynamic domain name resolution
- 214 Configuring DNS proxy
- 214 Adding a DNS server address
- 215 Adding a domain name suffix
- 215 Clearing dynamic DNS cache
- 215 DNS configuration example
- 215 Network requirements
- 216 Configuring the DNS server
- 217 Configuring the AC
- 219 Verifying the configuration
- 220 Service management
- 220 Overview
- 220 FTP service
- 220 Telnet service
- 220 SSH service
- 220 SFTP service
- 220 HTTP service
- 220 HTTPS service
- 221 Configuring service management
- 223 Diagnostic tools
- 223 Ping
- 223 Trace route
- 224 Ping operation
- 224 IPv4 ping operation
- 225 IPv6 ping operation
- 227 Trace route operation
- 229 AP configuration
- 229 AC-AP connection
- 229 Auto AP
- 229 AP group
- 230 Configuring an AP
- 230 Creating an AP
- 230 Configuring an AP
- 232 Configuring advanced settings
- 234 Configuring auto AP
- 234 Enabling auto AP
- 235 Renaming an AP
- 235 Batch switch
- 236 Configuring an AP group
- 236 Creating an AP group
- 236 Configuring an AP group
- 237 Applying the AP group
- 237 AP connection priority configuration example
- 237 Network requirements
- 237 Configuring AC 1
- 238 Configuring AC 2
- 238 Verifying the configuration
- 239 Configuring access services
- 239 Access service overview
- 239 Terminology
- 239 Wireless client
- 239 Access point (AP)
- 239 Access controller (AC)
- 239 SSID
- 239 Client access
- 240 Scanning
- 241 Authentication
- 242 Association
- 242 WLAN data security
- 243 Client access authentication
- 245 802.11n
- 246 Configuring access service
- 246 Recommended configuration procedure
- 246 Creating a WLAN service
- 247 Configuring clear type wireless service
- 247 Configuring basic settings for a clear type wireless service
- 248 Configuring advanced settings for the clear type wireless service
- 249 Configuring security settings for a clear type wireless service
- 256 Configuring crypto type wireless service
- 256 Configuring basic settings for a crypto type wireless service
- 257 Configuring advanced settings for a crypto type wireless service
- 259 Configuring security settings for a crypto type wireless service
- 263 Security parameter dependencies
- 263 Enabling a wireless service
- 264 Binding an AP radio to a wireless service
- 264 Binding an AP radio to a wireless service
- 264 Binding an AP radio to a VLAN
- 265 Enabling a radio
- 266 Displaying the detailed information of a wireless service
- 266 Displaying the detailed information of a clear-type wireless service
- 267 Displaying the detailed information of a crypto-type wireless service
- 269 Wireless service configuration example
- 269 Network requirements
- 269 Configuring the AC
- 271 Verifying the configuration
- 272 Configuration guidelines
- 272 Auto AP configuration example
- 272 Network requirements
- 272 Configuring the AC
- 276 Verifying the configuration
- 277 Configuration guidelines
- 277 802.11n configuration example
- 277 Network requirements
- 278 Configuring the AC
- 278 Verifying the configuration
- 279 Configuration guidelines
- 279 WPA-PSK authentication configuration example
- 279 Network requirements
- 279 Configuring the AC
- 282 Configuring the client
- 284 Verifying the configuration
- 284 Local MAC authentication configuration example
- 284 Network requirements
- 284 Configuring the AC
- 288 Configuring the client
- 289 Verifying the configuration
- 289 Remote MAC authentication configuration example
- 289 Network requirements
- 290 Configuring the AC
- 296 Configuring the RADIUS server (IMCv3)
- 298 Configuring the RADIUS server (IMC v5)
- 299 Verifying the configuration
- 300 Remote 802.1X authentication configuration example
- 300 Network requirements
- 300 Configuring the AC
- 305 Configuring the RADIUS server (IMCv3)
- 308 Configuring the RADIUS server (IMC v5)
