Cisco无线控制器配置基础文稿演示
《配置Cisco路由器》PPT课件
2020/12/27
精选PPT
24
2020/12/27
精选PPT
25
使用路由选择协议动态地获悉路由
2020/12/27
精选PPT
26
路由器配置协议
• 通过动态路由协议,路由器能从其它路由器了解 网络的连接情况,了解网络的拓扑结构。
⑷ 同一路由器的不同接口的IP地址必须在不同的IP子网上。
⑸ 除了相邻路由器的相邻接口外,所有路由器任何两个非相邻 接口的地址都不能在同一个子网上。
2020/12/27
精选PPT
13
IP地址配置
IP地址的配置是在接口的局部配置模式下进行的。 首先利用“interface”命令进入接口配置模式, 然后使用“IP address”命令为接口配置IP地址。 配置IP地址的命令格式为:
• 路由器根据路由选择表决定应使用哪个端口来将分组转发 到目的地。路由器通过路由选择表来了解网络。
• 如果目标网络直接与路由相连,则路由器知道应使用哪个 端口来转发分组。
• 如果目标网络不直接与路由相连,则路由器必须首先获悉 可能的路由,并确定转发到这些网络时应使用的最佳路由
2020/12/27
精选PPT
注:
主机IP地址设置中默认网关必须配置成路由器上与内部子网相
连的接口的IP地址172.16.1.1。
2020/12/27
精选PPT
21
• 通过使用静态路由,可手工配置路由选择表。只要相应路径 处于活动状态,静态路由就保留在路由选择表中。如果使用 了permanent选项,则静态路由将一直保留在路由选择表中, 即使相应的路径不再处于活动状态。
思科网络学院教程无线路由器配置
网络管理软件
使用网络管理软件监控路由器的状态和性能,及时发现和解决故障。
流量分析工具
使用流量分析工具监控网络流量,发现异常流量和潜在的故障源。
日志文件
查看路由器的日志文件,了解故障发生的时间和原因,以便进行故障排除。
故障排除工具的使用
定期更新路由器固件
保持路由器固件最新,以获得最新的功能和修复已知的漏洞。
L2TP(二层隧道协议)VPN
L2TP协议结合了PPTP和LACAP协议的特点,提供更高的安全性。在无线路由器上配置L2TP VPN,可以提供更安全的远程访问服务。
OpenVPN
OpenVPN是一种开源的VPN协议,使用SSL/TLS协议进行数据传输加密。在无线路由器上配置OpenVPN,可以提供跨平台的远程访问服务,并具有很高的安全性。
状态检测防火墙
03
状态检测防火墙基于会话状态进行过滤,能够识别和跟踪TCP连接。在无线路由器上配置状态检测防火墙,可以提高网络安全性,防止非法入侵。
无线路由器的防火墙配置
04
无线路由器的故障排除
检查无线信号强度、SSID设置、加密方式等是否正确,重新启动路由器或更换信道。
无线连接问题
网速慢
无法访问互联网
密钥
通过MAC地址过滤功能,限制特定设备的访问权限,增强网络安全。
MAC地址过滤
无线网络的加密与安全设置
配置DHCP服务器的IP地址池,自动为连接到路由器的客户端分配IP地址。
IP地址池
设置IP地址租约时间,即客户端在获取IP地址后可以使用的最长时间。
租约时间
为特定客户端手动分配静态IP地址,满足特定网络需求。
思科网络学院教程无线路由器配置
目录
CISCO路由器配置手册(1)共111页
CISCO路由器配置手册第一章路由器配置基础一、基本设置方式二、命令状态三、设置对话过程四、常用命令五、配置IP寻址六、配置静态路由第二章广域网协议设置一、HDLC二、PPP三、X.25四、Frame Relay五、ISDN六、PSTN第三章路由协议设置一、RIP协议二、IGRP协议三、OSPF协议四、重新分配路由五、IPX协议设置第四章服务质量及访问控制一、协议优先级设置二、队列定制三、访问控制第五章虚拟局域网(VLAN)路由一、虚拟局域网(VLAN)二、交换机间链路(ISL)协议三、虚拟局域网(VLAN)路由实例第一章路由器配置基础一、基本设置方式一般来说,可以用5种方式来设置路由器:1.Console口接终端或运行终端仿真软件的微机;2.AUX口接MODEM,通过电话线与远方的终端或运行终端仿真软件的微机相连;3.通过Ethernet上的TFTP服务器;4.通过Ethernet上的TELNET程序; 5.通过Ethernet上的SNMP网管工作站。
但路由器的第一次设置必须通过第一种方式进行,此时终端的硬件设置如下:波特率:9600数据位:8停止位:1奇偶校验: 无二、命令状态1. router>路由器处于用户命令状态,这时用户可以看路由器的连接状态,访问其它网络和主机,但不能看到和更改路由器的设置内容。
2. router#在router>提示符下键入enable,路由器进入特权命令状态router#,这时不但可以执行所有的用户命令,还可以看到和更改路由器的设置内容。
3. router(config)#在router#提示符下键入configure terminal,出现提示符router(config)#,此时路由器处于全局设置状态,这时可以设置路由器的全局参数。
4. router(config-if)#; router(config-line)#;router(config-router)#;…路由器处于局部设置状态,这时可以设置路由器某个局部的参数。
1 cisco无线控制器配置基础
一.控制器初始安装配置一)串口控制接口部分1支持所有型号2公头DB-9连接器支持引脚2,3和5默认端口配置9600波特率8数据位1停止位无奇偶没有硬件流量控制4DB-9的母头连接null-modem(零型调制解调器)串行接口3用于管理AireOS确保获得AireOS在发生网络失败可用于初始安装只能用于进入命令行二)服务接口部分1.不能用于所有型号只有在4XXX系列2.10/100Base-TX以太网端口的速度自动感应3.服务接口不是自动感应出DTE(网络服务端)/DCE(用户终端)直通以太网电缆或集线器控制器交叉以太网电缆结束站或路由器第5类以太网电缆4.致力于AireOS管理确保获得AireOS在发生网络失败可用于初始配置或远程管理从管理网络默认默认IP地址192.168.1.1/24二.启动选项一)primary 初级 image形象、图片 manually 手动 upgrade升级从下面选择一个选项:1.运行出师想象2.运行备份形象3.手动升级初始形象4.更改活动的启动形象5.清空配置三控制器配置一)单一的配置文件1重要的是执行配置备份2无文字输出查看运行配置简要配置不是命令语法3不包含MAC地址的信息可以移植到多个思科Airespace的控制器谨防重复的IP地址二)双配置文件运行配置运行立即生效,有部分命令在保存命令前不会自动保存如果没有保存,将丢失的命令的情况下复位没有保存配置或电源周期保存配置配置保存在NVRAM表演后保存配置命令1其接入点和无线客户端2提供无线局域网的配置,如SSIDs和安全政策的所有用户群体。
