• 华为配置WLAN AC和AP之间VPN穿越示例


    配置WLAN AC和AP之间VPN穿越示例

    组网图形

    图1 配置WLAN AC和AP之间VPN穿越示例组网图
    • 业务需求
    • 组网需求
    • 数据规划
    • 配置思路
    • 配置注意事项
    • 操作步骤
    • 配置文件
    业务需求

    企业用户接入WLAN网络,以满足移动办公的最基本需求。且在覆盖区域内移动发生漫游时,不影响用户的业务使用。

    AP位于企业分部,AC位于企业总部,管理员希望所有AP均由AC统一管理,且希望对分支和总部之间相互访问的流量进行安全保护,因此在分支网关和总部网关之间建立一个IPSec隧道来实施安全保护。

    组网需求
    • AC组网方式:AC位于企业总部,AP位于企业分支,在AC和AP间配置IPSec隧道。
    • DHCP部署方式:Router_1作为DHCP服务器为STA和AP分配IP地址。
    • 业务数据转发方式:直接转发。
    数据规划
    表1 数据规划表

    配置项

    数据

    AC上WLAN无线业务数据规划

    AP管理VLAN

    VLAN200

    STA业务VLAN

    VLAN101

    DHCP服务器

    Router_1作为AP和STA的DHCP服务器

    AP地址池

    10.23.100.2~10.23.100.254/24

    STA地址池

    10.23.101.2~10.23.101.254/24

    AC源地址

    VLANIF200:10.23.200.1/24

    AP组

    • 名称:ap-group1

    • 引用模板:VAP模板wlan-net、域管理模板default

    域管理模板

    • 名称:default
    • 国家码:中国

    SSID模板

    • 名称:wlan-net

    • SSID名称:wlan-net

    安全模板

    • 名称:wlan-net

    • 安全策略:WPA-WPA2+PSK+AES

    • 密码:a1234567

    VAP模板

    • 名称:wlan-net

    • 转发模式:直接转发

    • 业务VLAN:VLAN 101

    • 引用模板:SSID模板wlan-net、安全模板wlan-net

    Router_2上IPSec数据规划

    IKE参数

    • IKE版本:v1
    • 协商模式:主模式
    • 对端地址:192.168.1.1
    • 认证方式:预共享密钥
    • 预共享密钥:huawei@1234
    • 认证算法:SHA2-256
    • 加密算法:AES-128
    • DH组编号:group14

    IPSec参数

    • 安全协议:ESP
    • ESP协商模式:主模式
    • ESP认证算法:SHA2-256
    • ESP加密算法:AES-128
    • 封装模式:隧道模式

    IPSec策略

    IPSec连接名称:map1
    • 接口名称:gigabitethernet 0/0/1
    • 组网模式:分支站点
    • 连接编号:10
    • ACL编号:3101
    配置思路
    1. 配置AP、AC和周边网络设备之间实现网络互通。
    2. 配置IPSec用于建立IPSec隧道。
      1. 配置接口的IP地址和到对端的静态路由,保证两端路由可达。

      2. 配置ACL,以定义需要IPSec保护的数据流。

      3. 配置IPSec安全提议,定义IPSec的保护方法。

      4. 配置IKE对等体,定义对等体间IKE协商时的属性。

      5. 配置安全策略,并引用ACL、IPSec安全提议和IKE对等体,确定对何种数据流采取何种保护方法。

      6. 在接口上应用安全策略组,使接口具有IPSec的保护功能。

    3. 配置AP上线。
      1. 创建AP组,用于将需要进行相同配置的AP都加入到AP组,实现统一配置。
      2. 配置AC的系统参数,包括国家码、AC与AP之间通信的源接口。
      3. 配置AP上线的认证方式并离线导入AP,实现AP正常上线。
    4. 配置WLAN业务参数,实现STA访问WLAN网络功能。
    配置注意事项
    • 纯组播报文由于协议要求在无线空口没有ACK机制保障,且无线空口链路不稳定,为了纯组播报文能够稳定发送,通常会以低速报文形式发送。如果网络侧有大量异常组播流量涌入,则会造成无线空口拥堵。为了减小大量低速组播报文对无线网络造成的冲击,建议配置组播报文抑制功能。配置前请确认是否有组播业务,如果有,请谨慎配置限速值。
      • 业务数据转发方式采用直接转发时,建议在直连AP的交换机接口上配置组播报文抑制。
      • 业务数据转发方式采用隧道转发时,建议在AC的流量模板下配置组播报文抑制。
    • 建议在与AP直连的设备接口上配置端口隔离,如果不配置端口隔离,尤其是业务数据转发方式采用直接转发时,可能会在VLAN内形成大量不必要的广播报文,导致网络阻塞,影响用户体验。

    • 隧道转发模式下,管理VLAN和业务VLAN不能配置为同一VLAN,且AP和AC之间只能放通管理VLAN,不能放通业务VLAN。

    • V200R021C00版本开始,配置CAPWAP源接口或源地址时,会检查和安全相关的配置是否已存在,包括DTLS加密的PSK、AC间DTLS加密的PSK、登录AP的用户名和密码、全局离线管理VAP的登录密码,均已存在才能成功配置,否则会提示用户先完成相关的配置。
    • V200R021C00版本开始,AC默认开启CAPWAP控制隧道的DTLS加密功能。开启该功能,添加AP时AP会上线失败,此时需要先开启CAPWAP DTLS不认证方式(capwap dtls no-auth enable)让AP上线,以便AP获取安全凭证,AP上线后应及时关闭该功能(undo capwap dtls no-auth enable),避免未授权AP上线。
    操作步骤
    1. 配置周边设备

