c3510E WEB控制台无法显示客户端IP地址,显示0.0.0.0
<WHH_XS_WX_C3510E>dis cur
#
version 5.20, Release 3709P61
#
sysname WHH_XS_WX_C3510E
#
clock timezone Beijing add 08:00:00
#
domain default enable system
#
telnet server enable
#
port-security enable
#
dot1x authentication-method eap
#
portal server whh ip 192.200.37.19 url http://192.200.37.19/portal/logon.htm server-type imc
portal free-rule 1 source interface GigabitEthernet1/0/1 destination any
portal free-rule 2 source ip any destination ip 61.153.6.58 mask 255.255.255.255
portal free-rule 3 source ip 61.153.6.58 mask 255.255.255.255 destination ip any
portal free-rule 4 source ip any destination ip 192.200.10.8 mask 255.255.255.255
portal free-rule 5 source ip 192.200.10.8 mask 255.255.255.255 destination ip any
portal local-server http
#
password-recovery enable
#
vlan 1
#
vlan 88
#
radius scheme system
primary authentication 192.200.10.8
primary accounting 192.200.10.8
key authentication cipher $c$3$nYcyd8k2vXIFc9NyzUqmuskiQcyRJffZc+8J9aI=
key accounting cipher $c$3$DSy1PFAC6IBLV4jLxWW3m79/yoNbGtJAjsQ1uSg=
user-name-format without-domain
nas-ip 192.200.37.19
radius scheme imc
#
domain 802.1x
access-limit disable
state active
idle-cut disable
self-service-url disable
domain system
authentication lan-access radius-scheme system
authorization lan-access radius-scheme system
accounting lan-access radius-scheme system
authentication portal radius-scheme system
authorization portal radius-scheme system
accounting portal radius-scheme system
access-limit disable
state active
idle-cut disable
self-service-url disable
#
user-group system
group-attribute allow-guest
#
local-user admin
password cipher $c$3$5bHyuuXF3Sch8R01GK0y684VbjhsjtAlfqpnITU=
authorization-attribute level 3
service-type ssh telnet terminal
service-type portal
service-type web
local-user h3c
password cipher $c$3$dnKSSZqpSpDwUkCtcyWRpWqvxqC6zQ==
service-type portal
local-user xh
password cipher $c$3$teSvJJLjhTmR+GDd/1TmRH0mVKZZk3KMnt46rUA=
service-type telnet terminal
service-type web
#
wlan rrm
dot11a mandatory-rate 6 12 24
dot11a supported-rate 9 18 36 48 54
dot11b mandatory-rate 1 2
dot11b supported-rate 5.5 11
dot11g mandatory-rate 1 2 5.5 11
dot11g supported-rate 6 9 12 18 24 36 48 54
#
wlan service-template 1 crypto
ssid itcitc_QS
bind WLAN-ESS 0
cipher-suite tkip
security-ie rsn
#
wlan service-template 2 clear
ssid itcitc_qiaosi
bind WLAN-ESS 1
service-template enable
#
wlan service-template 3 crypto
ssid itcitc_802.1X
bind WLAN-ESS 3
cipher-suite ccmp
security-ie rsn
service-template enable
#
wlan ap-group default_group
ap itc_1
ap itc_2
ap itc_3
ap itc_4
ap itc_5
ap itc_6
ap itc_7
dot11a radio enable
dot11bg radio enable
#
interface NULL0
#
interface Vlan-interface1
ip address 192.200.37.19 255.255.254.0
portal server whh method direct
#
interface Vlan-interface88
description AP_MGT
ip address 172.18.1.10 255.255.255.0
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk permit vlan 1 88
#
interface GigabitEthernet1/0/2
#
interface GigabitEthernet1/0/3
#
interface GigabitEthernet1/0/4
#
interface Ten-GigabitEthernet1/0/5
#
interface WLAN-ESS0
port-security port-mode psk
port-security tx-key-type 11key
port-security preshared-key pass-phrase cipher $c$3$dorxF2jV5SLr6na3PDj3+FdXM81kxM0OmwCxF2c=
#
interface WLAN-ESS1
port link-type hybrid
port hybrid vlan 1 untagged
#
interface WLAN-ESS3
port-security port-mode userlogin-secure-ext
port-security tx-key-type 11key
#
wlan ap itc_1 model WA2620i-AGN id 1
serial-id 219801A0CMC13B001375
radio 1
radio enable
radio 2
service-template 1
service-template 2
service-template 3
radio enable
#
wlan ap itc_2 model WA2620i-AGN id 2
serial-id 219801A0CMC13B001367
radio 1
radio enable
radio 2
service-template 1
service-template 2
service-template 3
radio enable
#
wlan ap itc_3 model WA2620i-AGN id 3
serial-id 219801A0CMC13B001368
radio 1
radio enable
radio 2
service-template 1
service-template 2
service-template 3
radio enable