3提供控制器配置如层2 / 3模式,组播和移动设置4提供AP配置,客户管理和各种射频设置5提供融入安全结构等的RADIUS连接6提供一体化的网络,如IP地址和SNMP7提供行政选择,如升级和备份Management > Local Management Users一)管理:本地管理用户本地管理的用户界面是在命令行和web界面切换二)管理:http交换机web配置完成并重启机器后,将启动公钥加密保证安全,默认情况下是禁止的。
CISCO路由器配置手册(1)共111页
CISCO路由器配置手册第一章路由器配置基础一、基本设置方式二、命令状态三、设置对话过程四、常用命令五、配置IP寻址六、配置静态路由第二章广域网协议设置一、HDLC二、PPP三、X.25四、Frame Relay五、ISDN六、PSTN第三章路由协议设置一、RIP协议二、IGRP协议三、OSPF协议四、重新分配路由五、IPX协议设置第四章服务质量及访问控制一、协议优先级设置二、队列定制三、访问控制第五章虚拟局域网(VLAN)路由一、虚拟局域网(VLAN)二、交换机间链路(ISL)协议三、虚拟局域网(VLAN)路由实例第一章路由器配置基础一、基本设置方式一般来说,可以用5种方式来设置路由器:1.Console口接终端或运行终端仿真软件的微机;2.AUX口接MODEM,通过电话线与远方的终端或运行终端仿真软件的微机相连;3.通过Ethernet上的TFTP服务器;4.通过Ethernet上的TELNET程序; 5.通过Ethernet上的SNMP网管工作站。
但路由器的第一次设置必须通过第一种方式进行,此时终端的硬件设置如下:波特率:9600数据位:8停止位:1奇偶校验: 无二、命令状态1. router>路由器处于用户命令状态,这时用户可以看路由器的连接状态,访问其它网络和主机,但不能看到和更改路由器的设置内容。
2. router#在router>提示符下键入enable,路由器进入特权命令状态router#,这时不但可以执行所有的用户命令,还可以看到和更改路由器的设置内容。
3. router(config)#在router#提示符下键入configure terminal,出现提示符router(config)#,此时路由器处于全局设置状态,这时可以设置路由器的全局参数。
4. router(config-if)#; router(config-line)#;router(config-router)#;…路由器处于局部设置状态,这时可以设置路由器某个局部的参数。
《思科路由器配置》课件
在这个PPT课件中,你将学习如何配置思科路由器。从基础知识到高级路由配 置,我们将教你一步一步进行配置,使你成为一个路由器配置专家!
基础知识
路由器的工作原理
了解路由器是如何转发数据包并决定最佳路径的。
思科路由器的特点
探索思科路由器的优势和特性,为什么它是行业领先者。
路由器的基本功能
了解路由器的主要功能,如连接网络、转发数据和维护网络安全。
路由器的配置
1
命令行接口(CLI)和图形用户界
面(GUI)的使用
配置路由器的IP地址
2
掌握两种常用的配置方式,以及它们的 优点和缺点。
学习如何设置路由器的IP地址,以便正确
连接到网络。
3
配置路由器的默认网关
了解如何设置默认网关,使路由器能够
配置路由器的域名服务(DNS)
4
转发数据。
学习如何配置路由器以提供域名解析服
掌握如何监控路由器的性能,并有效地 记录和分析网络日志。
总结
1 思考题
回顾所学内容,思考如何 应用到实际网络配置中。
2 参考资料
提供相关的参考资料和进 一步学习的资源。
3 Q&A
回答学员的问题,解决疑 惑,进一步巩固知识。
高级路由配置
配置多个VLAN
学习如何划分网络为多个虚 拟局域网(VLAN)以提高网 络性能。
配置端口转发和NAT
了解端口转发和网络地址转 换(NAT)的配置方法。
配置多个WAN接口
掌握如何配置多个广域网 (WAN)接口以实现网络冗 余和负载均衡。
配置负载均衡和优先级路由
学习如何配置负载均衡和优先级路由以优化网 络资源的使用。
配置VPN和远程访问
Cisco路由器配置手册(大全)之欧阳理创编
Cisco路由器配置手册(大全)第一章路由器配置基础一、基本设置方式一般来说,可以用5种方式来设置路由器:1.Console口接终端或运行终端仿真软件的微机;2.AUX口接MODEM,通过电话线与远方的终端或运行终端仿真软件的微机相连;3.通过Ethernet上的TFTP服务器;4.通过Ethernet上的TELNET程序;5.通过Ethernet上的SNMP网管工作站。
但路由器的第一次设置必须通过第一种方式进行,此时终端的硬件设置如下:波特率:9600数据位:8停止位:1奇偶校验: 无二、命令状态1. router>路由器处于用户命令状态,这时用户可以看路由器的连接状态,访问其它网络和主机,但不能看到和更改路由器的设置内容。
2. router#在router>提示符下键入enable,路由器进入特权命令状态router#,这时不但可以执行所有的用户命令,还可以看到和更改路由器的设置内容。
3. router(config)#在router#提示符下键入configure terminal,出现提示符router(config)#,此时路由器处于全局设置状态,这时可以设置路由器的全局参数。
4. router(config-if)#; router(config-line)#; router(config-router)#;…路由器处于局部设置状态,这时可以设置路由器某个局部的参数。
5. >路由器处于RXBOOT状态,在开机后60秒内按ctrl-break可进入此状态,这时路由器不能完成正常的功能,只能进行软件升级和手工引导。
6. 设置对话状态这是一台新路由器开机时自动进入的状态,在特权命令状态使用SETUP命令也可进入此状态,这时可通过对话方式对路由器进行设置。
三、设置对话过程1. 显示提示信息2. 全局参数的设置3. 接口参数的设置4. 显示结果利用设置对话过程可以避免手工输入命令的烦琐,但它还不能完全代替手工设置,一些特殊的设置还必须通过手工输入的方式完成。
Cisco无线控制器配置