      # 配置Switch的GE0/0/1、GE0/0/2加入VLAN100、VLAN101,GE0/0/1的缺省VLAN为VLAN100。
      1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd"><HUAWEI> <strong id="ZH-CN_TASK_0176912374__b214275661190921">system-viewstrong>
      2. [HUAWEI] <strong id="ZH-CN_TASK_0176912374__b1865000890190921">sysname Switchstrong>
      3. [Switch] <strong id="ZH-CN_TASK_0176912374__b821356064190921">vlan batch 100 101strong>
      4. [Switch] <strong id="ZH-CN_TASK_0176912374__b806518261190921">interface gigabitethernet 0/0/1strong>
      5. [Switch-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912374__b985873023190921">port link-type trunkstrong>
      6. [Switch-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912374__b402237438190921">port trunk pvid vlan 100strong>
      7. [Switch-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912374__b2016261018190921">port trunk allow-pass vlan 100 101strong>
      8. [Switch-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912374__b290287582190921">port-isolate enablestrong>
      9. [Switch-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912374__b1989272359190921">quitstrong>
      10. [Switch] <strong id="ZH-CN_TASK_0176912374__b1623215900190921">interface gigabitethernet 0/0/2strong>
      11. [Switch-GigabitEthernet0/0/2] <strong id="ZH-CN_TASK_0176912374__b239660969190921">port link-type trunkstrong>
      12. [Switch-GigabitEthernet0/0/2] <strong id="ZH-CN_TASK_0176912374__b1500702096190921">port trunk allow-pass vlan 100 101strong>
      13. [Switch-GigabitEthernet0/0/2] <strong id="ZH-CN_TASK_0176912374__b1646779978190921">quitstrong>span>span>span>
      # 配置Router_1的GE1/0/0加入VLAN100和VLAN101,假设接口GE0/0/1对端的Internet IP地址为192.168.1.2/24,在接口GE0/0/1上配置IP地址192.168.1.1/24。
      1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd"><Huawei> <strong id="ZH-CN_TASK_0176912374__b1318968140190921">system-viewstrong>
      2. [Huawei] <strong id="ZH-CN_TASK_0176912374__b836839358190921">sysname Router_1strong>
      3. [Router_1] <strong id="ZH-CN_TASK_0176912374__b1561381150190921">vlan batch 100 101strong>
      4. [Router_1] <strong id="ZH-CN_TASK_0176912374__b1964950768190921">interface gigabitethernet 1/0/0strong>
      5. [Router_1-GigabitEthernet1/0/0] <strong id="ZH-CN_TASK_0176912374__b326456138190921">port link-type trunkstrong>
      6. [Router_1-GigabitEthernet1/0/0] <strong id="ZH-CN_TASK_0176912374__b721632309190921">port trunk allow-pass vlan 100 101strong>
      7. [Router_1-GigabitEthernet1/0/0] <strong id="ZH-CN_TASK_0176912374__b747948746190921">quitstrong>
      8. [Router_1] <strong id="ZH-CN_TASK_0176912374__b443887167190921">interface gigabitethernet 0/0/1strong>
      9. [Router_1-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912374__b1802330456190921">ip address 192.168.1.1 255.255.255.0strong>
      10. [Router_1-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912374__b1949488140190921">quitstrong>span>span>span>
      # 配置Router_1上的缺省路由,下一跳地址为192.168.1.2。
      [Router_1] ip route-static 0.0.0.0 0.0.0.0 192.168.1.2
      # 配置Router_2的GE1/0/0加入VLAN200,并创建VLANIF200接口地址为10.23.200.2/24,假设接口GE0/0/1对端的Internet IP地址为192.168.2.2/24,在接口GE0/0/1上配置IP地址192.168.2.1/24。
      1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd"><Huawei> <strong id="ZH-CN_TASK_0176912374__b916736472190921">system-viewstrong>
      2. [Huawei] <strong id="ZH-CN_TASK_0176912374__b630282277190921">sysname Router_2strong>
      3. [Router_2] <strong id="ZH-CN_TASK_0176912374__b2118286847190921">vlan batch 200strong>
      4. [Router_2] <strong id="ZH-CN_TASK_0176912374__b1135881526190921">interface gigabitethernet 1/0/0strong>
      5. [Router_2-GigabitEthernet1/0/0] <strong id="ZH-CN_TASK_0176912374__b920445876190921">port link-type trunkstrong>
      6. [Router_2-GigabitEthernet1/0/0] <strong id="ZH-CN_TASK_0176912374__b1499093054190921">port trunk allow-pass vlan 200strong>
      7. [Router_2-GigabitEthernet1/0/0] <strong id="ZH-CN_TASK_0176912374__b146042512190921">quitstrong>
      8. [Router_2] <strong id="ZH-CN_TASK_0176912374__b717113523190921">interface gigabitethernet 0/0/1strong>
      9. [Router_2-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912374__b1281683461190921">ip address 192.168.2.1 255.255.255.0strong>
      10. [Router_2-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912374__b1075782585190921">quitstrong>
      11. [Router_2] <strong id="ZH-CN_TASK_0176912374__b1612181943190921">interface vlanif 200strong>
      12. [Router_2-Vlanif200] <strong id="ZH-CN_TASK_0176912374__b1025487207190921">ip address 10.23.200.2 24strong>
      13. [Router_2-Vlanif200] <strong id="ZH-CN_TASK_0176912374__b970919734190921">quitstrong>span>span>span>
      # 配置Router_2到AP侧的静态路由,下一跳地址为192.168.2.2。
      1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[Router_2] <strong id="ZH-CN_TASK_0176912374__b2032648930190921">ip route-static 10.23.100.0 255.255.255.0 192.168.2.2strong>
      2. [Router_2] <strong id="ZH-CN_TASK_0176912374__b1421719087190921">ip route-static192.168.1.0 255.255.255.0 192.168.2.2
      3. strong>span>span>
    2. 配置AC与其它网络设备互通