#
wlan ap itc_4 model WA2620i-AGN id 4
serial-id 219801A0CMC13B001397
radio 1
radio enable
radio 2
service-template 1
service-template 2
service-template 3
radio enable
#
wlan ap itc_5 model WA2620i-AGN id 5
serial-id 219801A0CMC13B001392
radio 1
radio enable
radio 2
service-template 1
service-template 2
service-template 3
radio enable
#
wlan ap itc_6 model WA2620i-AGN id 6
serial-id 219801A0CMC13B001005
radio 1
radio enable
radio 2
service-template 1
service-template 2
service-template 3
radio enable
#
wlan ap itc_7 model WA2620i-AGN id 7
serial-id 219801A0CMC13B001383
radio 1
radio enable
radio 2
service-template 1
service-template 2
service-template 3
radio enable
#
wlan ips
malformed-detect-policy default
signature deauth_flood signature-id 1
signature broadcast_deauth_flood signature-id 2
signature disassoc_flood signature-id 3
signature broadcast_disassoc_flood signature-id 4
signature eapol_logoff_flood signature-id 5
signature eap_success_flood signature-id 6
signature eap_failure_flood signature-id 7
signature pspoll_flood signature-id 8
signature cts_flood signature-id 9
signature rts_flood signature-id 10
signature addba_req_flood signature-id 11
signature-policy default
countermeasure-policy default
attack-detect-policy default
virtual-security-domain default
attack-detect-policy default
malformed-detect-policy default
signature-policy default
countermeasure-policy default
#
ip route-static 0.0.0.0 0.0.0.0 192.200.37.2
#
undo info-center logfile enable
#
user-interface con 0
user-interface vty 0 4
authentication-mode scheme
user privilege level 3
set authentication password cipher $c$3$n2klKvgoY78uUw3+0j0ZcYxX/P8WYsaomkcJvoU=
#
return
<WHH_XS_WX_C3510E>
(0)
最佳答案
如果是集中转发,由于客户端的arp报文和dhcp报文经过了ac,所以在ac上开启arp-snooping enable和dhcp-snooping (注意配置trust端口)就可以获取到客户端ip。如果是本地转发,则需要在ac上开启wlan client learn-ipaddr enable 则也会获取到ip。
(0)
怎么判断是本地转发还是集中转发啊?
按你说的做还是不行啊
看你的配置应该是集中转发,那把三条命令都配置上。然后display wlan client 看看会不会显示终端的ip地址,看你说的和我说的是不是一个意思。
wlan client learn-ipaddr enable敲这个命令解决了!!!!!!!!!!!!!
arp-snooping enable 开启试试呢
(0)
还是不行
还是不行
Username:admin
Password:
<WHH_XS_WX_C3510E>dis cur
#
version 5.20, Release 3709P61
#
sysname WHH_XS_WX_C3510E
#
clock timezone Beijing add 08:00:00
#
domain default enable system
#
telnet server enable
#
port-security enable
#
dot1x authentication-method eap
#
portal server whh ip 192.200.37.19 url http://192.200.37.19/portal/logon.htm server-type imc
portal free-rule 1 source interface GigabitEthernet1/0/1 destination any
portal free-rule 2 source ip any destination ip 61.153.6.58 mask 255.255.255.255
portal free-rule 3 source ip 61.153.6.58 mask 255.255.255.255 destination ip any
portal free-rule 4 source ip any destination ip 192.200.10.8 mask 255.255.255.255
portal free-rule 5 source ip 192.200.10.8 mask 255.255.255.255 destination ip any
portal local-server http
#
password-recovery enable
#
vlan 1
#
vlan 88
#
radius scheme system
primary authentication 192.200.10.8
primary accounting 192.200.10.8
key authentication cipher $c$3$nYcyd8k2vXIFc9NyzUqmuskiQcyRJffZc+8J9aI=
key accounting cipher $c$3$DSy1PFAC6IBLV4jLxWW3m79/yoNbGtJAjsQ1uSg=
user-name-format without-domain
nas-ip 192.200.37.19
radius scheme imc
#
domain 802.1x
access-limit disable
state active
idle-cut disable
self-service-url disable
domain system
authentication lan-access radius-scheme system
authorization lan-access radius-scheme system
accounting lan-access radius-scheme system
authentication portal radius-scheme system
authorization portal radius-scheme system
accounting portal radius-scheme system
access-limit disable
state active
idle-cut disable
self-service-url disable
#
user-group system
group-attribute allow-guest
#
local-user admin
password cipher $c$3$5bHyuuXF3Sch8R01GK0y684VbjhsjtAlfqpnITU=
authorization-attribute level 3
service-type ssh telnet terminal
service-type portal
service-type web
local-user h3c
password cipher $c$3$dnKSSZqpSpDwUkCtcyWRpWqvxqC6zQ==
service-type portal
local-user xh
