• 全部
  • 经验案例
  • 典型配置
  • 技术公告
  • FAQ
  • 漏洞说明
  • 全部
  • 全部
  • 大数据引擎
  • 知了引擎
产品线
搜索
取消
案例类型
发布者
是否解决
是否官方
时间
搜索引擎
匹配模式
高级搜索

H3C AC WX2540H web登录失败

2024-04-02提问
  • 0关注
  • 0收藏,401浏览
粉丝:0人 关注:0人

问题描述:

tel 能够连接 但是网页显示登陆失败 服务也都已经开启  下图有用户具体配置

6 个回答
粉丝:103人 关注:8人

全局开了吗,你这配置不全,web和vty相关的配置上来看下

ip https enable 这个也打开了

zhiliao_ogdvLq 发表时间:2024-04-02

vty相关的命令也上来看下,建议把所有命令发上来吧

zhiliao_sEUyB 发表时间:2024-04-02
回复zhiliao_sEUyB:

方便加个联系方式吗 截图您帮我看看

zhiliao_ogdvLq 发表时间:2024-04-02

下面回答问题 直接上图就行

zhiliao_sEUyB 发表时间:2024-04-02
回复zhiliao_sEUyB:

version 7.1.064, Release 5435P02 # sysname AC-CB200485 # clock timezone beijing add 08:00:00 clock protocol ntp # wlan global-configuration # telnet server enable # dot1x authentication-method eap # dhcp enable # dhcp snooping enable # lldp global enable # password-recovery enable # vlan 1 # vlan 89 name switch_manage # vlan 90 name ap # vlan 98 name bianfeng # vlan 102 name bianfeng-office # stp mode pvst stp bpdu-protection stp global enable # dhcp server ip-pool ap_vlan90 gateway-list 10.176.90.2 network 10.176.90.0 mask 255.255.255.0 dns-list 114.114.114.114 # wlan service-template office ssid AK vlan 102 akm mode psk preshared-key pass-phrase cipher $c$3$6aAbQDd4gQNHmHCrQnog0sbE3xvCkJrcPrDnItCLIcw= cipher-suite ccmp security-ie rsn service-template enable # interface NULL0 # interface Vlan-interface1 shutdown ip address dhcp-alloc # interface Vlan-interface89 description switch_manage ip address 10.176.89.100 255.255.255.0 # interface Vlan-interface90 ip address 10.176.90.2 255.255.255.0 dhcp server apply ip-pool ap_vlan90 # interface GigabitEthernet1/0/5 port link-mode route # interface GigabitEthernet1/0/6 port link-mode route # interface GigabitEthernet1/0/1 port link-mode bridge port link-type trunk port trunk permit vlan all arp detection trust dhcp snooping trust # interface GigabitEthernet1/0/2 port link-mode bridge port link-type trunk port trunk permit vlan all arp detection trust dhcp snooping trust # interface GigabitEthernet1/0/3 port link-mode bridge port link-type trunk port trunk permit vlan all arp detection trust dhcp snooping trust # interface GigabitEthernet1/0/4 port link-mode bridge port link-type trunk port trunk permit vlan all arp detection trust dhcp snooping trust # scheduler logfile size 16 # line class console user-role network-admin # line class vty user-role network-operator # line con 0 user-role network-admin # line vty 0 31 authentication-mode scheme user-role network-admin user-role network-operator idle-timeout 30 0 # ip route-static 0.0.0.0 0 10.176.89.1 # undo info-center logfile enable # snmp-agent snmp-agent local-engineid 800063A280083A386395B000000001 snmp-agent community read public snmp-agent sys-info version all # ssh server enable ssh server acl 2000 # ntp-service enable ntp-service unicast-server 202.118.1.130 # acl number 2000 description sshmanager rule 1 permit source 10.245.89.0 0.0.0.255 rule 2 permit source 192.168.142.27 0 rule 5 permit source 10.245.96.0 0.0.0.255 rule 10 permit source 10.176.89.0 0.0.0.255 rule 11 permit source 10.176.104.21 0 rule 20 deny # radius scheme all-802.1x primary