• 全部
  • 经验案例
  • 典型配置
  • 技术公告
  • FAQ
  • 漏洞说明
  • 全部
  • 全部
  • 大数据引擎
  • 知了引擎
产品线
搜索
取消
案例类型
发布者
是否解决
是否官方
时间
搜索引擎
匹配模式
高级搜索

WA4320-ACN-C-FIT改FAT模式后如何配置上网

2023-10-31提问
  • 0关注
  • 0收藏,333浏览
粉丝:0人 关注:1人

问题描述:

手上有WA4320-ACN-C-FIT现已升级为FAT模式。现在需要接入网络中为手机提供无线上网功能,现有网络结构是:光猫>安全网关>三层交换机>二层交换机>PC 。 我想把WA4320接在二层交换机端口上 本段的IP是192.168.100.0, 网关在三层交换机上 没有开DHCP。请问我怎么配置WA4320 WEB或者命令行的配置谁能提供一下啊 万分感谢

组网及组网描述:


最佳答案

粉丝:22人 关注:0人

巧了,我有一台,直接刷入或者你自己修改下里面的ssid和密码再刷入


#
version 5.20, Release 1509P01
#
sysname XUPE
#
clock timezone Beijing add 08:00:00
#
domain default enable system
#
telnet server enable
#
port-security enable
#
web idle-timeout 100
#
password-recovery enable
#
undo attack-defense tcp fragment enable
#
vlan 1
#
vlan 2
#
domain system
access-limit disable
state active
idle-cut disable
self-service-url disable
#
dhcp server ip-pool vlan2
network 172.10.10.0 mask 255.255.255.0
gateway-list 172.10.10.1
dns-list 223.5.5.5 114.114.114.114
expired day 0 hour 8
#
user-group system
group-attribute allow-guest
#
local-user admin
password cipher $c$3$5h3z8h+g
authorization-attribute level 3
service-type telnet
service-type web
local-user xupe
password cipher $c$3$lyCelIV0w
authorization-attribute level 3
service-type ssh telnet terminal
service-type web
#
wlan rrm
dot11a mandatory-rate 6 12 24
dot11a supported-rate 9 18 36 48 54
dot11b mandatory-rate 1 2
dot11b supported-rate 5.5 11
dot11g mandatory-rate 1 2 5.5 11
dot11g supported-rate 6 9 12 18 24 36 48 54
#
wlan service-template 1 clear
ssid H3C
service-template enable
#
wlan service-template 2 crypto
ssid XUPE
cipher-suite ccmp
security-ie rsn
service-template enable
#
cwmp
undo cwmp enable
#
interface NULL0
#
interface Vlan-interface1
ip address dhcp-alloc
nat outbound
#
interface Vlan-interface2
ip address 172.10.10.1 255.255.255.0
#
interface GigabitEthernet1/0/1
#
interface WLAN-BSS2
port access vlan 2
port-security port-mode psk
port-security tx-key-type 11key
port-security preshared-key pass-phrase cipher $c$3$Q2A0euu+PrJBhiqIaAbsx8p1QLAZCtZ4Agb2M2k=
#
interface WLAN-BSS3
port access vlan 2
port-security port-mode psk
port-security tx-key-type 11key
port-security preshared-key pass-phrase cipher $c$3$Ew60Z/hAuDdmUPUo5hQsdH5fpNyO5EgZcDKkRxw=
#
interface WLAN-BSS32
port link-type hybrid
port hybrid vlan 1 untagged
#
interface WLAN-BSS33
port link-type hybrid
port hybrid vlan 1 untagged
#
interface WLAN-Radio1/0/1
service-template 2 interface wlan-bss 2
#
interface WLAN-Radio1/0/2
service-template 2 interface wlan-bss 3
#
undo info-center enable
#
dhcp enable
#
arp-snooping enable
#
load xml-configuration
#
load tr069-configuration
#
user-interface con 0
user-interface vty 0 4
authentication-mode scheme
#
return


谢谢!