Cisco无线控制器配置一组网图System Name [Cisco_01:00:01] (31 characters max):wlc-1//输入设备名称Would you like to terminate autoinstall? [yes]: //是否终止自动安装,默认是yes#配置管理用户和密码Enter Administrative User Name (24 characters max): adminEnter Administrative Password (3 to 24 characters): ********Re-enter Administrative Password : ********#配置服务接口的IP注:用于带外管理、系统恢复和维护必须跟带内管理接口在不同子网Service Interface IP Address Configuration [static][DHCP]: static Service Interface IP Address: 10.10.10.10Service Interface Netmask: 255.255.255.0#配置管理接口注:带内管理接口,可以通过web ssh或者telnet连接的接口,同时也是跟内网其他设备如认证服务器连接的接口Management Interface IP Address: 192.168.99.250Management Interface Netmask: 255.255.255.0Management Interface Default Router: 192.168.99.254Management Interface VLAN Identifier (0 = untagged): 99Management Interface Port Num [1 to 1]: 1Management Interface DHCP Server IP Address: 192.168.99.254#设置虚拟网关注:为三层漫游而设置的虚拟接口,在同一个mobility group里的WLC都必须配置相同的虚拟接口Virtual Gateway IP Address: 1.1.1.1#配置Mobility/RF Group名称注:用于用户在不同控制器下的AP间的三层漫游,所以不同控制器的该组必须相同Mobility/RF Group Name: test#配置默认的SSID注:LAP加入控制器时将使用它,LAP加入后WLC会把其他的SSID提供给LAP Network Name (SSID): test#dhcp桥接注:Bridging Mode 将会把DHCP 请求透传出去,不做处理;一般都使用WLC本身中继代理功能,默认NO。
无线控制器配置基础课程(PPT110张)
Would you like to terminate autoinstall? [yes]:
System Name [Cisco_51:2b:60] (31 characters max): 2106-demo AUTO-INSTALL: process terminated -- no configuration loaded Enter Administrative User Name (24 characters max): cisco Enter Administrative Password (24 characters max): cisco Re-enter Administrative Password : cisco
44xx WLAN Controller
型号 4402
支持 12, 25, 和50 AP
型号 4404
支持100 APs
*不能通过软件升级AP容量 *4400系列使用SFP光纤模块 *4400系列每port支持50个AP
Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Confidential
2
Presentation Title 准备工作 Size 30PT Option 2: Live
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
3
基本设备
interface Vlan30 ip address 192.168.30.254 255.255.255.0
CiscoWLAN控制器的配置详解
关于Cisco控制器的操作系统为IOS系统,初始配置如同Cisco交换机和路由器一样,我们可以使用Console线缆接到WLC(WLAN Ctroller)Console端口对其进行初始化配置,然后再使用GUI的方式进行深入功能的配置。
1、基本配置(1)、配置控制器管理接口配置步骤:∙show interface detailed management*/显示管理接口的设置信息config wlan disable wlan-number*/关闭设备上所有WLAN∙config interface address management ip-addr ip-netmask gateway */配置管理接口的地址、掩码、网关config interface vlan management {vlan-id | 0}*/配置管理接口VLAN,0代表untagged VLAN,非0值代表tagged VLAN,而思科控制器只识别tagged VLAN。
config interface port management physical-ds-port-number*/配置管理接口的物理目的端口config interface dhcpmanagement ip-address-of-primary-dhcp [ip-address-of-secondary-dhcp-serve r]*/配置管理接口的主DHCP服务器和次DHCP服务器。
config interface acl management access-control-list-name*/配置管理接口的ACL(控制列表)∙∙∙∙∙∙∙∙∙save config*/保存配置∙show interface detailed management*/显示管理接口的设置信息(2)、配置AP管理接口配置步骤:∙show interface summary*/显示接口汇总信息∙show interface detailed ap-manager*/显示AP管理接口设置信息config wlan disable wlan-number*/关闭该接wlan通讯config interface address ap-manager ip-addr ip-netmask gateway */配置AP管理接口的IP地址、掩码、网关config interface vlan ap-manager {vlan-id | 0}*/配置AP管理接口的VLAN,0代表untagged VLAN,非0值代表tagged VLAN,而思科控制器只识别tagged VLAN。
2019-思科无线控制器配置基础-文档资料
§ 配置任务
1. 思科CSSC无线客户端的安装和简单配置 2. 构建一个OPEN和一个WEP的无线网络 3. 构建一个简单WEB认证的无线网络
4. 构建一个支持本地EAP认证的无线网络
5. 构建一个用ACS做AAA认证的无线网络
Presentation_ID
© 2019 Cisco Systems, Inc. All rights reserved.