authentication 10.245.95.25 primary accounting 10.245.95.25 key authentication cipher $c$3$YJ2LE2SXJvLiODz7KjS1+rvUM43jRj5vgcEGaz/Zx9MCE5Y= key accounting cipher $c$3$Y6tRIsLKlJzeVZtUj44X2pabD1BaxupvxNMaZlDakZ8qdr4= user-name-format without-domain nas-ip 10.176.90.2 # radius scheme bianfeng-macauth primary authentication 192.168.136.54 primary accounting 192.168.136.54 key authentication cipher $c$3$fSu2RaGphciVMJk0+YW5Tqzx4PexLsfHrs9RAWENV0pN4ro= key accounting cipher $c$3$vfib7WDPU+Ypkhhrn8rctcyDxYtoMhf7W89v1havEgWTx6o= user-name-format without-domain nas-ip 10.176.89.100 # domain all-802.1x authentication lan-access radius-scheme all-802.1x authorization lan-access radius-scheme all-802.1x accounting lan-access radius-scheme all-802.1x # domain bianfeng-macauth authentication lan-access radius-scheme bianfeng-macauth authorization lan-access radius-scheme bianfeng-macauth accounting lan-access radius-scheme bianfeng-macauth # domain system # domain default enable system # role name level-0 description Predefined level-0 role # role name level-1 description Predefined level-1 role # role name level-2 description Predefined level-2 role # role name level-3 description tftp rule 1 permit command tftp * put * * rule 2 permit command save # role name level-4 description Predefined level-4 role # role name level-5 description Predefined level-5 role # role name level-6 description Predefined level-6 role # role name level-7 description Predefined level-7 role # role name level-8 description Predefined level-8 role # role name level-9 description Predefined level-9 role # role name level-10 description Predefined level-10 role # role name level-11 description Predefined level-11 role # role name level-12 description Predefined level-12 role # role name level-13 description Predefined level-13 role # role name level-14 description Predefined level-14 role # user-group system # local-user admin class manage password hash $h$6$KlCqgz9Js12ar19T$jnymF7b3Clih4RvnRm6Nd3zSPMr01SFlkud12gxxaaEUPqGm4/4At+ZEQeS7UjPxCxy6uKo5Ou19c/Cgo55SIg== service-type ssh http https authorization-attribute user-role 15 authorization-attribute user-role network-admin authorization-attribute user-role network-operator # local-user admn class manage authorization-attribute user-role network-operator # local-user ak class manage password hash $h$6$0wTMop4jFv/2zIsj$voSzjk/2YSYyQmPMhlRtoyaj7DcqeElvDrnJg4M6dg/UOoVQfTv5LOr36Fme7A+zu0vngaaO8xVo+tPqWDX4/g== service-type telnet terminal http https authorization-attribute user-role network-admin authorization-attribute user-role network-operator # local-user hzak class manage password hash $h$6$eKyoz8Fmi42OVwov$6KKTmmnopG6wAIFS2b1esK3nbVJfVOcO/4QT4xqd0Pesc4y6KZKHjFN4V/gpnh3xZmS4cZT+p55WTJ/6tbh6hA== authorization-attribute user-role network-admin authorization-attribute user-role network-operator # local-user hzhd class manage password hash $h$6$CxS8DzZLLTVWINSg$lP9Ivfs6HKeJbQZnsozmBafUWg1WgZO6myG5Kg5dVjWJI2ht3Q6TXAEWRR7qPuU8CKe0fXnmjoqU23vZ5ttXIQ== service-type http https authorization-attribute user-role network-admin authorization-attribute user-role network-operator # local-user tftp