• 全部
  • 经验案例
  • 典型配置
  • 技术公告
  • FAQ
案例类型
搜索
取消
产品线
关键字
发布者
发布时间

c3510E WEB控制台无法显示客户端IP地址,显示0.0.0.0

  • 0关注
  • 0收藏,1221浏览
粉丝:0人 关注:2人

问题描述:

c3510E WEB控制台无法显示客户端IP地址,显示0.0.0.0

<WHH_XS_WX_C3510E>dis cur

#

 version 5.20, Release 3709P61

#

 sysname WHH_XS_WX_C3510E

#

 clock timezone Beijing add 08:00:00

#

 domain default enable system

#

 telnet server enable

#

 port-security enable

#

 dot1x authentication-method eap

#

 portal server whh ip 192.200.37.19 url http://192.200.37.19/portal/logon.htm server-type imc

 portal free-rule 1 source interface GigabitEthernet1/0/1 destination any

 portal free-rule 2 source ip any destination ip 61.153.6.58 mask 255.255.255.255

 portal free-rule 3 source ip 61.153.6.58 mask 255.255.255.255 destination ip any

 portal free-rule 4 source ip any destination ip 192.200.10.8 mask 255.255.255.255

 portal free-rule 5 source ip 192.200.10.8 mask 255.255.255.255 destination ip any

 portal local-server http

#

 password-recovery enable

#

vlan 1

#

vlan 88

#

radius scheme system

 primary authentication 192.200.10.8

 primary accounting 192.200.10.8

 key authentication cipher $c$3$nYcyd8k2vXIFc9NyzUqmuskiQcyRJffZc+8J9aI=

 key accounting cipher $c$3$DSy1PFAC6IBLV4jLxWW3m79/yoNbGtJAjsQ1uSg=

 user-name-format without-domain

 nas-ip 192.200.37.19

radius scheme imc

#

domain 802.1x

 access-limit disable

 state active

 idle-cut disable

 self-service-url disable

domain system

 authentication lan-access radius-scheme system

 authorization lan-access radius-scheme system

 accounting lan-access radius-scheme system

 authentication portal radius-scheme system

 authorization portal radius-scheme system

 accounting portal radius-scheme system

 access-limit disable

 state active

 idle-cut disable

 self-service-url disable

#

user-group system

 group-attribute allow-guest

#

local-user admin

 password cipher $c$3$5bHyuuXF3Sch8R01GK0y684VbjhsjtAlfqpnITU=

 authorization-attribute level 3

 service-type ssh telnet terminal

 service-type portal

 service-type web

local-user h3c

 password cipher $c$3$dnKSSZqpSpDwUkCtcyWRpWqvxqC6zQ==

 service-type portal

local-user xh

 password cipher $c$3$teSvJJLjhTmR+GDd/1TmRH0mVKZZk3KMnt46rUA=

 service-type telnet terminal

 service-type web

#

wlan rrm

 dot11a mandatory-rate 6 12 24

 dot11a supported-rate 9 18 36 48 54

 dot11b mandatory-rate 1 2

 dot11b supported-rate 5.5 11

 dot11g mandatory-rate 1 2 5.5 11

 dot11g supported-rate 6 9 12 18 24 36 48 54

#

wlan service-template 1 crypto

 ssid itcitc_QS

 bind WLAN-ESS 0

 cipher-suite tkip

 security-ie rsn

#

wlan service-template 2 clear

 ssid itcitc_qiaosi

 bind WLAN-ESS 1

 service-template enable

#

wlan service-template 3 crypto

 ssid itcitc_802.1X

 bind WLAN-ESS 3

 cipher-suite ccmp

 security-ie rsn

 service-template enable

#

wlan ap-group default_group

 ap itc_1

 ap itc_2

 ap itc_3

 ap itc_4

 ap itc_5

 ap itc_6

 ap itc_7

 dot11a radio enable

 dot11bg radio enable

#

interface NULL0

#

interface Vlan-interface1

 ip address 192.200.37.19 255.255.254.0

 portal server whh method direct

#

interface Vlan-interface88

 description AP_MGT

 ip address 172.18.1.10 255.255.255.0

#

interface GigabitEthernet1/0/1

 port link-type trunk

 port trunk permit vlan 1 88

#

interface GigabitEthernet1/0/2

#

interface GigabitEthernet1/0/3

#

interface GigabitEthernet1/0/4

#

interface Ten-GigabitEthernet1/0/5

#

interface WLAN-ESS0

 port-security port-mode psk

 port-security tx-key-type 11key

 port-security preshared-key pass-phrase cipher $c$3$dorxF2jV5SLr6na3PDj3+FdXM81kxM0OmwCxF2c=