无线控制器配置基础
Presentation_ID
© 2019 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
1
PDF 文件使用 "pdfFactory Pro" 试用版本创建 fineprint
基本配置任务及过程
§ 准备工作
1. 控制器启动配置和升级控制器软件版本 2. 熟悉控制器配置界面 3. 连接AP到控制器上
6
PDF 文件使用 "pdfFactory Pro" 试用版本创建 fineprint
准备工作
§ 网线和Console线。如果是4400,需要两头是DB9接口的线,如果 是2106或者ISR,需要DB9+RJ45的线 § 如果是4400,需要GLC光纤模块和光纤 § 确认控制器版本是否需要升级 (用命令show sysinfo查看系统版本) § 是否需要将胖AP升级到瘦AP
Cisco Confidential
4
PDF 文件使用 "pdfFactory Pro" 试用版本创建 fineprint
2100系列无线控制器
§ 支持802.11a/b/g/n § 支持PCI认证 § WLC2100 硬件
CISCO路由器配置综合手册
CISCO路由器配备手册第一章路由器配备基本一、基本设立方式二、命令状态三、设立对话过程四、惯用命令五、配备IP寻址六、配备静态路由第二章广域网合同设立一、HDLC二、PPP三、X.25四、Frame Relay五、ISDN六、PSTN第三章路由合同设立一、RIP合同二、IGRP合同三、OSPF合同四、重新分派路由五、IPX合同设立第四章服务质量及访问控制一、合同优先级设立二、队列定制三、访问控制第五章虚拟局域网(VLAN)路由一、虚拟局域网(VLAN)二、互换机间链路(ISL)合同三、虚拟局域网(VLAN)路由实例第一章路由器配备基本一、基本设立方式普通来说,可以用5种方式来设立路由器:1.Console口接终端或运营终端仿真软件微机;2.AUX口接MODEM,通过电话线与远方终端或运营终端仿真软件微机相连;3.通过Ethernet上TFTP服务器;4.通过Ethernet上TELNET程序; 5.通过Ethernet上SNMP网管工作站。
但路由器第一次设立必要通过第一种方式进行,此时终端硬件设立如下:波特率:9600数据位:8停止位:1奇偶校验:无二、命令状态1. router>路由器处在顾客命令状态,这时顾客可以看路由器连接状态,访问其他网络和主机,但不能看到和更改路由器设立内容。
2. router#在router>提示符下键入enable,路由器进入特权命令状态router#,这时不但可以执行所有顾客命令,还可以看到和更改路由器设立内容。
3. router(config)#在router#提示符下键入configure terminal,浮现提示符router(config)#,此时路由器处在全局设立状态,这时可以设立路由器全局参数。
4. router(config-if)#;router(config-line)#;router(config-router)#;…路由器处在局部设立状态,这时可以设立路由器某个局部参数。
第2章_CISCO路由器的基本配置(第4次课).pptx
第2章 Cisco路由器配置基础
2.1 配置路由器 2.1.1 常用的路由器配置方法 2.1.2 通过控制台接口进行配置 2.1.3 通过Telnet进行配置 2.1.4 系统配置对话
2.2 路由器的命令行界面(CLI) 2.2.1 CLI 模式分类 2.2.2 帮助和编辑功能 2.2.3 Cisco路由器配置的基本命令(重点)
设定进入特权模式时的口令 enable password和enable seclnet VTY口令
进入线路配置模式(line vty),对login设定口令,普通版本的Cisco IOS可以支持5条telnet线路(高版本的支持更多) ,所以在下图的设定 中,指定line vty 0 4,是表示从vty0~vty4都是使用这个口令。
4.改变路由器的配置
通常在思科路由器内部会有两份配置,一份运行在内存RAM中,是 当前系统正在使用的配置,称为running-config,断电后running-config 会自动丢失。另一份保存在外存NVRAM中,称为startup-config,当路 由器断电重启时,startup-config将加载到内存成为running-config。
一般使用config terminal进入到配置模式后,所有的配置都存放到 running-config,配置后如果不加以保存,在断电后所做出的配置变更都 将被丢弃。因此必须对配置文件进行保存,以备下次启动时使用。也可以 进行TFTP备份,即在计算机上安装TFTP服务器软件(如Cisco TFTP server),将路由器作为TFTP客户端,通过TFTP协议将配置文件备份到 其他计算机上。
Router#show version
Router#show startup-conifg
cisco无线控制配置说明
cisco⽆线控制配置说明ContentsIntroductionPrerequisitesRequirementsComponents UsedConventionsBackground InformationConfigureNetwork DiagramConfigure the WLC for Basic OperationConfigure the Switch for the WLCConfigure the Switch for the APsVerifyTroubleshootCommandsController Does Not Defend AP-Manager IP AddressTroubleshoot a Lightweight Access Point Not Joininga Wireless LAN ControllerCisco Support Community - Featured ConversationsRelated InformationIntroductionThis document provides a basic configuration example of a lightweight access point (AP) that is connected to a Cisco Wireless LAN (WLAN) Controller (WLC) through a Cisco Catalyst Switch.PrerequisitesRequirementsEnsure that you meet these requirements before you attempt this configuration:Basic knowledge of the configuration of lightweight APs and Cisco WLCsBasic knowledge of Lightweight AP Protocol (LWAPP)Knowledge of the configuration of an external DHCP server and/or domain name server (DNS)Basic configuration knowledge of Cisco switchesComponents UsedThe information in this document is based on these software and hardware versions:Cisco Aironet 1232AG Series Lightweight APCisco 4402 Series WLC that runs firmware 5.2.178.0Microsoft Windows Server 2003 Enterprise DHCP serverThis configuration works with any other Cisco WLC and any lightweight AP.The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command.ConventionsRefer to the Cisco Technical Tips Conventions for more information on document conventions.Background InformationIn order for the WLC to be able to manage the LAP, the LAP should discover the controller and register with the WLC. There are different methods that an LAP uses in order to discover the WLC. For detailed information on the different methods the LAPs use to register to the WLCs, refer to Lightweight AP (LAP) Registration to a Wireless LAN Controller (WLC)This document describes the configuration steps needed to register the LAP to the WLC and for basic operation of the LWAPP wireless network.ConfigureIn order to register the LAP to the WLC and for basic operation of the LWAPP wireless network, complete these steps:1.Have a DHCP server present so that the APs can acquire a networkaddress.Note: Option 43 is used if the APs reside in a different subnet.2.Configure the WLC for basic operation.3.Configure the switch for the WLC.4.Configure the switch for the APs.5.Register the lightweight APs to the WLCs.Note: Use the Command Lookup Tool (registered customers only) in order