- 309 Configuring the wireless client
- 313 Verifying the configuration
- 313 Dynamic WEP encryption-802.1X authentication configuration example
- 313 Network requirements
- 314 Configuration procedure
- 316 Configuring the wireless client
- 319 Verifying the configuration
- 320 Configuring mesh services
- 320 Mesh overview
- 320 Basic concepts in WLAN mesh
- 321 Advantages of WLAN mesh
- 321 Deployment scenarios
- 321 Normal WLAN mesh deployment
- 323 Subway WLAN mesh deployment
- 324 WLAN mesh security
- 324 Mobile link switch protocol
- 325 MLSP advantages
- 325 Operation of MLSP
- 325 Formation of dormant links
- 326 Selection of active link
- 326 Mesh network topologies
- 326 Point to point connection
- 326 Point to multi-point connection
- 327 Self topology detection and bridging connection
- 327 Configuring mesh service
- 327 Configuring mesh service
- 327 Creating a mesh service
- 328 Configuring a mesh service
- 330 Binding an AP radio to a mesh service
- 330 Enabling a mesh service
- 331 Displaying the detailed information of a mesh service
- 332 Configuring a mesh policy
- 332 Creating a mesh policy
- 332 Configuring a mesh policy
- 334 Binding an AP radio to a mesh policy
- 334 Displaying the detailed information of a mesh policy
- 336 Mesh global setup
- 336 Mesh basic setup
- 336 Enabling mesh portal service
- 337 Configuring a working channel
- 337 Manual
- 338 Auto
- 338 Enabling radio
- 338 Configuring a peer MAC address
- 339 Mesh DFS
- 339 Displaying radio information
- 340 Displaying channel switch information
- 341 Displaying the mesh link status
- 341 Mesh link monitoring
- 341 Mesh link test
- 342 Normal WLAN mesh configuration example
- 342 Network requirements
- 343 Configuring the AC
- 346 Verifying the configuration
- 346 Subway WLAN mesh configuration example
- 346 Network requirements
- 347 Configuring the AC
- 347 Mesh point-to-multipoint configuration example
- 347 Network requirements
- 347 Configuration considerations
- 348 Configuring the AC
- 348 Tri-radio mesh configuration example
- 348 Network requirements
- 348 Configuration considerations
- 349 Configuration procedure
- 349 Mesh DFS configuration example
- 349 Network requirements
- 349 Configuration considerations
- 349 Configuration procedure
- 351 Verifying the configuration
- 352 WLAN roaming configuration
- 352 Configuring WLAN roaming
- 352 Configuring a roaming group
- 353 Adding a group member
- 354 Displaying client information
- 354 WLAN roaming configuration examples
- 354 Intra-AC roaming configuration example
- 354 Network requirements
- 355 Configuring the AC
- 356 Verifying the configuration
- 358 Configuration guidelines
- 358 Inter-AC roaming configuration example
- 358 Network requirements
- 359 Configuring AC 1 and AC 2
- 360 Verifying the configuration
- 362 Configuration guidelines
- 363 Radio configuration
- 363 Radio overview
- 363 WLAN RRM overview
- 363 Dynamic frequency selection
- 364 Transmit power control
- 366 Radio setup
- 366 Configuring radio parameters
- 370 Enabling a radio
- 371 Locking the channel
- 372 Locking the power
- 372 Configuring data transmit rates
- 372 Configuring 802.11a/802.11b/802.11g rates
- 374 Configuring 802.11n MCS
- 374 Introduction to MCS
- 375 Configuring 802.11n rates
- 376 Configuring channel scanning
- 377 Configuring calibration
- 377 Parameter setting
- 381 Configuring a radio group
- 383 Calibration operations
- 383 Displaying channel status
- 383 Displaying neighbor information
- 384 Displaying history information
- 385 Antenna
- 386 Manual channel adjustment configuration example
- 386 Network requirements
- 386 Configuration procedure
- 387 Verifying the configuration
- 388 Configuration guidelines
- 388 Automatic power adjustment configuration example
- 388 Network requirements