#

interface WLAN-ESS1

 port link-type hybrid

 port hybrid vlan 1 untagged

#

interface WLAN-ESS3

 port-security port-mode userlogin-secure-ext

 port-security tx-key-type 11key

#

wlan ap itc_1 model WA2620i-AGN id 1

 serial-id 219801A0CMC13B001375

 radio 1

  radio enable

 radio 2

  service-template 1

  service-template 2

  service-template 3

  radio enable

#

wlan ap itc_2 model WA2620i-AGN id 2

 serial-id 219801A0CMC13B001367

 radio 1

  radio enable

 radio 2

  service-template 1

  service-template 2

  service-template 3

  radio enable

#

wlan ap itc_3 model WA2620i-AGN id 3

 serial-id 219801A0CMC13B001368

 radio 1

  radio enable

 radio 2

  service-template 1

  service-template 2

  service-template 3

  radio enable

#

wlan ap itc_4 model WA2620i-AGN id 4

 serial-id 219801A0CMC13B001397

 radio 1

  radio enable

 radio 2

  service-template 1

  service-template 2

  service-template 3

  radio enable

#

wlan ap itc_5 model WA2620i-AGN id 5

 serial-id 219801A0CMC13B001392

 radio 1

  radio enable

 radio 2

  service-template 1

  service-template 2

  service-template 3

  radio enable

#

wlan ap itc_6 model WA2620i-AGN id 6

 serial-id 219801A0CMC13B001005

 radio 1

  radio enable

 radio 2

  service-template 1

  service-template 2

  service-template 3

  radio enable

#

wlan ap itc_7 model WA2620i-AGN id 7

 serial-id 219801A0CMC13B001383

 radio 1

  radio enable  

 radio 2

  service-template 1

  service-template 2

  service-template 3

  radio enable

#

wlan ips

 malformed-detect-policy default

 signature deauth_flood signature-id 1

 signature broadcast_deauth_flood signature-id 2

 signature disassoc_flood signature-id 3

 signature broadcast_disassoc_flood signature-id 4

 signature eapol_logoff_flood signature-id 5

 signature eap_success_flood signature-id 6

 signature eap_failure_flood signature-id 7

 signature pspoll_flood signature-id 8

 signature cts_flood signature-id 9

 signature rts_flood signature-id 10

 signature addba_req_flood signature-id 11

 signature-policy default

 countermeasure-policy default

 attack-detect-policy default

 virtual-security-domain default

  attack-detect-policy default

  malformed-detect-policy default

  signature-policy default

  countermeasure-policy default

#

 ip route-static 0.0.0.0 0.0.0.0 192.200.37.2

#

 undo info-center logfile enable

#

user-interface con 0

user-interface vty 0 4

 authentication-mode scheme

 user privilege level 3

 set authentication password cipher $c$3$n2klKvgoY78uUw3+0j0ZcYxX/P8WYsaomkcJvoU=

#

return

<WHH_XS_WX_C3510E>                          

3 个回答
已采纳
钉钉 八段
粉丝:20人 关注:0人

如果是集中转发,由于客户端的arp报文和dhcp报文经过了ac,所以在ac上开启arp-snooping enable和dhcp-snooping (注意配置trust端口)就可以获取到客户端ip。如果是本地转发,则需要在ac上开启wlan  client  learn-ipaddr enable 则也会获取到ip。

怎么判断是本地转发还是集中转发啊?

zhiliao_39360 发表时间:2017-09-06

按你说的做还是不行啊

zhiliao_39360 发表时间:2017-09-06
回复zhiliao_39360:

看你的配置应该是集中转发,那把三条命令都配置上。然后display wlan client 看看会不会显示终端的ip地址,看你说的和我说的是不是一个意思。

钉钉 发表时间:2017-09-06

wlan client learn-ipaddr enable敲这个命令解决了!!!!!!!!!!!!!

zhiliao_39360 发表时间:2017-09-06
sunny 六段
粉丝:1人 关注:0人

arp-snooping enable 开启试试呢

还是不行

zhiliao_39360 发表时间:2017-09-06
zhiliao_39360 知了小白
粉丝:0人 关注:2人

Username:admin

Password:

<WHH_XS_WX_C3510E>dis cur

#

 version 5.20, Release 3709P61

#

 sysname WHH_XS_WX_C3510E

#

 clock timezone Beijing add 08:00:00

#

 domain default enable system

#

 telnet server enable

#

 port-security enable

#

 dot1x authentication-method eap

#

 portal server whh ip 192.200.37.19 url http://192.200.37.19/portal/logon.htm server-type imc

 portal free-rule 1 source interface GigabitEthernet1/0/1 destination any

 portal free-rule 2 source ip any destination ip 61.153.6.58 mask 255.255.255.255

 portal free-rule 3 source ip 61.153.6.58 mask 255.255.255.255 destination ip any

 portal free-rule 4 source ip any destination ip 192.200.10.8 mask 255.255.255.255

 portal free-rule 5 source ip 192.200.10.8 mask 255.255.255.255 destination ip any

 portal local-server http

#

 password-recovery enable

#

vlan 1

#

vlan 88

#

radius scheme system

 primary authentication 192.200.10.8

 primary accounting 192.200.10.8

 key authentication cipher $c$3$nYcyd8k2vXIFc9NyzUqmuskiQcyRJffZc+8J9aI=

 key accounting cipher $c$3$DSy1PFAC6IBLV4jLxWW3m79/yoNbGtJAjsQ1uSg=

 user-name-format without-domain

 nas-ip 192.200.37.19

radius scheme imc

#

domain 802.1x

 access-limit disable

 state active

 idle-cut disable

 self-service-url disable

domain system

 authentication lan-access radius-scheme system

 authorization lan-access radius-scheme system

 accounting lan-access radius-scheme system

 authentication portal radius-scheme system

 authorization portal radius-scheme system

 accounting portal radius-scheme system

 access-limit disable

 state active

 idle-cut disable

 self-service-url disable

#

user-group system

 group-attribute allow-guest

#

local-user admin

 password cipher $c$3$5bHyuuXF3Sch8R01GK0y684VbjhsjtAlfqpnITU=

 authorization-attribute level 3

 service-type ssh telnet terminal

 service-type portal

 service-type web

local-user h3c

 password cipher $c$3$dnKSSZqpSpDwUkCtcyWRpWqvxqC6zQ==

 service-type portal

local-user xh

 password cipher $c$3$teSvJJLjhTmR+GDd/1TmRH0mVKZZk3KMnt46rUA=

 service-type telnet terminal

 service-type web

#

wlan rrm

 dot11a mandatory-rate 6 12 24

 dot11a supported-rate 9 18 36 48 54

 dot11b mandatory-rate 1 2

 dot11b supported-rate 5.5 11

 dot11g mandatory-rate 1 2 5.5 11

 dot11g supported-rate 6 9 12 18 24 36 48 54

#

wlan service-template 1 crypto

 ssid itcitc_QS

 bind WLAN-ESS 0

 cipher-suite tkip

 security-ie rsn

#

wlan service-template 2 clear

 ssid itcitc_qiaosi

 bind WLAN-ESS 1

 service-template enable

#

wlan service-template 3 crypto

 ssid itcitc_802.1X

 bind WLAN-ESS 3

 cipher-suite ccmp

 security-ie rsn

 service-template enable

#

wlan ap-group default_group

 ap itc_1

 ap itc_2

 ap itc_3

 ap itc_4

 ap itc_5

 ap itc_6

 ap itc_7

 dot11a radio enable

 dot11bg radio enable

#

interface NULL0

#

interface Vlan-interface1

 ip address 192.200.37.19 255.255.254.0

 portal server whh method direct

#

interface Vlan-interface88

 description AP_MGT

 ip address 172.18.1.10 255.255.255.0

#

interface GigabitEthernet1/0/1

 port link-type trunk

 port trunk permit vlan 1 88

 dhcp-snooping trust

#

interface GigabitEthernet1/0/2

#

interface GigabitEthernet1/0/3

#

interface GigabitEthernet1/0/4

#

interface Ten-GigabitEthernet1/0/5

#

interface WLAN-ESS0

 dhcp-snooping trust

 port-security port-mode psk

 port-security tx-key-type 11key

 port-security preshared-key pass-phrase cipher $c$3$dorxF2jV5SLr6na3PDj3+FdXM81kxM0OmwCxF2c=