zhiliao_LEyKY 发表时间:2023-10-31

试了,可以连接手机,但是手机无法连接到三层交换机,加了一条172到上行网关的路由也不行 Please press ENTER. <XUPE>dis cur # version 5.20, Release 1509P01 # sysname XUPE # clock timezone Beijing add 08:00:00 # domain default enable system # telnet server enable # port-security enable # web idle-timeout 100 # password-recovery enable # undo attack-defense tcp fragment enable # vlan 1 # vlan 2 # domain system access-limit disable state active idle-cut disable self-service-url disable # dhcp server ip-pool vlan2 network 172.10.10.0 mask 255.255.255.0 gateway-list 172.10.10.1 dns-list 114.114.114.114 expired day 0 hour 8 # user-group system group-attribute allow-guest # local-user admin password cipher $c$3$U383dX1KaEqrIDaGjj14Zz6vjJVFJfalqrZAFAg= authorization-attribute level 3 service-type telnet service-type web local-user xupe password cipher $c$3$d+ArFHlJci4bwoIzJ192wDN/yLE21WfGT1ID authorization-attribute level 3 service-type ssh telnet terminal service-type web # wlan rrm dot11a mandatory-rate 6 12 24 dot11a supported-rate 9 18 36 48 54 dot11b mandatory-rate 1 2 dot11b supported-rate 5.5 11 dot11g mandatory-rate 1 2 5.5 11 dot11g supported-rate 6 9 12 18 24 36 48 54 # wlan service-template 1 clear ssid H3C # wlan service-template 2 crypto ssid XUPE cipher-suite ccmp security-ie rsn service-template enable # cwmp undo cwmp enable # interface NULL0 # interface Vlan-interface1 ip address 192.168.100.1 255.255.255.0 undo dhcp select server global-pool # interface Vlan-interface2 ip address 172.10.10.1 255.255.255.0 # interface GigabitEthernet1/0/1 # interface WLAN-BSS2 port access vlan 2 port-security port-mode psk port-security tx-key-type 11key port-security preshared-key pass-phrase cipher $c$3$Q2A0euu+PrJBhiqIaAbsx8p1QLAZCtZ4Agb2M2k= # interface WLAN-BSS3 port access vlan 2 port-security port-mode psk port-security tx-key-type 11key port-security preshared-key pass-phrase cipher $c$3$Ew60Z/hAuDdmUPUo5hQsdH5fpNyO5EgZcDKkRxw= # interface WLAN-BSS32 port link-type hybrid port hybrid vlan 1 untagged # interface WLAN-BSS33 port link-type hybrid port hybrid vlan 1 untagged # interface WLAN-BSS34 port access vlan 2 port-security port-mode psk port-security tx-key-type 11key port-security preshared-key pass-phrase cipher $c$3$P2xmn999liuOuuyxeQ8d0YoR9rTA8aVNg4uf # interface WLAN-BSS35 port link-type hybrid port hybrid vlan 1 untagged port-security port-mode psk port-security tx-key-type 11key port-security preshared-key pass-phrase cipher $c$3$P2xmn999liuOuuyxeQ8d0YoR9rTA8aVNg4uf # interface WLAN-Radio1/0/1 service-template 2 interface wlan-bss 34 # interface WLAN-Radio1/0/2 service-template 2 interface wlan-bss 35 # ip route-static 172.10.10.0 255.255.255.0 192.168.100.254 # undo info-center enable # dhcp enable # arp-snooping enable # load xml-configuration # load tr069-configuration # user-interface con 0 user-interface vty 0 4 authentication-mode scheme # return

zhiliao_LEyKY 发表时间:2023-10-31
回复zhiliao_LEyKY:

我这个是nat模式啊,需要连接上层设备的话,你得写nat server了,自己后面做成二层模式,把网关放在上层设备上就行了

悲剧塔 发表时间:2023-10-31
2 个回答
粉丝:127人 关注:8人


https://www.h3c.com/cn/Service/Document_Software/Document_Center/Wlan/WA/WA4300/?category=187037&subcategory=618797

zhiliao_LEyKY 知了小白
粉丝:0人 关注:1人

试了,可以连接手机,但是手机无法连接到三层交换机,加了一条172到上行网关的路由也不行

Please press ENTER.