class manage password hash $h$6$NJR+zvqxjQNry3ex$ZOnG9z/CAib6gFU8J4loKp0dCzrwiBZntscKVLDn8yihmhinrEWrO5KKL9DV7tfDBe4oeTlHloFnJksJgkIEig== service-type ssh authorization-attribute user-role level-3 authorization-attribute user-role network-operator # local-user u class manage authorization-attribute user-role network-operator # ip http acl 2000 ip https acl 2000 ip http enable ip https enable # smartmc tm username admin password cipher $c$3$MnXcUNR38qNgH6GqYsUGxt2GVDoqrFc6 enable # wlan auto-ap enable wlan auto-persistent enable # wlan ap-group default-group retransmit-count 4 provision auto-recovery disable provision auto-update enable vlan 1 rrop anti-bmc protocol ipv6 deny ap-model WA4320-ACN-C radio 1 rate mandatory 12 24 rate supported 18 36 48 54 rate disabled 6 9 radio enable option client fast-forwarding enable level 2 service-template office radio 2 rate mandatory 11 rate supported 12 18 24 36 48 54 rate disabled 1 2 5.5 6 9 radio enable option client fast-forwarding enable level 2 service-template office gigabitethernet 1 ap-model WA5530 radio 1 rate mandatory 12 24 rate supported 18 36 48 54 rate disabled 6 9 radio enable option client fast-forwarding enable level 2 service-template office radio 2 rate mandatory 12 24 rate supported 18 36 48 54 rate disabled 6 9 radio enable service-template office radio 3 rate mandatory 11 rate supported 9 12 18 24 36 48 54 rate disabled 1 2 5.5 6 radio enable option client fast-forwarding enable level 2 service-template office gigabitethernet 1 gigabitethernet 2 ap-model WTU430-EI radio 1 rate mandatory 12 24 rate supported 18 36 48 54 rate disabled 6 9 radio enable option client fast-forwarding enable level 2 service-template office radio 2 rate mandatory 11 rate supported 12 18 24 36 48 54 rate disabled 1 2 5.5 6 9 radio enable option client fast-forwarding enable level 2 service-template office gigabitethernet 1 gigabitethernet 2 gigabitethernet 3 # wlan ap CB200250 model WA4320-ACN-SI serial-id 219801A0T78178E00661 vlan 1 radio 1 service-template office radio 2 service-template office gigabitethernet 1 # wlan ap CB200259 model WT1020 serial-id 219801A0TA9179Q00094 # wlan ap CB200262 model WA5530 serial-id 219801A0YF9179G004SR vlan 1 radio 1 service-template office radio 2 service-template office radio 3 service-template office gigabitethernet 1 gigabitethernet 2 # wlan ap CB200270 model WA5530 serial-id 219801A0YF9179G004WH vlan 1 radio 1 service-template office radio 2 service-template office radio 3 service-template office gigabitethernet 1 gigabitethernet 2 # wlan ap CB200276_wtu430 model WTU430-EI serial-id 219801A1BV9178Q31337 vlan 1 radio 1 service-template office radio 2 service-template office gigabitethernet 1 gigabitethernet 2 gigabitethernet 3 # wlan ap CB200279_wtu430 model WTU430-EI serial-id 219801A1BV9178Q31604 vlan 1 radio 1 service-template office radio 2 service-template office gigabitethernet 1 gigabitethernet 2 gigabitethernet 3 # wlan ap CB200292_wtu430 model WTU430-EI serial-id 219801A1BV9178Q31623 vlan 1 radio 1 service-template office radio 2 service-template office gigabitethernet 1 gigabitethernet 2 gigabitethernet 3