#

interface WLAN-ESS1

 port link-type hybrid

 port hybrid vlan 1 untagged

 dhcp-snooping trust

#

interface WLAN-ESS3

 dhcp-snooping trust

 port-security port-mode userlogin-secure-ext

 port-security tx-key-type 11key

#

wlan ap itc_1 model WA2620i-AGN id 1

 serial-id 219801A0CMC13B001375

 radio 1

  radio enable

 radio 2

  service-template 1

  service-template 2

  service-template 3

  radio enable

#

wlan ap itc_2 model WA2620i-AGN id 2

 serial-id 219801A0CMC13B001367

 radio 1

  radio enable  

 radio 2

  service-template 1

  service-template 2

  service-template 3

  radio enable

#

wlan ap itc_3 model WA2620i-AGN id 3

 serial-id 219801A0CMC13B001368

 radio 1

  radio enable

 radio 2

  service-template 1

  service-template 2

  service-template 3

  radio enable

#

wlan ap itc_4 model WA2620i-AGN id 4

 serial-id 219801A0CMC13B001397

 radio 1

  radio enable

 radio 2

  service-template 1

  service-template 2

  service-template 3

  radio enable

#

wlan ap itc_5 model WA2620i-AGN id 5

 serial-id 219801A0CMC13B001392

 radio 1

  radio enable

 radio 2

  service-template 1

  service-template 2

  service-template 3

  radio enable

#

wlan ap itc_6 model WA2620i-AGN id 6

 serial-id 219801A0CMC13B001005

 radio 1

  radio enable

 radio 2

  service-template 1

  service-template 2

  service-template 3

  radio enable

#               

wlan ap itc_7 model WA2620i-AGN id 7

 serial-id 219801A0CMC13B001383

 radio 1

  radio enable

 radio 2

  service-template 1

  service-template 2

  service-template 3

  radio enable

#

wlan ips

 malformed-detect-policy default

 signature deauth_flood signature-id 1

 signature broadcast_deauth_flood signature-id 2

 signature disassoc_flood signature-id 3

 signature broadcast_disassoc_flood signature-id 4

 signature eapol_logoff_flood signature-id 5

 signature eap_success_flood signature-id 6

 signature eap_failure_flood signature-id 7

 signature pspoll_flood signature-id 8

 signature cts_flood signature-id 9

 signature rts_flood signature-id 10

 signature addba_req_flood signature-id 11

 signature-policy default

 countermeasure-policy default

 attack-detect-policy default

 virtual-security-domain default

  attack-detect-policy default

  malformed-detect-policy default

  signature-policy default

  countermeasure-policy default

#

 dhcp-snooping

#

 ip route-static 0.0.0.0 0.0.0.0 192.200.37.2

#

 undo info-center logfile enable

#

 arp-snooping enable

#

user-interface con 0

user-interface vty 0 4

 authentication-mode scheme

 user privilege level 3

 set authentication password cipher $c$3$n2klKvgoY78uUw3+0j0ZcYxX/P8WYsaomkcJvoU=

#               

return

<WHH_XS_WX_C3510E>                        

帮忙看看配置还有哪里有问题吗?谢谢!

编辑答案

你正在编辑答案

如果你要对问题或其他回答进行点评或询问,请使用评论功能。

分享扩散:

提出建议

    +
标杆的神器激活
鼠年的运维 skr skr

亲~登录后才可以操作哦!

确定

你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作

举报

×

侵犯我的权益 >
对根叔社区有害的内容 >
辱骂、歧视、挑衅等(不友善)

侵犯我的权益

×

泄露了我的隐私 >
侵犯了我企业的权益 >
抄袭了我的内容 >
诽谤我 >
辱骂、歧视、挑衅等(不友善)
骚扰我

泄露了我的隐私

×

您好,当您发现根叔知了上有泄漏您隐私的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您认为哪些内容泄露了您的隐私?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)

侵犯了我企业的权益

×

您好,当您发现根叔知了上有关于您企业的造谣与诽谤、商业侵权等内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到 zhiliao@h3c.com 邮箱,我们会在审核后尽快给您答复。
  • 1. 您举报的内容是什么?(请在邮件中列出您举报的内容和链接地址)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
  • 3. 是哪家企业?(营业执照,单位登记证明等证件)
  • 4. 您与该企业的关系是?(您是企业法人或被授权人,需提供企业委托授权书)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

抄袭了我的内容

×

原文链接或出处

诽谤我

×

您好,当您发现根叔知了上有诽谤您的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您举报的内容以及侵犯了您什么权益?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

对根叔社区有害的内容

×

垃圾广告信息
色情、暴力、血腥等违反法律法规的内容
政治敏感
不规范转载 >
辱骂、歧视、挑衅等(不友善)
骚扰我
诱导投票

不规范转载

×

举报说明