<XUPE>dis cur
#
version 5.20, Release 1509P01
#
sysname XUPE
#
clock timezone Beijing add 08:00:00
#
domain default enable system
#
telnet server enable
#
port-security enable
#
web idle-timeout 100
#
password-recovery enable
#
undo attack-defense tcp fragment enable
#
vlan 1
#
vlan 2
#
domain system
access-limit disable
state active
idle-cut disable
self-service-url disable
#
dhcp server ip-pool vlan2
network 172.10.10.0 mask 255.255.255.0
gateway-list 172.10.10.1
dns-list 114.114.114.114
expired day 0 hour 8
#
user-group system
group-attribute allow-guest
#
local-user admin
password cipher $c$3$U383dX1KaEqrIDaGjj14Zz6vjJVFJfalqrZAFAg=
authorization-attribute level 3
service-type telnet
service-type web
local-user xupe
password cipher $c$3$d+ArFHlJci4bwoIzJ192wDN/yLE21WfGT1ID
authorization-attribute level 3
service-type ssh telnet terminal
service-type web
#
wlan rrm
dot11a mandatory-rate 6 12 24
dot11a supported-rate 9 18 36 48 54
dot11b mandatory-rate 1 2
dot11b supported-rate 5.5 11
dot11g mandatory-rate 1 2 5.5 11
dot11g supported-rate 6 9 12 18 24 36 48 54
#
wlan service-template 1 clear
ssid H3C
#
wlan service-template 2 crypto
ssid XUPE
cipher-suite ccmp
security-ie rsn
service-template enable
#
cwmp
undo cwmp enable
#
interface NULL0
#
interface Vlan-interface1
ip address 192.168.100.1 255.255.255.0
undo dhcp select server global-pool
#
interface Vlan-interface2
ip address 172.10.10.1 255.255.255.0
#
interface GigabitEthernet1/0/1
#
interface WLAN-BSS2
port access vlan 2
port-security port-mode psk
port-security tx-key-type 11key
port-security preshared-key pass-phrase cipher $c$3$Q2A0euu+PrJBhiqIaAbsx8p1QLAZCtZ4Agb2M2k=
#
interface WLAN-BSS3
port access vlan 2
port-security port-mode psk
port-security tx-key-type 11key
port-security preshared-key pass-phrase cipher $c$3$Ew60Z/hAuDdmUPUo5hQsdH5fpNyO5EgZcDKkRxw=
#
interface WLAN-BSS32
port link-type hybrid
port hybrid vlan 1 untagged
#
interface WLAN-BSS33
port link-type hybrid
port hybrid vlan 1 untagged
#
interface WLAN-BSS34
port access vlan 2
port-security port-mode psk
port-security tx-key-type 11key
port-security preshared-key pass-phrase cipher $c$3$P2xmn999liuOuuyxeQ8d0YoR9rTA8aVNg4uf
#
interface WLAN-BSS35
port link-type hybrid
port hybrid vlan 1 untagged
port-security port-mode psk
port-security tx-key-type 11key
port-security preshared-key pass-phrase cipher $c$3$P2xmn999liuOuuyxeQ8d0YoR9rTA8aVNg4uf
#
interface WLAN-Radio1/0/1
service-template 2 interface wlan-bss 34
#
interface WLAN-Radio1/0/2
service-template 2 interface wlan-bss 35
#
ip route-static 172.10.10.0 255.255.255.0 192.168.100.254
#
undo info-center enable
#
dhcp enable
#
arp-snooping enable
#
load xml-configuration
#
load tr069-configuration
#
user-interface con 0
user-interface vty 0 4
authentication-mode scheme
#
return      


编辑答案

你正在编辑答案

如果你要对问题或其他回答进行点评或询问,请使用评论功能。

分享扩散:

提出建议

    +

亲~登录后才可以操作哦!

确定

亲~检测到您登陆的账号未在http://hclhub.h3c.com进行注册

注册后可访问此模块

跳转hclhub

你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作

举报

×

侵犯我的权益 >
对根叔社区有害的内容 >
辱骂、歧视、挑衅等(不友善)

侵犯我的权益

×

泄露了我的隐私 >
侵犯了我企业的权益 >
抄袭了我的内容 >
诽谤我 >
辱骂、歧视、挑衅等(不友善)
骚扰我

泄露了我的隐私

×

您好,当您发现根叔知了上有泄漏您隐私的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您认为哪些内容泄露了您的隐私?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)

侵犯了我企业的权益

×

您好,当您发现根叔知了上有关于您企业的造谣与诽谤、商业侵权等内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到 pub.zhiliao@h3c.com 邮箱,我们会在审核后尽快给您答复。
  • 1. 您举报的内容是什么?(请在邮件中列出您举报的内容和链接地址)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
  • 3. 是哪家企业?(营业执照,单位登记证明等证件)
  • 4. 您与该企业的关系是?(您是企业法人或被授权人,需提供企业委托授权书)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

抄袭了我的内容

×

原文链接或出处

诽谤我

×

您好,当您发现根叔知了上有诽谤您的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您举报的内容以及侵犯了您什么权益?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

对根叔社区有害的内容

×

垃圾广告信息
色情、暴力、血腥等违反法律法规的内容
政治敏感
不规范转载 >
辱骂、歧视、挑衅等(不友善)
骚扰我
诱导投票

不规范转载

×

举报说明