• 全部
  • 经验案例
  • 典型配置
  • 技术公告
  • FAQ
  • 漏洞说明
  • 全部
  • 全部
  • 大数据引擎
  • 知了引擎
产品线
搜索
取消
案例类型
发布者
是否解决
是否官方
时间
搜索引擎
匹配模式
高级搜索

WX2540E ssid 绑定自定义认证页面无效

2020-06-12提问
  • 0关注
  • 1收藏,1103浏览
粉丝:0人 关注:0人

问题描述:

WX2540E 无线控制器,自定义了一个 portal 页面,并按照官方文档直接压缩为zip 文件(压缩包中无目录,只有一个 logon.htm),并上传至设备,而且在根目录、portal 目录中都上传了,且同时复制为 defaultfile.zip 文件,存放于根目录。手机获取的 IP 地址与设置的 portal server IP 为同一个 VLAN、同一网段,在 interface vlan-interface 接口中指定了 portal server 方法为 direct ,也在 system-view 模式下进行了 ssid 的绑定portal local-server bind ssid CengWang file 0611.zip 然而,无论 file 指定为 defaultfile.zip 还是 0611.zip ,手机弹出的 portal 页面总是设备默认的,自定义的页面一直无效。。。

我将当前配置信息保存成 TXT 上传了,其中

WX2540E 的 GE 1/0/1 口接了 AP,VLAN10(192.168.10.0/24)为客户端获取 IP,VLAN 250(192.168.250.0/24)为 AP 管理 IP。

最佳答案

SMSAMA 八段
粉丝:15人 关注:8人

估计是你自定义的页面 有的地方还没改。。。看起来像没生效一样,一定要把所以图片都替换了

它这个版本的系统不支持替换原有的文件,而且也无法下载原有的认证模板,只能根据“自定义页面规范”去创建,文件内容、压缩、上传都是按照官方文档所说操作的,可就是不知为啥总不生效。。。

xiǎo軍軍 发表时间:2020-06-12
2 个回答
粉丝:40人 关注:3人

看下portal server的地址修改成自定义界面的ip地址

已确认此处配置无误 # portal server local_for_Vlan-interface10 ip 192.168.10.2 server-type imc portal free-rule 0 source ip any destination ip 192.168.250.0 mask 255.255.255.0 portal free-rule 1 source ip any destination ip 192.168.0.0 mask 255.255.0.0 portal free-rule 2 source ip any destination ip any tcp 53 portal free-rule 3 source ip any destination ip any udp 53 portal free-rule 4 source ip any destination ip any tcp 5223 portal free-rule 5 source ip any destination hostname captive.apple.com portal free-rule 6 source ip any destination hostname www.apple.com portal free-rule 10 source interface GigabitEthernet1/0/1 destination any portal wlan ssid CengWang server local_for_Vlan-interface10 redirect-url ***.*** portal local-server http portal local-server bind ssid CengWang file 0611.zip portal mac-trigger server ip 192.168.10.2 portal url-param include user-mac param-name wlanusermac portal url-param include nas-ip param-name wlanacip portal url-param include user-url portal url-param include ssid portal silent ios user-agent CaptiveNetworkSupport portal safe-redirect enable portal safe-redirect method get post portal safe-redirect user-agent Android portal safe-redirect user-agent CaptiveNetworkSupport portal safe-redirect user-agent MicroMessenger portal safe-redirect user-agent Mozilla portal safe-redirect user-agent WeChat portal safe-redirect user-agent iPhone portal safe-redirect user-agent micromessenger # # interface Vlan-interface10 ip address 192.168.10.2 255.255.255.0 portal server local_for_Vlan-interface10 method direct portal domain portal portal nas-ip 192.168.10.2 access-user detect type arp retransmit 3 interval 30 portal mac-trigger enable portal mac-trigger binding-retry 3 interval 3 portal url-param include ssid #