to obtain more information on the commands used in this section.Network DiagramThis document uses this network setup:Configure the WLC for Basic OperationWhen the controller boots at factory defaults, the bootup script runs the configuration wizard, which prompts the installer for initial configuration settings. This procedure describes how to use the configuration wizard on the command-line interface (CLI) in order to enter initial configuration settings.Note: Be sure that you understand how to configure an external DHCP server and/or DNS.Complete these steps in order to configure the WLC for basicoperation:1.Connect your computer to the WLC with a DB-9 null modem serial cable.2.Open a terminal emulator session with these settings:o9600 baudo8 data bitso 1 stop bito No parityo No hardware flow control3.At the prompt, log in to the CLI.The default username is admin, and the default password is admin.4.If necessary, enter reset system in order to reboot the unit andstart the wizard.5.At the first wizard prompt, enter a system name. The system namecan include up to 32 printable ASCII characters.6.Enter an administrator user name and password. The user name andpassword can include up to 24 printable ASCII characters.7.Enter the service-port interface IP configuration protocol, eithernone or DHCP.Enter none if you do not want to use the service port or if you want to assign a static IP address to the service port. 8.If you entered none in step 7 and need to enter a static IP addressfor the service port, enter the service-port interface IP address and netmask for the next two prompts.If you do not want to use the service port, enter 0.0.0.0 for the IP address and netmask.9.Enter values for these options:o Management interface IP addresso Netmasko Default router IP addresso Optional VLAN identifierYou can use a valid VLAN identifier or 0 for untagged.10.Note: When the management interface on the controller isconfigured as part of the 'native vlan' on the switchport to which it connects, the controller should NOT tag the frames. Therefore, you must set the VLAN to be zero (on the controller).11.Enter the Network Interface (Distribution System) Physical Portnumber.For the WLC, the possible ports are 1 through 4 for a front-panel gigabit Ethernet port.12.Enter the IP address of the default DHCP server that supplies IPaddresses to clients, the management interface, and theservice-port interface, if you use one.13.Enter the LWAPP Transport Mode, either LAYER2 or LAYER3.Note: If you configure the WLC 4402 via Wizard and select AP transport Mode LAYER2, the Wizard does not ask the details of AP Manager.14.Enter the Virtual Gateway IP Address.This address can be any fictitious, unassigned IP address, such as1.1.1.1, for the Layer 3 Security and Mobility managers to use.Note: Usually the Virtual Gateway IP Address that is used is a private address.15.Enter the Cisco WLAN Solution Mobility Group/RF Group name.16.Enter the WLAN 1 service set identifier (SSID) or network name.This identifier is the default SSID that lightweight APs use in order to associate to a WLC.17.Allow or disallow Static IP Addresses for clients.Enter yes in order to allow clients to supply their own IP addresses.Enter no in order to require clients to request an IP address froma DHCP server.18.If you need to configure a RADIUS server on the WLC, enter yes andenter this information:o RADIUS server IP addresso The communication porto The shared secretIf you do not need to configure a RADIUS server or you want to configure the server later, enter no.19.Enter a country code for the unit.Enter help in order to see a list of the supported countries.20.Enable and disable support for IEEE 802.11b, IEEE 802.11a, and IEEE802.11g.21.Enable or disable radio resource management (RRM) (auto RF).WLC 4402—Configuration WizardWelcome to the Cisco Wizard Configuration ToolUse the '-' character to backupSystem Name [Cisco_43:eb:22]: c4402Enter Administrative User Name (24 characters max): adminEnter Administrative Password (24 characters max): *****Service Interface IP Address Configuration [none][DHCP]: noneEnable Link Aggregation (LAG) [yes][NO]: No Management Interface IP Address:192.168.60.2Management Interface Netmask:255.255.255.0Management Interface Default Router: 192.168.60.1Management Interface VLAN Identifier (0 = untagged): 60Management Interface Port Num [1 to 2]: 1 Management Interface DHCP Server IP Address: 192.168.60.25AP Transport Mode [layer2][LAYER3]: LAYER3 AP Manager Interface IP Address:192.168.60.3AP-Manager is on Management subnet, using same valuesAP Manager Interface DHCP Server(192.168.50.3): 