      # 配置AC的接口GE0/0/1加入VLAN200,创建接口VLANIF200并配置IP地址10.23.200.1/24。
      1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd"><AC> <strong>system-viewstrong>
      2. [AC] <strong>sysname ACstrong>
      3. [AC] <strong>vlan batch 101 200strong>
      4. [AC] <strong>interface gigabitethernet 0/0/1strong>
      5. [AC-GigabitEthernet0/0/1] <strong>port link-type trunkstrong>
      6. [AC-GigabitEthernet0/0/1] <strong>port trunk allow-pass vlan 200strong>
      7. [AC-GigabitEthernet0/0/1] <strong>quitstrong>
      8. [AC] <strong>interface vlanif 200strong>
      9. [AC-Vlanif200] <strong>ip address 10.23.200.1 24strong>
      10. [AC-Vlanif200] <strong>quitstrong>span>span>span>
      # 配置AC到AP侧的静态路由,下一跳地址为10.23.200.2。
      "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[AC] <strong>ip route-static 10.23.100.0 255.255.255.0 10.23.200.2strong>span>span>
    3. 配置DHCP服务器为STA和AP分配IP地址

      # 在Router_1上配置DHCP服务器,为AP和STA分配IP地址。
      1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[Router_1] <strong id="ZH-CN_TASK_0176912374__b278967097190921">dhcp enablestrong>
      2. [Router_1] <strong id="ZH-CN_TASK_0176912374__b452041200190921">interface vlanif 100strong>
      3. [Router_1-Vlanif100] <strong id="ZH-CN_TASK_0176912374__b1227135408190921">ip address 10.23.100.1 255.255.255.0strong>
      4. [Router_1-Vlanif100] <strong id="ZH-CN_TASK_0176912374__b727510669190921">dhcp select globalstrong>
      5. [Router_1-Vlanif100] <strong id="ZH-CN_TASK_0176912374__b966516186190921">quitstrong>
      6. [Router_1] <strong id="ZH-CN_TASK_0176912374__b277550800190921">ip pool apstrong>
      7. [Router_1-ip-pool-ap] <strong id="ZH-CN_TASK_0176912374__b1416242333190921">gateway-list 10.23.100.1strong>
      8. [Router_1-ip-pool-ap] <strong id="ZH-CN_TASK_0176912374__b714490441190921">network 10.23.100.0 mask 24strong>
      9. [Router_1-ip-pool-ap] <strong id="ZH-CN_TASK_0176912374__b1883507180190921">option 43 sub-option 3 ascii 10.23.200.1strong>
      10. [Router_1-ip-pool-ap] <strong id="ZH-CN_TASK_0176912374__b1289689437190921">quitstrong>
      11. [Router_1] <strong id="ZH-CN_TASK_0176912374__b1236770207190921">interface vlanif 101strong>
      12. [Router_1-Vlanif101] <strong id="ZH-CN_TASK_0176912374__b1592258061190921">ip address 10.23.101.1 255.255.255.0strong>
      13. [Router_1-Vlanif101] <strong id="ZH-CN_TASK_0176912374__b428517198190921">dhcp select interfacestrong>
      14. [Router_1-Vlanif101] <strong id="ZH-CN_TASK_0176912374__b989781329190921">quitstrong>span>span>
      DNS服务器地址请根据实际需要配置。常用配置方法如下:
      • 接口地址池场景,需要在VLANIF接口视图下执行命令dhcp server dns-list ip-address &<1-8>。
      • 全局地址池场景,需要在IP地址池视图下执行命令dns-list ip-address &<1-8>。
    4. 配置ACL,定义需要IPSec隧道保护的数据流

