公司组网 使用 AP控制器 WAC360 终端AP 722S。 目前出现问题, 苹果电脑显示联网,获得了IP地址。 但是无法登陆。
(0)
AP控制上可发现该MAC, ping不通。出现问题的两台全部是苹果MACOS系统。个人认为是协议问题。但是需要您专业的回答。
(0)
描述中的无法登陆是什么含义,设备配置贴出来看看
****************************************************************************** * Copyright (c) 2004-2017 Hangzhou H3C Tech. Co., Ltd. All rights reserved. * * Without the owner's prior written consent, * * no decompiling or reverse-engineering shall be allowed. * ****************************************************************************** Login authentication Username:admin Password: % Login failed! Username:admin Password: <H3C>dis cy ^ % Unrecognized command found at '^' position. <H3C>sys System View: return to User View with Ctrl+Z. [H3C]dis cu # version 5.20, ESS 3703P58 # sysname H3C # clock timezone Beijing add 08:00:00 # undo radius client # domain default enable system # telnet server enable # port-security enable # wlan client learn-ipaddr enable # wlan auto-ap enable # password-recovery enable # acl number 202 # acl number 3000 rule 0 permit icmp icmp-type echo # vlan 1 # vlan 20 # domain system access-limit disable state active idle-cut disable self-service-url disable # dhcp server ip-pool vlan1 network 1.1.1.0 mask 255.255.255.0 # user-group system group-attribute allow-guest # local-user admin password cipher $c$3$O2nBsySCvIXWAIjGmGF75yBu/30+4sxb authorization-attribute level 3 service-type telnet service-type web # wlan rrm dot11a mandatory-rate 6 12 24 dot11a supported-rate 9 18 36 48 54 dot11b mandatory-rate 1 2 dot11b supported-rate 5.5 11 dot11g mandatory-rate 1 2 5.5 11 dot11g supported-rate 6 9 12 18 24 36 48 54 # wlan forwarding-policy zf classifier acl 3000 behavior remote # wlan service-template 20 crypto ssid HNwifi bind WLAN-ESS 20 cipher-suite tkip cipher-suite ccmp security-ie rsn security-ie wpa service-template enable # wlan ap-group default_group ap ap ap 50da-0015-cfa0 ap 50da-0015-dfa0 ap 703d-1584-0240 ap 84d9-315e-caa0 ap 84d9-315e-cc00 ap 84d9-315e-cee0 ap 84d9-315e-cf40 ap 84d9-315e-d900 country-code CN dot11a service-template 20 dot11bg service-template 20 dot11a radio enable dot11bg radio enable device-detection enable firmware-update disable # user-profile policy1 wlan permit-ap-group default_group wlan permit-ssid HNwifi user-profile aaa wlan permit-ssid HNwifi # interface Cellular1/0/1 async mode protocol link-protocol ppp # interface NULL0 # interface Vlan-interface1 ip address 1.1.1.1 255.255.255.0 # interface Vlan-interface20 ip address 10.96.11.201 255.255.252.0 dhcp select relay dhcp relay address-check enable # interface GigabitEthernet1/0/5 port link-mode route undo dhcp select server global-pool # interface GigabitEthernet1/0/1 port link-mode bridge port link-type trunk port trunk permit vlan 1 20 arp detection trust # interface GigabitEthernet1/0/2 port link-mode bridge # interface GigabitEthernet1/0/3 port link-mode bridge # interface GigabitEthernet1/0/4 port link-mode bridge arp detection trust # interface WLAN-ESS0 port link-type hybrid port hybrid vlan 1 untagged # interface WLAN-ESS1 # interface WLAN-ESS20 port access vlan 20 port-security port-mode psk port-security tx-key-type 11key port-security preshared-key pass-phrase cipher $c$3$WaDAlj5L2zlSiXgoklhxVu46/l0/QTbvnbBJ1Sk= # wlan ap 50da-0015-cfa0 model WAP722S id 2 serial-id 219801A0VX9164G00335 firmware-update disable country-code CN device-detection enable radio 1 service-template 20 channel lock radio enable radio 2 service-template 20 channel lock radio enable # wlan ap 50da-0015-dfa0 model WAP722S id 3 serial-id 219801A0VX9164G00377 firmware-update disable country-code CN device-detection enable radio 1 service-template 20 channel lock radio enable radio 2 service-template 20 channel lock radio enable # wlan ap 703d-1584-0240 model WAP722S id 9 serial-id 219801A0VX916BG00590 firmware-update disable country-code CN device-detection enable radio 1 service-template 20 channel lock radio enable radio 2 service-template 20 channel lock radio enable # wlan ap 84d9-315e-caa0 model WAP722S id 7 serial-id 219801A0VX9166G00113 firmware-update disable country-code CN device-detection enable radio 1 service-template 20 channel lock radio enable radio 2 service-template 20 channel lock radio enable # wlan ap 84d9-315e-cc00 model WAP722S id 5 serial-id 219801A0VX9166G00125 firmware-update disable country-code CN device-detection enable radio 1 service-template 20 channel lock radio enable radio 2 service-template 20 channel lock radio enable # wlan ap 84d9-315e-cee0 model WAP722S id 4 serial-id 219801A0VX9166G00082 firmware-update disable country-code CN device-detection enable radio 1 service-template 20 channel lock radio enable radio 2 service-template 20 channel lock radio enable # wlan ap 84d9-315e-cf40 model WAP722S id 6 serial-id 219801A0VX9166G00131 firmware-update disable country-code CN device-detection enable radio 1 service-template 20 channel lock radio enable radio 2 service-template 20 channel lock radio enable # wlan ap 84d9-315e-d900 model WAP722S id 8 serial-id 219801A0VX9166G00014 firmware-update disable country-code CN device-detection enable radio 1 service-template 20 channel lock radio enable radio 2 service-template 20 channel lock radio enable # wlan ap ap model WAP722S id 1 serial-id auto firmware-update disable country-code CN device-detection enable radio 1 service-template 20 channel lock radio enable radio 2 service-template 20 channel lock radio enable # wlan ips malformed-detect-policy default signature deauth_flood signature-id 1 signature broadcast_deauth_flood signature-id 2 signature disassoc_flood signature-id 3 signature broadcast_disassoc_flood signature-id 4 signature eapol_logoff_flood signature-id 5 signature eap_success_flood signature-id 6 signature eap_failure_flood signature-id 7 signature pspoll_flood signature-id 8 signature cts_flood signature-id 9 signature rts_flood signature-id 10 signature addba_req_flood signature-id 11 signature-policy default countermeasure-policy default attack-detect-policy default virtual-security-domain default attack-detect-policy default malformed-detect-policy default signature-policy default countermeasure-policy default # ip route-static 0.0.0.0 0.0.0.0 10.96.11.254 # snmp-agent snmp-agent local-engineid 800063A203AC7409219D61 snmp-agent community read public snmp-agent community write private snmp-agent sys-info version all # dhcp server forbidden-ip 10.96.11.201 10.96.11.252 dhcp server forbidden-ip 10.96.5.1 10.96.5.20 # ntp-service refclock-master 2 # user-profile aaa enable # load xml-configuration # user-interface con 0 user-interface tty 4 user-interface vty 0 4 authentication-mode scheme user privilege level 3 #
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
AP控制上可发现该MAC, ping不通。出现问题的两台全部是苹果MACOS系统。个人认为是协议问题。但是需要您专业的回答。
无人问津?