192.168.60.25Virtual Gateway IP Address: 1.1.1.1 Mobility/RF Group Name: RFgroupname Network Name (SSID): SSIDAllow Static IP Addresses [YES][no]: yes Configure a RADIUS Server now? [YES][no]: no Enter Country Code (enter 'help' for a list of countries) [US]: USEnable 802.11b Network [YES][no]: yes Enable 802.11a Network [YES][no]: yes Enable 802.11g Network [YES][no]: yes Enable Auto-RF [YES][no]: yesNote: The management interface on the WLC is the only consistently pingable interface from outside of the WLC. So it is an expected behavior if you are not able to ping the AP manager interface from outside of the WLC.Note: You must configure the AP manager interface in order for the APs to associate with the WLC.Configure the Switch for the WLCThis example uses a Catalyst 3750 switch that uses only one port. The example tags the AP-manager and management interfaces and places these interfaces on VLAN 60. The switch port is configured as an IEEE 802.1Q trunk and only the appropriate VLANs, which are VLANs 2 through 4 and 60 in this case, are allowed on the trunk. The management and AP-manager VLAN (VLAN 60) is tagged and is not configured as the native VLAN of the trunk. So when the example configures those interfaces on the WLC, the interfaces are assigned a VLAN identifier.This is an example 802.1Q switch port configuration:interface GigabitEthernet1/0/1description Trunk Port to Cisco WLCswitchport trunk encapsulation dot1qswitchport trunk allowed vlan 2-4,60switchport mode trunkno shutdownNote: When you connect the WLC gigabit port, make sure it is connected to the switch gigabit port only. If you connect the WLC gigabit Ethernet to the Switch FastEthernet port then it will not work.Notice that this configuration example configures the neighbor switch port in a way that only allows relevant VLANs on the 802.1Q trunk. All other VLANs are pruned. This type of configuration is not necessary, but it is a deployment best practice. When you prune irrelevant VLANs, the WLC only processes relevant frames, which optimizes performance.Configure the Switch for the APsThis is an example VLAN interface configuration from the Catalyst 3750: interface VLAN5description AP VLANip address 10.5.5.1 255.255.255.0While the Cisco WLCs always connect to 802.1Q trunks, Cisco lightweight APs do not understand VLAN tagging and should only be connected to the access ports of the neighbor switch.This is an example switch port configuration from the Catalyst 3750:interface GigabitEthernet1/0/22description Access Port Connection to Cisco Lightweight APswitchport access vlan 5switchport mode accessno shutdownThe infrastructure is now ready for connection to the APs. The LAPs use the different WLC discovery methods and select a WLC to join. The LAP then registers with the controller.Here is a link to a video on the Cisco Support Community that explainsthe initial configuration of Wireless LAN Controller using the CLI and GUI: Initial configuration of Wireless LAN Controller using the CLI andGUIVerifyUse this section in order to confirm that your configuration works properly.After the LAPs register with the controller, you can view them under Wireless at the top of the user interface of the controller:On the CLI, you can use the show ap summary command in order to verify that the LAPs registered with the WLC: (Cisco Controller) >show ap summaryNumber of APs (1)Global AP User Name.............................. Not Configured Global AP Dot1x User Name........................ Not ConfiguredAP Name Slots AP Model Ethernet MAC Location Port Country Priority------------------ ----- ------------------- --------------------------------- ---- ------- ------AP001b.d4e3.a81b 2 AIR-LAP1232AG-A-K9 00:1b:d4:e3:a8:1b default location 2 IN 1On the WLC CLI, you can also use the show client summary command in order to see the clients that are registered with the WLC:(Cisco Controller) >show client summaryNumber of Clients (1)MAC Address AP Name Status WLAN Auth Protocol Port----------------- ------------- ------------- ---- ---- -------- ----00:40:96:a1:45:42 ap:64:a3:a0 Associated 4 Yes 802.11a 1(Cisco Controller) >Here is a video demonstration that explains how to perform the initial configuration of a Wireless LAN Controller using the GUI and CLI: InitialConfiguration of Wireless Lan Controller using CLI and GUITroubleshootUse this section in order to troubleshoot your configuration. CommandsUse these commands in order to troubleshoot your configuration.Note: Refer to Important Information on Debug Commands before you use debug commands.This debug lwapp events enable WLC command output shows that the lightweight