      # 在Router_2上配置ACL,定义由总部AC(10.23.200.0/24)去分支AP(10.23.100.0/24)的数据流。
      1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[Router_2] <strong id="ZH-CN_TASK_0176912374__b397033507190921">acl number 3101strong>
      2. [Router_2-acl-adv-3101] <strong id="ZH-CN_TASK_0176912374__b2102298401190921">rule permit ip source 10.23.200.0 0.0.0.255 destination 10.23.100.0 0.0.0.255strong>
      3. [Router_2-acl-adv-3101] <strong id="ZH-CN_TASK_0176912374__b1369467853190921">quitstrong>span>span>
      # 在Router_1上配置ACL,定义由分支AP(10.23.100.0/24)去总部AC(10.23.200.0/24)的数据流。
      1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[Router_1] <strong id="ZH-CN_TASK_0176912374__b1708015814190921">acl number 3101strong>
      2. [Router_1-acl-adv-3101] <strong id="ZH-CN_TASK_0176912374__b969979589190921">rule permit ip source 10.23.100.0 0.0.0.255 destination 10.23.200.0 0.0.0.255strong>
      3. [Router_1-acl-adv-3101] <strong id="ZH-CN_TASK_0176912374__b1866057864190921">quitstrong>span>span>
    5. 配置IPSec
      1. 分别在Router_2和Router_1上创建IPSec安全提议

        # 在Router_2上配置IPSec安全提议。
        1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[Router_2] <strong id="ZH-CN_TASK_0176912374__b583791630190921">ipsec proposal tran1strong>
        2. [Router_2-ipsec-proposal-tran1] <strong id="ZH-CN_TASK_0176912374__b1462250876190921">esp authentication-algorithm sha2-256strong>
        3. [Router_2-ipsec-proposal-tran1] <strong id="ZH-CN_TASK_0176912374__b622661980190921">esp encryption-algorithm aes-128strong>
        4. [Router_2-ipsec-proposal-tran1] <strong id="ZH-CN_TASK_0176912374__b35427758190921">quitstrong>span>span>
        # 在Router_1上配置IPSec安全提议。
        1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[Router_1] <strong id="ZH-CN_TASK_0176912374__b139819425190921">ipsec proposal tran1strong>
        2. [Router_1-ipsec-proposal-tran1] <strong id="ZH-CN_TASK_0176912374__b1452234278190921">esp authentication-algorithm sha2-256strong>
        3. [Router_1-ipsec-proposal-tran1] <strong id="ZH-CN_TASK_0176912374__b1140016291190921">esp encryption-algorithm aes-128strong>
        4. [Router_1-ipsec-proposal-tran1] <strong id="ZH-CN_TASK_0176912374__b1865393971190921">quitstrong>span>span>
      2. 分别在Router_2和Router_1上配置IKE对等体

        # 在Router_2上配置IKE安全提议。
        1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[Router_2] <strong id="ZH-CN_TASK_0176912374__b1606178070190921">ike proposal 5strong>
        2. [Router_2-ike-proposal-5] <strong id="ZH-CN_TASK_0176912374__b182421504190921">authentication-algorithm sha2-256 strong>
        3. [Router_2-ike-proposal-5] <strong id="ZH-CN_TASK_0176912374__b655460419190921">encryption-algorithm aes-128strong>
        4. [Router_2-ike-proposal-5] <strong id="ZH-CN_TASK_0176912374__b181648080190921">dh group14strong>
        5. [Router_2-ike-proposal-5] <strong id="ZH-CN_TASK_0176912374__b31158208190921">quitstrong>span>span>
        # 在Router_2上配置IKE对等体,并根据默认配置,配置预共享密钥和对端ID。
        1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[Router_2] <strong id="ZH-CN_TASK_0176912374__b1870718951190921">ike peer spubstrong>
        2. [Router_2-ike-peer-spub] <strong id="ZH-CN_TASK_0176912374__b1517647258190921">undo version 2 strong>
        3. [Router_2-ike-peer-spub] <strong id="ZH-CN_TASK_0176912374__b772017619190921">ike-proposal 5strong>
        4. [Router_2-ike-peer-spub] <strong id="ZH-CN_TASK_0176912374__b1599311400190921">pre-shared-key cipher huawei@1234strong>
        5. [Router_2-ike-peer-spub] <strong id="ZH-CN_TASK_0176912374__b1475728565190921">remote-address 192.168.1.1strong>
        6. [Router_2-ike-peer-spub] <strong id="ZH-CN_TASK_0176912374__b1780777266190921">quitstrong>span>span>
        # 在Router_1上配置IKE安全提议。
        1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[Router_1] <strong id="ZH-CN_TASK_0176912374__b418590325190921">ike proposal 5strong>
        2. [Router_1-ike-proposal-5] <strong id="ZH-CN_TASK_0176912374__b836119906190921">authentication-algorithm sha2-256 strong>
        3. [Router_1-ike-proposal-5] <strong id="ZH-CN_TASK_0176912374__b2076210588190921">encryption-algorithm aes-128strong>
        4. [Router_1-ike-proposal-5] <strong id="ZH-CN_TASK_0176912374__b623799734190921">dh group14strong>
        5. [Router_1-ike-proposal-5] <strong id="ZH-CN_TASK_0176912374__b2135127076190921">quitstrong>span>span>
        # 在Router_1上配置IKE对等体,并根据默认配置,配置预共享密钥和对端ID。
        1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[Router_1] <strong id="ZH-CN_TASK_0176912374__b575600183190921">ike peer spuastrong>
        2. [Router_1-ike-peer-spub] <strong id="ZH-CN_TASK_0176912374__b1570315392190921">undo version 2strong>
        3. [Router_1-ike-peer-spub] <strong id="ZH-CN_TASK_0176912374__b1546145067190921">ike-proposal 5strong>
        4. [Router_1-ike-peer-spua] <strong id="ZH-CN_TASK_0176912374__b1096926564190921">pre-shared-key cipher huawei@1234strong>
        5. [Router_1-ike-peer-spua] <strong id="ZH-CN_TASK_0176912374__b1751295969190921">remote-address 192.168.2.1strong>
        6. [Router_1-ike-peer-spua] <strong id="ZH-CN_TASK_0176912374__b1965179299190921">quitstrong>span>span>
      3. 分别在Router_2和Router_1上创建安全策略