- 388 Configuration procedure
- 389 Verifying the configuration
- 389 Radio group configuration example
- 389 Network requirements
- 390 Configuration procedure
- 392 Verifying the configuration
- 393 Configuring 802.1X
- 393 802.1X architecture
- 393 Access control methods
- 394 Configuring 802.1X
- 394 Configuration prerequisites
- 394 Recommended configuration procedure
- 394 Configuring 802.1X globally
- 397 Configuring 802.1X on a port
- 399 Configuring an 802.1X guest VLAN
- 399 Configuring an Auth-Fail VLAN
- 401 Configuring portal authentication
- 401 Introduction to portal authentication
- 402 Configuring portal authentication
- 402 Configuration prerequisites
- 402 Recommended configuration procedure
- 403 Configuring the portal service
- 407 Configuring advanced parameters for portal authentication
- 408 Configuring a portal-free rule
- 410 Customizing authentication pages
- 410 Rules on file names
- 411 Rules on page requests
- 411 Rules on Post request attributes
- 411 Rules on page file compression and saving
- 411 Rules on file size and contents
- 412 Logging off a user who closes the logon success or online page
- 412 Redirecting authenticated users to a specified web page
- 413 Portal authentication configuration example
- 413 Network requirements
- 413 Configuration prerequisites
- 413 Configuring the AC
- 421 Verifying the configuration
- 422 Configuring AAA
- 422 AAA overview
- 422 Configuring AAA
- 422 Configuration prerequisites
- 423 Recommended configuration procedure
- 423 Configuring an ISP domain
- 424 Configuring authentication methods for the ISP domain
- 426 Configuring authorization methods for the ISP domain
- 428 Configuring accounting methods for the ISP domain
- 430 AAA configuration example
- 430 Network requirements
- 431 Configuration procedure
- 435 Configuring RADIUS
- 435 RADIUS overview
- 435 Configuring a RADIUS scheme
- 441 RADIUS configuration example
- 441 Network requirements
- 441 Configuration procedure
- 446 Verifying the configuration
- 446 Configuration guidelines
- 448 Configuring the local EAP service
- 448 Configuration procedure
- 449 Local EAP service configuration example
- 449 Network requirements
- 450 Configuration procedure
- 455 Verifying the configuration
- 456 Configuring users
- 456 Overview
- 456 Local user
- 456 User group
- 456 Guest
- 456 User profile
- 457 Configuring a local user
- 459 Configuring a user group
- 460 Configuring a guest
- 460 Procedure for a management level administrator to configure a guest
- 462 Procedure for a guest administrator to configure a guest
- 463 Configuring a user profile
- 466 Managing certificates
- 466 PKI overview
- 466 Configuring PKI
- 467 Recommended configuration procedure for manual request
- 468 Recommended configuration procedure for automatic request
- 469 Creating a PKI entity
- 470 Creating a PKI domain
- 473 Generating an RSA key pair
- 474 Destroying the RSA key pair
- 474 Retrieving and displaying a certificate
- 475 Requesting a local certificate
- 476 Retrieving and displaying a CRL
- 477 Certificate management configuration example
- 477 Network requirements
- 478 Configuring the CA server
- 478 Configuring the AC
- 482 Verifying the configuration
- 482 Configuration guidelines
- 483 WLAN security configuration
- 483 WLAN security overview
- 483 Terminology
- 483 Detecting rogue devices
- 484 Taking countermeasures against rogue device attacks
- 485 Functionalities supported
- 485 WIDS attack detection
- 485 Flood attack detection
- 486 Spoofing attack detection
- 486 Weak IV detection
- 486 Blacklist and white list
- 487 Configuring rogue device detection
- 487 Recommended configure procedure
- 487 Configuring AP operating mode
- 488 Configuring detection rules
- 491 Configuring detection rule lists