AP gets registered to the WLC: (Cisco Controller) >debug lwapp events enableTue Apr 11 13:38:47 2006: Received LWAPP DISCOVERY REQUEST from AP00:0b:85:64:a3:a0 to ff:ff:ff:ff:ff:ff on port '1'Tue Apr 11 13:38:47 2006: Successful transmission of LWAPPDiscovery-Responseto AP 00:0b:85:64:a3:a0 on Port 1Tue Apr 11 13:38:58 2006: Received LWAPP JOIN REQUEST from AP00:0b:85:64:a3:a0 to 00:0b:85:33:a8:a0 on port '1'Tue Apr 11 13:38:58 2006: LWAPP Join-Request MTU path from AP00:0b:85:64:a3:a0is 1500, remote debug mode is 0Tue Apr 11 13:38:58 2006: Successfully added NPU Entry for AP00:0b:85:64:a3:a0 (index 48) Switch IP: 192.168.60.2, Switch Port: 12223,intIfNum 1, vlanId 60 AP IP: 10.5.5.10, AP Port: 19002, next hop MAC: 00:0b:85:64:a3:a0Tue Apr 11 13:38:58 2006: Successfully transmission of LWAPP Join-Reply to AP00:0b:85:64:a3:a0Tue Apr 11 13:38:58 2006: Register LWAPP event for AP00:0b:85:64:a3:a0 slot 0Tue Apr 11 13:38:58 2006: Register LWAPP event for AP 00:0b:85:64:a3:a0 slot 1Tue Apr 11 13:39:00 2006: Received LWAPP CONFIGURE REQUEST from AP00:0b:85:64:a3:a0 to 00:0b:85:33:a8:a0Tue Apr 11 13:39:00 2006: Updating IP info for AP 00:0b:85:64:a3:a0 -- static 0, 10.5.5.10/255.255.255.0, gtw 192.168.60.1 Tue Apr 11 13:39:00 2006: Updating IP 10.5.5.10 ===> 10.5.5.10 for AP 00:0b:85:64:a3:a0Tue Apr 11 13:39:00 2006: spamVerifyRegDomain RegDomain set for slot 0 code 0regstring -A regDfromCb -ATue Apr 11 13:39:00 2006: spamVerifyRegDomain RegDomain set for slot 1 code 0regstring -A regDfromCb -ATue Apr 11 13:39:00 2006: spamEncodeDomainSecretPayload:Send domain secretMobilityGroup<6f,39,74,cd,7e,a4,81,86,ca,32,8c,06,d3,ff,ec,6d,95,10,99,dd>to AP 00:0b:85:64:a3:a0Tue Apr 11 13:39:00 2006: Successfully transmission of LWAPPConfig-Message to AP 00:0b:85:64:a3:a0Tue Apr 11 13:39:00 2006: Running spamEncodeCreateVapPayload for SSID 'SSID'Tue Apr 11 13:39:00 2006: AP 00:0b:85:64:a3:a0 associated. Last AP failure wasdue to Configuration changes, reason: operator changed 11g mode Tue Apr 11 13:39:00 2006: Received LWAPP CHANGE_STATE_EVENT from AP 00:0b:85:64:a3:a0Tue Apr 11 13:39:00 2006: Successfully transmission of LWAPPChange-State-EventResponse to AP 00:0b:85:64:a3:a0Tue Apr 11 13:39:00 2006: Received LWAPP Up event for AP 00:0b:85:64:a3:a0 slot 0!Tue Apr 11 13:39:00 2006: Received LWAPP CONFIGURE COMMAND RES from AP 00:0b:85:64:a3:a0Tue Apr 11 13:39:00 2006: Received LWAPP CHANGE_STATE_EVENT from AP 00:0b:85:64:a3:a0Tue Apr 11 13:39:00 2006: Successfully transmission of LWAPPChange-State-EventResponse to AP 00:0b:85:64:a3:a0Tue Apr 11 13:39:00 2006: Received LWAPP Up event for AP00:0b:85:64:a3:a0 slot 1!This output shows these useful WLC debug commands:debug pem state enable—Configures the access policy manager debug optionsdebug pem events enabledebug dhcp message enable—Shows the debug of DHCP messages that are exchanged to and from the DHCP server debug dhcp packet enable—Shows the debug of DHCP packet details that are sent to and from the DHCP serverTue Apr 11 14:30:49 2006: Applied policy for mobile 00:40:96:a1:45:42 Tue Apr 11 14:30:49 2006: STA [00:40:96:a1:45:42,192.168.1.41] Replacing FastPath rule type = Airespace AP Client on AP 00:0B:85:64:A3:A0, slot 0InHandle = 0x00000000, OutHandle = 0x00000000 ACL Id = 255, Jumbo Frames= NO, interface = 1 802.1P = 0, DSCP = 0, TTue Apr 11 14:30:49 2006: Successfully plumbed mobile rule for mobile 00:40:96:a1:45:42 (ACL ID 255)Tue Apr 11 14:30:49 2006: Plumbed mobile LWAPP rule on AP00:0b:85:64:a3:a0for mobile 00:40:96:a1:45:42Tue Apr 11 14:30:53 2006: DHCP proxy received packet, src: 0.0.0.0, len = 320Tue Apr 11 14:30:53 2006: dhcpProxy: Received packet: Client00:40:96:a1:45:42DHCP Op: BOOTREQUEST(1), IP len: 320, switchport: 1, encap: 0xec03 Tue Apr 11 14:30:53 2006: dhcpProxy(): dhcp request, client:00:40:96:a1:45:42: dhcp op: 1, port: 1, encap 0xec03, old mscbport number: 1Tue Apr 11 14:30:53 2006: dhcp option len, including the magic cookie = 84Tue Apr 11 14:30:53 2006: dhcp option: received DHCP REQUEST msgTue Apr 11 14:30:53 2006: dhcp option: skipping option 61, len 7Tue Apr 11 14:30:53 2006: dhcp option: requested ip = 192.168.1.41 Tue Apr 11 14:30:53 2006: dhcp option: skipping option 12, len 15Tue Apr 11 14:30:53 2006: dhcp option: skipping option 81, len 19Tue Apr 11 14:30:53 2006: dhcp option: vendor class id = MSFT 5.0 (len 8)Tue Apr 11 14:30:53 2006: dhcp option: skipping option 55, len 11Tue Apr 11 14:30:53 2006: dhcpParseOptions: options end, len 84, actual 84Tue Apr 11 14:30:53 2006: mscb->dhcpServer: 192.168.60.2,mscb->dhcpNetmask:255.255.255.0,mscb->dhcpGateway: 192.168.60.1, mscb->dhcpRelay:192.168.60.2 