        # 在Router_2上配置IKE动态协商方式安全策略。
        1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[Router_2] <strong id="ZH-CN_TASK_0176912374__b786818396190921">ipsec policy map1 10 isakmpstrong>
        2. [Router_2-ipsec-policy-isakmp-map1-10] <strong id="ZH-CN_TASK_0176912374__b1328345859190921">ike-peer spubstrong>
        3. [Router_2-ipsec-policy-isakmp-map1-10] <strong id="ZH-CN_TASK_0176912374__b1666733307190921">proposal tran1strong>
        4. [Router_2-ipsec-policy-isakmp-map1-10] <strong id="ZH-CN_TASK_0176912374__b964066032190921">security acl 3101strong>
        5. [Router_2-ipsec-policy-isakmp-map1-10] <strong id="ZH-CN_TASK_0176912374__b1560463008190921">quitstrong>span>span>
        # 在Router_1上配置IKE动态协商方式安全策略。
        1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[Router_1] <strong id="ZH-CN_TASK_0176912374__b1131217806190921">ipsec policy use1 10 isakmpstrong>
        2. [Router_1-ipsec-policy-isakmp-use1-10] <strong id="ZH-CN_TASK_0176912374__b1665134320190921">ike-peer spuastrong>
        3. [Router_1-ipsec-policy-isakmp-use1-10] <strong id="ZH-CN_TASK_0176912374__b776546322190921">proposal tran1strong>
        4. [Router_1-ipsec-policy-isakmp-use1-10] <strong id="ZH-CN_TASK_0176912374__b1791383655190921">security acl 3101strong>
        5. [Router_1-ipsec-policy-isakmp-use1-10] <strong id="ZH-CN_TASK_0176912374__b1742019934190921">quitstrong>span>span>
      4. 分别在Router_2和Router_1的接口上应用各自的安全策略组,使接口具有IPSec的保护功能

        # 在Router_2的接口上引用安全策略组。
        1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[Router_2] <strong id="ZH-CN_TASK_0176912374__b839559069190921">interface gigabitethernet 0/0/1strong>
        2. [Router_2-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912374__b1789942937190921">ipsec policy map1strong>
        3. [Router_2-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912374__b1337042778190921">quitstrong>span>span>
        # 在Router_1的接口上引用安全策略组。
        1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[Router_1] <strong id="ZH-CN_TASK_0176912374__b758835624190921">interface gigabitethernet 0/0/1strong>
        2. [Router_1-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912374__b355599860190921">ipsec policy use1strong>
        3. [Router_1-GigabitEthernet0/0/1] <strong id="ZH-CN_TASK_0176912374__b1691806318190921">quitstrong>span>span>
    6. 配置AP上线

      # 创建AP组,用于将相同配置的AP都加入同一AP组中。
      1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[AC] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b1451837292190921">wlanstrong>
      2. [AC-wlan-view] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b1710308668190921">ap-group name ap-group1strong>
      3. [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b294415960190921">quitstrong>span>span>
      # 创建域管理模板,在域管理模板下配置AC的国家码并在AP组下引用域管理模板。
      1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b1815954045190921">regulatory-domain-profile name defaultstrong>
      2. [AC-wlan-regulate-domain-default] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b1765454957190921">country-code cnstrong>
      3. [AC-wlan-regulate-domain-default] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b464951690190921">quitstrong>
      4. [AC-wlan-view] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b1132959133190921">ap-group name ap-group1strong>
      5. [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b4510754102210">regulatory-domain-profile defaultstrong>
      6. Warning: Modifying the country code will clear channel, power and antenna gain configurations of the radio and reset the AP. Continue?[Y/N]:<strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_zh-cn_task_0175818418_b17491131153716">ystrong>
      7. [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b101836067190921">quitstrong>
      8. [AC-wlan-view] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b465166413190921">quitstrong>span>span>
      # 配置AC的源接口。
      "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[AC] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912370_b2076192014190921">capwap source interface vlanif 200strong>span>span>
      # 在AC上离线导入AP,并将AP加入AP组“ap-group1”中。假设AP的MAC地址为60de-4476-e360,并且根据AP的部署位置为AP配置名称,便于从名称上就能够了解AP的部署位置。例如MAC地址为60de-4476-e360的AP部署在1号区域,命名此AP为area_1。