- 492 Enabling countermeasures and configuring aging time for detected rogue devices
- 493 Displaying monitor record
- 494 Displaying history record
- 495 Configuring WIDS
- 495 Configuring WIDS
- 495 Displaying history record
- 496 Displaying statistics information
- 496 Configuring the blacklist and white list functions
- 497 Configuring dynamic blacklist
- 497 Configuring static blacklist
- 499 Configuring white list
- 500 Rogue detection configuration example
- 500 Network requirements
- 500 Configuration procedure
- 502 Configuration guidelines
- 503 User isolation
- 503 User isolation overview
- 503 Before user isolation is enabled
- 504 After user isolation is enabled
- 504 Configuring user isolation
- 504 Configuring user isolation
- 505 Displaying user isolation information
- 505 User isolation configuration example
- 505 Network requirements
- 506 Configuration procedure
- 507 Authorized IP
- 507 Overview
- 507 Configuring authorized IP
- 509 Configuring ACL and QoS
- 509 ACL overview
- 509 QoS overview
- 509 Traditional packet forwarding services
- 510 New requirements from new applications
- 510 Configuring an ACL
- 510 Recommend configuration procedures
- 510 Recommended IPv4 ACL configuration procedure
- 511 Recommended IPv6 ACL configuration procedure
- 511 Adding a time range
- 512 Adding an IPv4 ACL
- 513 Configuring a rule for a basic IPv4 ACL
- 514 Configuring a rule for an advanced IPv4 ACL
- 517 Configuring a rule for an Ethernet frame header ACL
- 519 Adding an IPv6 ACL
- 520 Configuring a rule for a basic IPv6 ACL
- 522 Configuring a rule for an advanced IPv6 ACL
- 524 Configuring line rate
- 525 Configuring the priority trust mode of a port
- 525 Priority mapping overview
- 525 Configuring priority mapping
- 526 Approach 1
- 527 Approach 2
- 528 Configuring a QoS policy
- 528 Recommended QoS policy configuration procedure
- 528 Class
- 529 Traffic behavior
- 529 Policy
- 529 Adding a class
- 530 Configuring classification rules
- 533 Adding a traffic behavior
- 534 Configuring actions for a traffic behavior
- 537 Adding a policy
- 537 Configuring classifier-behavior associations for the policy
- 538 Applying a policy to a port
- 539 Applying a QoS policy to a WLAN service
- 541 ACL and QoS configuration example
- 541 Network requirements
- 541 Configuration procedure
- 550 Verifying the configuration
- 550 Configuration guidelines
- 552 Configuring wireless QoS
- 552 Overview
- 552 Terminology
- 552 WMM
- 552 EDCA
- 552 AC
- 552 CAC
- 552 U-APSD
- 552 SVP
- 552 WMM protocol overview
- 553 EDCA parameters
- 553 CAC admission policies
- 554 U-APSD power-save mechanism
- 554 SVP service
- 554 ACK policy
- 554 Enabling wireless QoS
- 555 Setting the SVP service
- 556 Setting CAC admission policy
- 556 Setting radio EDCA parameters for APs
- 558 Setting client EDCA parameters for wireless clients
- 559 Displaying the radio statistics
- 560 Displaying the client statistics
- 562 Setting rate limiting
- 562 Setting wireless service-based client rate limiting
- 563 Setting radio-based client rate limiting
- 564 Configuring the bandwidth guarantee function
- 564 Setting the reference radio bandwidth
- 565 Setting guaranteed bandwidth percents
- 566 Enabling bandwidth guaranteeing
- 567 Displaying guaranteed bandwidth settings
- 567 CAC service configuration example
- 567 Network requirements
- 567 Configuring the wireless service
- 567 Configuring wireless QoS
- 569 Verifying the configuration
- 569 Wireless service-based static rate limiting configuration example
- 569 Network requirements
- 569 Configuring the wireless service
- 569 Configuring static rate limiting
- 570 Verifying the configuration
- 570 Wireless service-based dynamic rate limiting configuration example
- 570 Network requirements