password cipher $c$3$teSvJJLjhTmR+GDd/1TmRH0mVKZZk3KMnt46rUA=
service-type telnet terminal
service-type web
#
wlan rrm
dot11a mandatory-rate 6 12 24
dot11a supported-rate 9 18 36 48 54
dot11b mandatory-rate 1 2
dot11b supported-rate 5.5 11
dot11g mandatory-rate 1 2 5.5 11
dot11g supported-rate 6 9 12 18 24 36 48 54
#
wlan service-template 1 crypto
ssid itcitc_QS
bind WLAN-ESS 0
cipher-suite tkip
security-ie rsn
#
wlan service-template 2 clear
ssid itcitc_qiaosi
bind WLAN-ESS 1
service-template enable
#
wlan service-template 3 crypto
ssid itcitc_802.1X
bind WLAN-ESS 3
cipher-suite ccmp
security-ie rsn
service-template enable
#
wlan ap-group default_group
ap itc_1
ap itc_2
ap itc_3
ap itc_4
ap itc_5
ap itc_6
ap itc_7
dot11a radio enable
dot11bg radio enable
#
interface NULL0
#
interface Vlan-interface1
ip address 192.200.37.19 255.255.254.0
portal server whh method direct
#
interface Vlan-interface88
description AP_MGT
ip address 172.18.1.10 255.255.255.0
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk permit vlan 1 88
dhcp-snooping trust
#
interface GigabitEthernet1/0/2
#
interface GigabitEthernet1/0/3
#
interface GigabitEthernet1/0/4
#
interface Ten-GigabitEthernet1/0/5
#
interface WLAN-ESS0
dhcp-snooping trust
port-security port-mode psk
port-security tx-key-type 11key
port-security preshared-key pass-phrase cipher $c$3$dorxF2jV5SLr6na3PDj3+FdXM81kxM0OmwCxF2c=
#
interface WLAN-ESS1
port link-type hybrid
port hybrid vlan 1 untagged
dhcp-snooping trust
#
interface WLAN-ESS3
dhcp-snooping trust
port-security port-mode userlogin-secure-ext
port-security tx-key-type 11key
#
wlan ap itc_1 model WA2620i-AGN id 1
serial-id 219801A0CMC13B001375
radio 1
radio enable
radio 2
service-template 1
service-template 2
service-template 3
radio enable
#
wlan ap itc_2 model WA2620i-AGN id 2
serial-id 219801A0CMC13B001367
radio 1
radio enable
radio 2
service-template 1
service-template 2
service-template 3
radio enable
#
wlan ap itc_3 model WA2620i-AGN id 3
serial-id 219801A0CMC13B001368
radio 1
radio enable
radio 2
service-template 1
service-template 2
service-template 3
radio enable
#
wlan ap itc_4 model WA2620i-AGN id 4
serial-id 219801A0CMC13B001397
radio 1
radio enable
radio 2
service-template 1
service-template 2
service-template 3
radio enable
#
wlan ap itc_5 model WA2620i-AGN id 5
serial-id 219801A0CMC13B001392
radio 1
radio enable
radio 2
service-template 1
service-template 2
service-template 3
radio enable
#
wlan ap itc_6 model WA2620i-AGN id 6
serial-id 219801A0CMC13B001005
radio 1
radio enable
radio 2
service-template 1
service-template 2
service-template 3
radio enable
#
wlan ap itc_7 model WA2620i-AGN id 7
serial-id 219801A0CMC13B001383
radio 1
radio enable
radio 2
service-template 1
service-template 2
service-template 3
radio enable
#
wlan ips
malformed-detect-policy default
signature deauth_flood signature-id 1
signature broadcast_deauth_flood signature-id 2
signature disassoc_flood signature-id 3
signature broadcast_disassoc_flood signature-id 4
signature eapol_logoff_flood signature-id 5
signature eap_success_flood signature-id 6
signature eap_failure_flood signature-id 7
signature pspoll_flood signature-id 8
signature cts_flood signature-id 9
signature rts_flood signature-id 10
signature addba_req_flood signature-id 11
signature-policy default
countermeasure-policy default
attack-detect-policy default
virtual-security-domain default
attack-detect-policy default
malformed-detect-policy default
signature-policy default
countermeasure-policy default
#
dhcp-snooping
#
ip route-static 0.0.0.0 0.0.0.0 192.200.37.2
#
undo info-center logfile enable
#
arp-snooping enable
#
user-interface con 0
user-interface vty 0 4
authentication-mode scheme
user privilege level 3
set authentication password cipher $c$3$n2klKvgoY78uUw3+0j0ZcYxX/P8WYsaomkcJvoU=
#
return
<WHH_XS_WX_C3510E>
帮忙看看配置还有哪里有问题吗?谢谢!
(0)
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
wlan client learn-ipaddr enable敲这个命令解决了!!!!!!!!!!!!!