      ap auth-mode命令缺省情况下为MAC认证,如果之前没有修改其缺省配置,可以不用执行ap auth-mode mac-auth

      举例中使用的AP为AP5030DN,具有射频0和射频1两个射频。AP5030DN的射频0为2.4GHz射频,射频1为5GHz射频。

      1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[AC] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b763711121190921">wlanstrong>
      2. [AC-wlan-view] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b1389711844190921">ap auth-mode mac-authstrong>
      3. [AC-wlan-view] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b1382708357190921">ap-id 0 ap-mac 60de-4476-e360strong>
      4. [AC-wlan-ap-0] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b1272920990190921">ap-name area_1strong>
      5. Warning: This operation may cause AP reset. Continue? [Y/N]:<strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_zh-cn_task_0175818418_b460951517190906">ystrong>
      6. [AC-wlan-ap-0] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b614746147190921">ap-group ap-group1strong>
      7. Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power and antenna gain configuration s of the radio, Whether to continue? [Y/N]:<strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_zh-cn_task_0175818418_b1651706244190906">ystrong>
      8. [AC-wlan-ap-0] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b959850628190921">quitstrong>span>span>
      # 将AP上电后,当执行命令display ap all查看到AP的“State”字段为“nor”时,表示AP正常上线。
      1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b482061123190921">display ap allstrong>
      2. Total AP information:
      3. nor : normal [1]
      4. Extra information:
      5. P : insufficient power supply
      6. --------------------------------------------------------------------------------------------------
      7. ID MAC Name Group IP Type State STA Uptime ExtraInfo
      8. --------------------------------------------------------------------------------------------------
      9. 0 60de-4476-e360 area_1 ap-group1 10.23.100.254 AP5030DN nor 0 10S -
      10. --------------------------------------------------------------------------------------------------
      11. Total: 1span>span>
    7. 配置WLAN业务参数

      # 创建名为“wlan-net”的安全模板,并配置安全策略。

      举例中以配置WPA-WPA2+PSK+AES的安全策略为例,密码为“a1234567”,实际配置中请根据实际情况,配置符合实际要求的安全策略。

      1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b1991067776190921">security-profile name wlan-netstrong>
      2. [AC-wlan-sec-prof-wlan-net] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b851752672190921">security wpa-wpa2 psk pass-phrase a1234567 aesstrong>
      3. [AC-wlan-sec-prof-wlan-net] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b337241812190921">quitstrong>span>span>
      # 创建名为“wlan-net”的SSID模板,并配置SSID名称为“wlan-net”。
      1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b69022931190921">ssid-profile name wlan-netstrong>
      2. [AC-wlan-ssid-prof-wlan-net] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b36723145190921">ssid wlan-netstrong>
      3. [AC-wlan-ssid-prof-wlan-net] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b1738903244190921">quitstrong>span>span>
      # 创建名为“wlan-net”的VAP模板,配置业务数据转发模式、业务VLAN,并且引用安全模板和SSID模板。
      1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[AC-wlan-view] <strong>vap-profile name wlan-netstrong>
      2. [AC-wlan-net-prof-wlan-net] <strong><strong>forward-mode direct-forwardstrong>strong>
      3. [AC-wlan-net-prof-wlan-net] <strong><strong>service-vlan vlan-id 101strong>strong>
      4. [AC-wlan-net-prof-wlan-net] <strong>security-profile wlan-netstrong>
      5. [AC-wlan-net-prof-wlan-net] <strong>ssid-profile wlan-netstrong>
      6. [AC-wlan-net-prof-wlan-net] <strong>quitstrong>span>span>
      # 配置AP组引用VAP模板,AP上射频0和射频1都使用VAP模板“wlan-net”的配置。
      1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b2051092768190921">ap-group name ap-group1strong>
      2. [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b1753511747190921">vap-profile wlan-net wlan 1 radio 0strong>
      3. [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b1212706755190921">vap-profile wlan-net wlan 1 radio 1strong>
      4. [AC-wlan-ap-group-ap-group1] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b729861449190921">quitstrong>span>span>
    8. 配置AP射频的信道和功率

      射频的信道和功率自动调优功能默认开启,如果不关闭此功能则会导致手动配置不生效。举例中AP射频的信道和功率仅为示例,实际配置中请根据AP的国家码和网规结果进行配置。

      # 关闭AP射频0的信道和功率自动调优功能,并配置AP射频0的信道和功率。
      1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912356_b1423607009190921">ap-id 0strong>
      2. [AC-wlan-ap-0] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912356_b1534489953190921">radio 0strong>
      3. [AC-wlan-radio-0/0] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912356_b733594144190921">calibrate auto-channel-select disablestrong>
      4. [AC-wlan-radio-0/0] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912356_b1154293079190921">calibrate auto-txpower-select disablestrong>
      5. [AC-wlan-radio-0/0] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912356_b1858200296190921">channel 20mhz 6strong>
      6. Warning: This action may cause service interruption. Continue?[Y/N]<strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912356_zh-cn_task_0175818418_b1384307436190906">ystrong>
      7. [AC-wlan-radio-0/0] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912356_b554899294190921">eirp 127strong>
      8. [AC-wlan-radio-0/0] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912356_b1779547689190921">quitstrong>span>span>
      # 关闭AP射频1的信道和功率自动调优功能,并配置AP射频1的信道和功率。
      1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[AC-wlan-ap-0] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912356_b33229250190921">radio 1strong>
      2. [AC-wlan-radio-0/1] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912356_b327597144190921">calibrate auto-channel-select disablestrong>
      3. [AC-wlan-radio-0/1] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912356_b1164564697190921">calibrate auto-txpower-select disablestrong>
      4. [AC-wlan-radio-0/1] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912356_b201103780190921">channel 20mhz 149strong>
      5. Warning: This action may cause service interruption. Continue?[Y/N]<strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912356_zh-cn_task_0175818418_b1384307436190906_1">ystrong>
      6. [AC-wlan-radio-0/1] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912356_b652286665190921">eirp 127strong>
      7. [AC-wlan-radio-0/1] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912356_b1440636620190921">quitstrong>
      8. [AC-wlan-ap-0] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912356_b904227301190921">quitstrong>span>span>
    9. 检查配置结果