xiǎo軍軍 发表时间:2020-06-12
xiǎo軍軍 知了小白
粉丝:0人 关注:0人

配置信息

<H3C>dis cur
#
version 5.20, ESS 3703P68
#
sysname H3C
#
clock timezone Asia/Shanghai add 08:00:00
#
ftp server enable
#
radius nas-ip 192.168.10.2
radius log packet
#
domain default enable system
#
telnet server enable
#
port-security enable
#
portal server local_for_Vlan-interface10 ip 192.168.10.2 server-type imc
portal free-rule 0 source ip any destination ip 192.168.250.0 mask 255.255.255.0
portal free-rule 1 source ip any destination ip 192.168.0.0 mask 255.255.0.0
portal free-rule 2 source ip any destination ip any tcp 53
portal free-rule 3 source ip any destination ip any udp 53
portal free-rule 4 source ip any destination ip any tcp 5223
portal free-rule 5 source ip any destination hostname captive.apple.com
portal free-rule 6 source ip any destination hostname www.apple.com
portal free-rule 10 source interface GigabitEthernet1/0/1 destination any
portal wlan ssid CengWang server local_for_Vlan-interface10 redirect-url ***.***
portal local-server http
portal local-server bind ssid CengWang file 0611.zip
portal mac-trigger server ip 192.168.10.2
portal url-param include user-mac param-name wlanusermac
portal url-param include nas-ip param-name wlanacip
portal url-param include user-url
portal url-param include ssid
portal silent ios user-agent CaptiveNetworkSupport
portal safe-redirect enable
portal safe-redirect method get post
portal safe-redirect user-agent Android
portal safe-redirect user-agent CaptiveNetworkSupport
portal safe-redirect user-agent MicroMessenger
portal safe-redirect user-agent Mozilla
portal safe-redirect user-agent WeChat
portal safe-redirect user-agent iPhone
portal safe-redirect user-agent micromessenger
#
portal https-redirect server-policy 1
#
mac-address timer no-aging
#
wlan auto-ap enable
wlan auto-persistent enable
#
password-recovery enable
#
vlan 1
#
vlan 10
arp fast-reply enable
#
vlan 250
#
radius scheme portal
primary authentication 192.168.250.103 key cipher $c$3$ixTERmYIQ07f45vtI8xV0/RUsdniBYIJjoVpv5Ni
primary accounting 192.168.250.103 key cipher $c$3$7KZ9aod4tE4yOvfy9fglqc/YfckHE4kR+uyHmcjx
secondary authentication 172.30.9.232 key cipher $c$3$kFhwa3DJrokBW2TZbJ3VRjWYlw2EmqzcCQSGaQM8
secondary accounting 172.30.9.232 key cipher $c$3$K+P6RlMxFpBMWuUKOAH9rz+atIvcII292HQPy7tw
user-name-format without-domain
#
domain portal
authentication default radius-scheme portal
authorization default radius-scheme portal
accounting default radius-scheme portal
access-limit disable
state active
idle-cut disable
self-service-url disable
domain system
access-limit disable
state active
idle-cut disable
self-service-url disable
#
user-group system
group-attribute allow-guest
#
local-user admin
password cipher $c$3$pDAHjktz0v9UQhj2KtcLaeCcnTPivP82
authorization-attribute level 3
service-type telnet
service-type ftp
service-type web
#
wlan rrm
dot11a mandatory-rate 6 12 24
dot11a supported-rate 9 18 36 48 54
dot11b mandatory-rate 1 2
dot11b supported-rate 5.5 11
dot11g mandatory-rate 1 2 5.5 11
dot11g supported-rate 6 9 12 18 24 36 48 54
#
wlan service-template 1 clear
ssid CengWang
bind WLAN-ESS 1
fast-association enable
client dhcp-server centralized
service-template enable
#
wlan service-template 2 crypto
ssid CW
bind WLAN-ESS 0
#
ssl server-policy 1
#
wlan ap-group 1
ap 5866-baf7-0060
country-code CN
dot11a service-template 1
dot11bg service-template 1
dot11a radio enable
dot11bg radio enable
map-configuration apg1.cfg
undo bonjour-gateway enable
#
wlan ap-group default_group
#
interface Cellular1/0/1
async mode protocol
link-protocol ppp
#
interface NULL0
#
interface Vlan-interface1
shutdown
#
interface Vlan-interface10
ip address 192.168.10.2 255.255.255.0
portal server local_for_Vlan-interface10 method direct
portal domain portal
portal nas-ip 192.168.10.2
access-user detect type arp retransmit 3 interval 30
portal mac-trigger enable
portal mac-trigger binding-retry 3 interval 3
portal url-param include ssid
#
interface Vlan-interface250
ip address dhcp-alloc
#
interface GigabitEthernet1/0/5
port link-mode route
#
interface GigabitEthernet1/0/6
port link-mode route
#
interface GigabitEthernet1/0/1
port link-mode bridge
port link-type trunk
undo port trunk permit vlan 1
port trunk permit vlan 10 250
#
interface GigabitEthernet1/0/2
port link-mode bridge
#
interface GigabitEthernet1/0/3
port link-mode bridge
port access vlan 250
#
interface GigabitEthernet1/0/4
port link-mode bridge
port link-type trunk
port trunk permit vlan 1 10 250
port trunk pvid vlan 250
#
interface WLAN-ESS0
port link-type hybrid
port hybrid vlan 1 untagged
#
interface WLAN-ESS1
port link-type hybrid
undo port hybrid vlan 1
port hybrid vlan 10 untagged
port hybrid pvid vlan 10
mac-vlan enable
#
wlan ap 5866-baf7-0060 model WA2620 id 1
map-configuration apg1.cfg
serial-id 219801A0D1C125004249
undo bonjour-gateway enable
country-code CN
radio 1
service-template 1
radio enable
radio 2
service-template 1
radio enable
#
wlan ips
malformed-detect-policy default
signature deauth_flood signature-id 1
signature broadcast_deauth_flood signature-id 2
signature disassoc_flood signature-id 3
signature broadcast_disassoc_flood signature-id 4
signature eapol_logoff_flood signature-id 5
signature eap_success_flood signature-id 6
signature eap_failure_flood signature-id 7
signature pspoll_flood signature-id 8
signature cts_flood signature-id 9
signature rts_flood signature-id 10
signature addba_req_flood signature-id 11
signature-policy default
countermeasure-policy default
attack-detect-policy default
virtual-security-domain default
attack-detect-policy default
malformed-detect-policy default
signature-policy default
countermeasure-policy default
#
ip route-static 0.0.0.0 0.0.0.0 192.168.250.1
#
info-center source default channel 2 debug state on
info-center loghost 192.168.250.103
info-center format cmcc
#
ntp-service refclock-master 2
#
arp detection validate ip
arp static 192.168.10.2 3c8c-4018-8561 10 GigabitEthernet1/0/1
#
arp-snooping enable
#
load xml-configuration
#
user-interface con 0
user-interface tty 4
user-interface vty 0 4
authentication-mode scheme
user privilege level 3
#
return
<H3C>                