zhiliao_ogdvLq 发表时间:2024-04-02

太乱了,直接回答问题 上配置吧

zhiliao_sEUyB 发表时间:2024-04-02
回复zhiliao_sEUyB:

查看这连个配置的命令是哪个 我去截图

zhiliao_ogdvLq 发表时间:2024-04-02

ip http acl 2000 ip https acl 2000

zhiliao_sEUyB 发表时间:2024-04-02

把这俩命令删除

zhiliao_sEUyB 发表时间:2024-04-02
回复zhiliao_sEUyB:

acl number 2000 description sshmanager rule 1 permit source 10.245.89.0 0.0.0.255 rule 2 permit source 192.168.142.27 0 rule 5 permit source 10.245.96.0 0.0.0.255 rule 10 permit source 10.176.89.0 0.0.0.255 rule 11 permit source 10.176.104.21 0 rule 20 deny

zhiliao_ogdvLq 发表时间:2024-04-02
回复zhiliao_sEUyB:

这意思是不是只有后面的地址能够访问

zhiliao_ogdvLq 发表时间:2024-04-02

是的

zhiliao_sEUyB 发表时间:2024-04-02
回复zhiliao_sEUyB:

什么命令能够让我加上去一条

zhiliao_ogdvLq 发表时间:2024-04-02

进到acl 2000里,rule 继续添加

zhiliao_sEUyB 发表时间:2024-04-02
粉丝:95人 关注:1人

检查是否登录限制的策略

该如何去查看

zhiliao_ogdvLq 发表时间:2024-04-02

dis cu

IT钟点工 发表时间:2024-04-02
粉丝:7人 关注:19人

display ip https

查看IPv4 ACL:后面参数 是否应用了acl进行了限制

该使用哪个命令

zhiliao_ogdvLq 发表时间:2024-04-02

display ip https

新时代农民工 发表时间:2024-04-02

参数是 2000

zhiliao_ogdvLq 发表时间:2024-04-02

dis acl 2000 看下规则, permit source 加上你的电脑ip

新时代农民工 发表时间:2024-04-02
粉丝:181人 关注:0人

您好,全局是否开启http和https

打开过了

zhiliao_ogdvLq 发表时间:2024-04-02

有acl限制吗

无名之辈 发表时间:2024-04-02
回复无名之辈:

这个我也不清楚 所以就想问一下大佬 该如何查看

zhiliao_ogdvLq 发表时间:2024-04-02
粉丝:32人 关注:4人

ip http  enable

ip https enable 

登录:

http://x.x.x.x

https://x.x.x.x

两种方式都试一下;

粉丝:19人 关注:9人

您好,请知:

web无法登陆,以下是排查要点,请参考:

1、检查用户名、密码是否正确。

2、检查登陆的用户名是否赋予了HTTP和HTTPS的权限。

3、更换其他浏览器、清理浏览器缓存看下。

4、检查是否开启了HTTP或HTTPS的功能。

5、检查是否修改了HTTP或HTTPS的服务端口。

6、检查AC是否能被PING通。


编辑答案

你正在编辑答案

如果你要对问题或其他回答进行点评或询问,请使用评论功能。

分享扩散:

提出建议

    +

亲~登录后才可以操作哦!

确定

亲~检测到您登陆的账号未在http://hclhub.h3c.com进行注册

注册后可访问此模块

跳转hclhub

你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作

举报

×

侵犯我的权益 >
对根叔社区有害的内容 >
辱骂、歧视、挑衅等(不友善)

侵犯我的权益

×

泄露了我的隐私 >
侵犯了我企业的权益 >
抄袭了我的内容 >
诽谤我 >
辱骂、歧视、挑衅等(不友善)
骚扰我

泄露了我的隐私

×

您好,当您发现根叔知了上有泄漏您隐私的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您认为哪些内容泄露了您的隐私?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)

侵犯了我企业的权益

×

您好,当您发现根叔知了上有关于您企业的造谣与诽谤、商业侵权等内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到 pub.zhiliao@h3c.com 邮箱,我们会在审核后尽快给您答复。
  • 1. 您举报的内容是什么?(请在邮件中列出您举报的内容和链接地址)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
  • 3. 是哪家企业?(营业执照,单位登记证明等证件)
  • 4. 您与该企业的关系是?(您是企业法人或被授权人,需提供企业委托授权书)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

抄袭了我的内容

×

原文链接或出处

诽谤我

×

您好,当您发现根叔知了上有诽谤您的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您举报的内容以及侵犯了您什么权益?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

对根叔社区有害的内容

×

垃圾广告信息
色情、暴力、血腥等违反法律法规的内容
政治敏感
不规范转载 >
辱骂、歧视、挑衅等(不友善)
骚扰我
诱导投票

不规范转载

×

举报说明