      WLAN业务配置会自动下发给AP,配置完成后,通过执行命令display vap ssid wlan-net查看如下信息,当“Status”项显示为“ON”时,表示AP对应的射频上的VAP已创建成功。

      1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b367333496190921">display vap ssid wlan-netstrong>
      2. WID : WLAN ID
      3. --------------------------------------------------------------------------------
      4. AP ID AP name RfID WID BSSID Status Auth type STA SSID
      5. --------------------------------------------------------------------------------
      6. 0 area_1 0 1 60DE-4476-E360 <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b1874482883190921">ONstrong> WPA/WPA2-PSK 0 wlan-net
      7. 0 area_1 1 1 60DE-4476-E370 <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b1628414885190921">ONstrong> WPA/WPA2-PSK 0 wlan-net
      8. -------------------------------------------------------------------------------
      9. Total: 2span>span>

      STA搜索到名为“wlan-net”的无线网络,输入密码“a1234567”并正常关联后,在AC上执行display station ssid wlan-net命令,可以查看到用户已经接入到无线网络“wlan-net”中。

      1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">[AC-wlan-view] <strong id="ZH-CN_TASK_0176912374__zh-cn_task_0176912351_b1120837202190921">display station ssid wlan-netstrong>
      2. Rf/WLAN: Radio ID/WLAN ID
      3. Rx/Tx: link receive rate/link transmit rate(Mbps)
      4. ---------------------------------------------------------------------------------
      5. STA MAC AP ID Ap name Rf/WLAN Band Type Rx/Tx RSSI VLAN IP address
      6. ---------------------------------------------------------------------------------
      7. e019-1dc7-1e08 0 area_1 1/1 5G 11n 46/59 -68 101 10.23.101.254
      8. ---------------------------------------------------------------------------------
      9. Total: 1 2.4G: 0 5G: 1span>span>

      # 配置成功后,在AC执行ping操作仍然可以ping通AP,它们之间的数据传输将被加密,执行命令display ipsec statistics可以查看数据包的统计信息。

      # 在Router_2上执行display ike sa操作,结果如下。
      1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd"><Router_2> <strong>display ike sastrong>
      2. Conn-ID Peer VPN Flag(s) Phase
      3. ---------------------------------------------------------
      4. 16 192.168.1.1 0 RD|ST v1:2
      5. 14 192.168.1.1 0 RD|ST v1:1
      6. Number of SA entries : 2
      7. Number of SA entries of all cpu : 2
      8. Flag Description:
      9. RD--READY ST--STAYALIVE RL--REPLACED FD--FADING TO--TIMEOUT
      10. HRT--HEARTBEAT LKG--LAST KNOWN GOOD SEQ NO. BCK--BACKED UP
      11. M--ACTIVE S--STANDBY A--ALONE NEG--NEGOTIATING span>span>span>
    配置文件
    • AC的配置文件

      1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">#
      2. sysname AC
      3. #
      4. vlan batch 101 200
      5. #
      6. interface Vlanif200
      7. ip address 10.23.200.1 255.255.255.0
      8. #
      9. interface GigabitEthernet0/0/1
      10. port link-type trunk
      11. port trunk allow-pass vlan 200
      12. #ip route-static 10.23.100.0 255.255.255.0 10.23.200.2
      13. #
      14. capwap source interface vlanif200
      15. #
      16. wlan
      17. security-profile name wlan-net
      18. security wpa-wpa2 psk pass-phrase %^%#m"tz0f>~7.[`^6RWdzwCy16hJj/Mc!,}s`X*B]}A%^%# aes
      19. ssid-profile name wlan-net
      20. ssid wlan-net
      21. vap-profile name wlan-net
      22. service-vlan vlan-id 101
      23. ssid-profile wlan-net
      24. security-profile wlan-net
      25. regulatory-domain-profile name default
      26. ap-group name ap-group1
      27. radio 0
      28. vap-profile wlan-net wlan 1
      29. radio 1
      30. vap-profile wlan-net wlan 1
      31. ap-id 0 type-id 35 ap-mac 60de-4476-e360 ap-sn 210235554710CB000042
      32. ap-name area_1
      33. ap-group ap-group1
      34. radio 0
      35. channel 20mhz 6
      36. eirp 127
      37. calibrate auto-channel-select disable
      38. calibrate auto-txpower-select disable
      39. radio 1
      40. channel 20mhz 149
      41. eirp 127
      42. calibrate auto-channel-select disable
      43. calibrate auto-txpower-select disable
      44. #
      45. returnspan>span>
    • Router_1的配置文件

