身边有一台 WX2540E 的 AC 控制器和 WA2620 的 AP,AC 为旁路部署,另有其他路由提供 DHCP 及 VLAN 等。现在需要在 AC 上开启 portal 认证功能,但根据官方文档中的使用了 portal wlan ssid WuXian 命令给 ssid 绑定 portal 服务器后,客户端仍能直接访问物联网,不弹出、也不提示该无线网需要认证。
官方的文档中好多 portal 设置的方法、案例在我这个 WX2540E 设备都无法使用,命令不存在啊~~~~
不知没有没有高手可以指点一二。
(0)
最佳答案
https://www.h3c.com/cn/d_201708/1021747_30005_0.htm,参考一下该ac的portal配置文档
(0)
官方文档我之前也看过,刚刚又看了一次,案例中没有 portal wlan ssid 的使用案例。数据依然是全部放行。。。
(0)
官方文档我之前也看过,刚刚又看了一次,案例中没有 portal wlan ssid 的使用案例。数据依然是全部放行。。。
官方文档我之前也看过,刚刚又看了一次,案例中没有 portal wlan ssid 的使用案例。数据依然是全部放行。。。
贴上我的配置:
<H3C>dis cur
#
version 5.20, ESS 3703P68
#
sysname H3C
#
clock timezone Asia/Shanghai add 08:00:00
#
domain default enable system
#
telnet server enable
#
port-security enable
#
portal server 111 ip 10.1.48.224 key cipher $c$3$z0ufbNV7ux0I8KmKT3dzeETU73uAoMUH2g== url http://10.1.48.224:1816/wlan/index server-type cmcc
portal server tough ip 192.168.250.103 key cipher $c$3$MtWpbh+2VxkjJXrVCzHiDDyv3z6k2mpDyg== url http//192.168.250.103:1816/wlan/index server-type cmcc
portal free-rule 0 source ip any destination ip 192.168.250.0 mask 255.255.255.0
portal wlan ssid CengWang server tough domain portal
portal audit enable
#
wlan auto-ap enable
wlan auto-persistent enable
#
password-recovery enable
#
vlan 1
#
vlan 10
#
vlan 250
#
radius scheme portal
primary authentication 192.168.250.103 key cipher $c$3$gZU+hcUX3uGtrnU7kw041SEC0xl8vwdz2g==
user-name-format without-domain
nas-ip 192.168.250.100
#
domain portal
authentication default radius-scheme portal
authorization default radius-scheme portal
accounting default radius-scheme portal
access-limit disable
state active
idle-cut disable
self-service-url disable
domain system
access-limit disable
state active
idle-cut disable
self-service-url disable
#
user-group system
group-attribute allow-guest
#
local-user admin
password cipher $c$3$pDAHjktz0v9UQhj2KtcLaeCcnTPivP82
authorization-attribute level 3
service-type telnet
service-type web
#
wlan rrm
dot11a mandatory-rate 6 12 24
dot11a supported-rate 9 18 36 48 54
dot11b mandatory-rate 1 2
dot11b supported-rate 5.5 11
dot11g mandatory-rate 1 2 5.5 11
dot11g supported-rate 6 9 12 18 24 36 48 54
#
wlan service-template 1 clear
ssid CengWang
bind WLAN-ESS 1
client forwarding-mode local vlan 10
client dhcp-server centralized
service-template enable
#
wlan ap-group 1
ap 5866-baf7-0060
country-code CN
dot11a service-template 1
dot11bg service-template 1
dot11a radio enable
dot11bg radio enable
map-configuration apg1.cfg
undo bonjour-gateway enable
#
wlan ap-group default_group
#
interface Cellular1/0/1
async mode protocol
link-protocol ppp
#
interface NULL0
#
interface Vlan-interface1
shutdown
#
interface Vlan-interface10
ip address 192.168.10.2 255.255.255.0
portal server tough method direct
#
interface Vlan-interface250
ip address dhcp-alloc
#
interface GigabitEthernet1/0/5
port link-mode route
#
interface GigabitEthernet1/0/6
port link-mode route
#
interface GigabitEthernet1/0/1
port link-mode bridge
port link-type trunk
undo port trunk permit vlan 1
port trunk permit vlan 10 250
#
interface GigabitEthernet1/0/2
port link-mode bridge
#
interface GigabitEthernet1/0/3
port link-mode bridge
port access vlan 250
#
interface GigabitEthernet1/0/4
port link-mode bridge
port link-type trunk
port trunk permit vlan 1 10 250
port trunk pvid vlan 250
#
interface WLAN-ESS1
port link-type hybrid
undo port hybrid vlan 1
port hybrid vlan 10 untagged
port hybrid pvid vlan 10
mac-vlan enable
#
wlan ap 5866-baf7-0060 model WA2620 id 1
map-configuration apg1.cfg
serial-id 219801A0D1C125004249
undo bonjour-gateway enable
country-code CN
radio 1
service-template 1
radio enable
radio 2
service-template 1
radio enable
#
wlan ips
malformed-detect-policy default
signature deauth_flood signature-id 1
signature broadcast_deauth_flood signature-id 2
signature disassoc_flood signature-id 3
signature broadcast_disassoc_flood signature-id 4
signature eapol_logoff_flood signature-id 5
signature eap_success_flood signature-id 6
signature eap_failure_flood signature-id 7
signature pspoll_flood signature-id 8
signature cts_flood signature-id 9
signature rts_flood signature-id 10
signature addba_req_flood signature-id 11
signature-policy default
countermeasure-policy default
attack-detect-policy default
virtual-security-domain default
attack-detect-policy default
malformed-detect-policy default
signature-policy default
countermeasure-policy default
#
ip route-static 0.0.0.0 0.0.0.0 192.168.250.1
#
info-center format cmcc
#
ntp-service refclock-master 2
#
load xml-configuration
#
user-interface con 0
user-interface tty 4
user-interface vty 0 4
authentication-mode scheme
user privilege level 3
#
return
<H3C>
配置说明:
VLAN250 为 AP、AC 的设备管理 IP VLAN(192.168.250.0/24)
VLAN10 为用户获取的 IP 所属 VLAN(192.168.10.0/24)
有的地方说 portal 需要在有 IP 地址的三层接口上启用,但 AC 旁路部署时,除了与 AP 通信的 IP外,其他 IP 基本已无用。尽管我也在 interface vlan-interface 10 接口上配置了 IP,但并无效果,数据直接放行。
(0)
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
官方文档我之前也看过,刚刚又看了一次,案例中没有 portal wlan ssid 的使用案例。数据依然是全部放行。。。