- 571 Configuring the wireless service
- 571 Configuring dynamic rate limiting
- 571 Verifying the configuration
- 571 Bandwidth guarantee configuration example
- 571 Network requirements
- 572 Configuring the wireless services
- 572 Configuring bandwidth guaranteeing
- 575 Verifying the configuration
- 576 Advanced settings
- 576 Advanced settings overview
- 576 Country/Region code
- 576 1+1 AC backup
- 576 Dual-link backup
- 577 1+1 fast backup
- 577 1+N AC backup
- 578 Continuous transmitting mode
- 578 Channel busy test
- 578 WLAN load balancing
- 578 Requirement of WLAN load-balancing implementation
- 578 Load-balancing modes
- 580 Load-balancing methods
- 580 AP version setting
- 580 Switching to fat AP
- 580 Wireless location
- 581 Architecture of the wireless location system
- 581 Wireless locating process
- 582 Wireless sniffer
- 582 Band navigation
- 583 Configuring WLAN advanced settings
- 583 Setting a country/region code
- 584 Configuring 1+1 AC backup
- 584 Configuring AP connection priority
- 584 Configure 1+1 AC backup
- 585 Configuring 1+1 fast backup
- 586 Displaying status information of 1+1 fast backup
- 587 Configuring 1+N AC backup
- 587 Configuring AP connection priority
- 588 Configuring 1+N AC backup
- 589 Configuring continuous transmitting mode
- 590 Configuring a channel busy test
- 592 Configuring load balancing
- 592 Configuration prerequisites
- 592 Recommended configuration procedure
- 592 Configuring a load balancing mode
- 594 Configuring group-based load balancing
- 595 Configuring parameters that affect load balancing
- 595 Configuring AP
- 595 Upgrading AP version
- 596 Switching to fat AP
- 596 Configuring wireless location
- 598 Configuring wireless sniffer
- 599 Configuring band navigation
- 599 Configuration prerequisites
- 599 Configuring band navigation
- 601 Advanced settings configuration examples
- 601 1+1 fast backup configuration example
- 601 Network requirements
- 601 Configuring AC 1
- 603 Configuring AC 2
- 603 Verifying the configuration
- 606 Configuration guidelines
- 606 1+N backup configuration example
- 606 Network requirements
- 606 Configuring AC 1
- 607 Configuring AC 2
- 609 Verifying the configuration
- 609 AP-based session-mode load balancing configuration example
- 609 Network requirements
- 610 Configuration procedure
- 611 Verifying the configuration
- 611 Configuration guidelines
- 611 AP-based traffic-mode load balancing configuration example
- 611 Network requirements
- 611 Configuration procedure
- 612 Verifying the configuration
- 612 Configuration guidelines
- 612 Group-based session-mode load balancing configuration example
- 612 Network requirements
- 613 Configuration procedure
- 614 Verifying the configuration
- 614 Group-based traffic-mode load balancing configuration example
- 614 Network requirements
- 615 Configuration procedure
- 616 Verifying the configuration
- 617 Wireless location configuration example
- 617 Network requirements
- 617 Configuring the AE
- 617 Configuring AP 1 to operate in monitor mode
- 618 Enabling 802.11n
- 619 Enabling wireless location.
- 619 Verifying the configuration
- 619 Configuration guidelines
- 619 Wireless sniffer configuration example
- 619 Network requirements
- 620 Configuring Capture_AP
- 621 Configuring and enabling wireless sniffer
- 622 Verifying the configuration
- 622 Band navigation configuration example
- 622 Network requirements
- 623 Configuring the AC
- 624 Verifying the configuration
- 625 Configuring stateful failover
- 625 Overview
- 625 Introduction to stateful failover
- 626 Introduction to stateful failover states
- 626 Configuring stateful failover
- 627 Stateful failover configuration example
- 627 Network requirements
- 628 Configuring AC 1
- 635 Configuring AC 2.
- 635 Configuration guidelines
- 637 Index