      1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">#
      2. sysname Router_1
      3. #
      4. vlan batch 100 to 101
      5. #
      6. dhcp enable
      7. #
      8. acl number 3101
      9. rule 5 permit ip source 10.23.100.0 0.0.0.255 destination 10.23.200.0 0.0.0.255
      10. #
      11. ipsec proposal tran1
      12. esp authentication-algorithm sha2-256
      13. esp encryption-algorithm aes-128
      14. #
      15. ike proposal 5
      16. encryption-algorithm aes-128
      17. dh group14
      18. authentication-algorithm sha2-256
      19. authentication-method pre-share
      20. integrity-algorithm hmac-sha2-256
      21. prf hmac-sha2-256
      22. #
      23. ike peer spua
      24. undo version 2
      25. pre-shared-key cipher %@%@HCf#WZWU9A;yLoD#V$8G*i_/%@%@
      26. ike-proposal 5
      27. remote-address 192.168.2.1
      28. #
      29. ipsec policy use1 10 isakmp
      30. security acl 3101
      31. ike-peer spua
      32. proposal tran1
      33. #
      34. ip pool ap
      35. gateway-list 10.23.100.1
      36. network 10.23.100.0 mask 255.255.255.0
      37. option 43 sub-option 3 ascii 10.23.200.1
      38. #
      39. interface Vlanif100
      40. ip address 10.23.100.1 255.255.255.0
      41. dhcp select global
      42. #
      43. interface Vlanif101
      44. ip address 10.23.101.1 255.255.255.0
      45. dhcp select interface
      46. #
      47. interface GigabitEthernet0/0/1
      48. ip address 192.168.1.1 255.255.255.0
      49. ipsec policy use1
      50. #
      51. interface GigabitEthernet1/0/0
      52. port link-type trunk
      53. port trunk allow-pass vlan 100 to 101
      54. #
      55. ip route-static 0.0.0.0 0.0.0.0 192.168.1.2
      56. #
      57. returnspan>span>
    • Router_2的配置文件

      1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">#
      2. sysname Router_2
      3. #
      4. vlan batch 200
      5. #
      6. acl number 3101
      7. rule 5 permit ip source 10.23.200.0 0.0.0.255 destination 10.23.100.0 0.0.0.255
      8. #
      9. ipsec proposal tran1
      10. esp authentication-algorithm sha2-256
      11. esp encryption-algorithm aes-128
      12. #
      13. ike proposal 5
      14. encryption-algorithm aes-128
      15. dh group14
      16. authentication-algorithm sha2-256
      17. authentication-method pre-share
      18. integrity-algorithm hmac-sha2-256
      19. prf hmac-sha2-256
      20. #
      21. ike peer spub v1
      22. undo version 2
      23. pre-shared-key cipher %@%@HCf#WZWU9A;yLoD#V$8G*i_/%@%@
      24. ike-proposal 5
      25. remote-address 192.168.1.1
      26. #
      27. ipsec policy map1 10 isakmp
      28. security acl 3101
      29. ike-peer spub
      30. proposal tran1
      31. #
      32. interface Vlanif200
      33. ip address 10.23.200.2 255.255.255.0
      34. #
      35. interface GigabitEthernet0/0/1
      36. ip address 192.168.2.1 255.255.255.0
      37. ipsec policy map1
      38. #
      39. interface GigabitEthernet1/0/0
      40. port link-type trunk
      41. port trunk allow-pass vlan 200
      42. #
      43. ip route-static 10.23.100.0 255.255.255.0 192.168.2.2
      44. ip route-static 192.168.1.0 255.255.255.0 192.168.2.2
      45. #
      46. returnspan>span>
    • Switch的配置文件

      1. "color:#333333"><span style="background-color:#ffffff"><span style="background-color:#dddddd">#
      2. sysname Switch
      3. #
      4. vlan batch 100 to 101
      5. #
      6. interface GigabitEthernet0/0/1
      7. port link-type trunk
      8. port trunk pvid vlan 100
      9. port trunk allow-pass vlan 100 to 101
      10. port-isolate enable group 1
      11. #
      12. interface GigabitEthernet0/0/2
      13. port link-type trunk
      14. port trunk allow-pass vlan 100 to 101
      15. #
      16. returnspan>span>
  • 相关阅读:
    Win11怎么显示隐藏文件
    用户授权,glodalData.userInfo为undefined?
    Sentinel入门
    贼全! 一举通关的 Spring+SpringBoot+SpringCloud 全攻略, 是真香啊
    神经网络的发展历史
    pNA修饰肽:Z-FLE-pNA,Z-Phe-Leu-Glu-pNA,CAS号: 104634-10-8
    [附源码]java毕业设计心理测评系统
    “五彩大棚”蔬菜大棚-国稻种芯:创新植物光合功能各不同
    关与一个SpringBoot单体项目的优化-->瑞吉外卖优化
    Cy3.5菁染料标记海藻酸钠;CY3.5-Alginate;Alginate-Y3.5
  • 原文地址:https://blog.csdn.net/weixin_59383576/article/details/136247363