编辑答案

你正在编辑答案

如果你要对问题或其他回答进行点评或询问,请使用评论功能。

分享扩散:

提出建议

    +

亲~登录后才可以操作哦!

确定

亲~检测到您登陆的账号未在http://hclhub.h3c.com进行注册

注册后可访问此模块

跳转hclhub

你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作

举报

×

侵犯我的权益 >
对根叔社区有害的内容 >
辱骂、歧视、挑衅等(不友善)

侵犯我的权益

×

泄露了我的隐私 >
侵犯了我企业的权益 >
抄袭了我的内容 >
诽谤我 >
辱骂、歧视、挑衅等(不友善)
骚扰我

泄露了我的隐私

×

您好,当您发现根叔知了上有泄漏您隐私的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您认为哪些内容泄露了您的隐私?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)

侵犯了我企业的权益

×

您好,当您发现根叔知了上有关于您企业的造谣与诽谤、商业侵权等内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到 pub.zhiliao@h3c.com 邮箱,我们会在审核后尽快给您答复。
  • 1. 您举报的内容是什么?(请在邮件中列出您举报的内容和链接地址)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
  • 3. 是哪家企业?(营业执照,单位登记证明等证件)
  • 4. 您与该企业的关系是?(您是企业法人或被授权人,需提供企业委托授权书)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

抄袭了我的内容

×

原文链接或出处

诽谤我

×

您好,当您发现根叔知了上有诽谤您的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您举报的内容以及侵犯了您什么权益?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

对根叔社区有害的内容

×

垃圾广告信息
色情、暴力、血腥等违反法律法规的内容
政治敏感
不规范转载 >
辱骂、歧视、挑衅等(不友善)
骚扰我
诱导投票

不规范转载

×

举报说明