VLAN: 60Tue Apr 11 14:30:53 2006: Local Address: 192.168.60.2, DHCP Server: 192.168.60.2, Gateway Addr: 192.168.60.2, VLAN: 60, port: 1Tue Apr 11 14:30:53 2006: DHCP Message Type received: DHCP REQUEST msg Tue Apr 11 14:30:53 2006: op: BOOTREQUEST, htype: Ethernet, hlen: 6, hops: 1Tue Apr 11 14:30:53 2006: xid: 3371152053, secs: 0, flags: 0Tue Apr 11 14:30:53 2006: chaddr: 00:40:96:a1:45:42Tue Apr 11 14:30:53 2006: ciaddr: 0.0.0.0, yiaddr: 0.0.0.0Tue Apr 11 14:30:53 2006: siaddr: 0.0.0.0, giaddr: 192.168.60.2Tue Apr 11 14:30:53 2006: Forwarding DHCP packet locally (348 octets) from 192.168.60.2 to 192.168.60.2Tue Apr 11 14:30:53 2006: Received 348 byte dhcp packet from 0x0201a8c0 192.168.60.2:68Tue Apr 11 14:30:53 2006: DHCP packet: 192.168.60.2 -> 192.168.60.2 using scope "InternalScope"Tue Apr 11 14:30:53 2006: received REQUESTTue Apr 11 14:30:53 2006: Checking node 192.168.1.41 Allocated 1144765719,Expires 1144852119 (now: 1144765853)Tue Apr 11 14:30:53 2006: adding option 0x35Tue Apr 11 14:30:53 2006: adding option 0x36Tue Apr 11 14:30:53 2006: adding option 0x33Tue Apr 11 14:30:53 2006: adding option 0x03Tue Apr 11 14:30:53 2006: adding option 0x01Tue Apr 11 14:30:53 2006: dhcpd: Sending DHCP packet(giaddr:192.168.60.2)to192.168.60.2:67 from 192.168.60.2:1067Tue Apr 11 14:30:53 2006: sendto (548 bytes) returned 548Tue Apr 11 14:30:53 2006: DHCP proxy received packet, src: 192.168.60.2, len = 548Tue Apr 11 14:30:53 2006: dhcpProxy: Received packet: Client00:40:96:a1:45:42DHCP Op: BOOTREPLY(2), IP len: 548, switchport: 0, encap: 0x0Tue Apr 11 14:30:53 2006: dhcp option len, including the magic cookie = 312Tue Apr 11 14:30:53 2006: dhcp option: received DHCP ACK msgTue Apr 11 14:30:53 2006: dhcp option: server id = 192.168.60.2Tue Apr 11 14:30:53 2006: dhcp option: lease time (seconds) = 86400 Tue Apr 11 14:30:53 2006: dhcp option: gateway = 192.168.60.1Tue Apr 11 14:30:53 2006: dhcp option: netmask = 255.255.255.0Tue Apr 11 14:30:53 2006: dhcpParseOptions: options end, len 312, actual 64Tue Apr 11 14:30:53 2006: DHCP Reply to AP client: 00:40:96:a1:45:42, frame len 412, switchport 1Tue Apr 11 14:30:53 2006: DHCP Message Type received: DHCP ACK msgTue Apr 11 14:30:53 2006: op: BOOTREPLY, htype: Ethernet, hlen: 6, hops: 0Tue Apr 11 14:30:53 2006: xid: 3371152053, secs: 0, flags: 0Tue Apr 11 14:30:53 2006: chaddr: 00:40:96:a1:45:42Tue Apr 11 14:30:53 2006: ciaddr: 0.0.0.0, yiaddr: 192.168.1.41Tue Apr 11 14:30:53 2006: siaddr: 0.0.0.0, giaddr: 0.0.0.0Tue Apr 11 14:30:53 2006: server id: 1.1.1.1 rcvd server id:192.168.60.2You can use these additional debug commands in order to troubleshoot your configuration:debug lwapp errors enable—Shows output of the debug of LWAPP errors debug pm pki enable—Shows the debug ofcertificate messages that are passed between the AP and the WLCController Does Not Defend AP-Manager IP AddressThis issues is a result of bug CSCsg75863. If the user accidently injects a device on the subnet that uses the AP-manager IP address of the controller, the Address Resolution Protocol (ARP) cache on the default gateway router is refreshed with the wrong MAC address. When this occurs, the APs can no longer reach the controller and drop into their discovery phase to look for a controller. The APs send discovery requests, and the controller responds with discovery replies, but the JOIN requests never reach the AP-manager interface of the controller because of the bad ARP entry on the gateway router. After the default 4 hour ARP refresh interval, the APs join the controller if the device is removed.A workaround for this issue is to configure the static ARP entries on the gateway router of the controller for these IP addresses:Management IP address—Customers gain access to the graphical user interface (GUI) from another subnet, and the controller receives the AP discovery requests.AP-Manager IP address—APs join the controller from another subnet.Every Dynamic interface IP address—Packets from other subnets reach the dynamic interface of the controller.DHCP packets transmit from the interface of the wireless client. Telnet or SSH to the gateway address of the controller, and use the arp command in order to add the ARP entries. Use the ping command on the default router of the controller to the different addresses in order to refresh the ARP cache on the router. In order to discover the MAC addresses, use this command: show arp | include .Troubleshoot a Lightweight Access Point Not Joining a Wireless LAN ControllerRefre to Troubleshoot a Lightweight Access Point Not Joining a Wireless LAN Controller for information on some of the issues why a Lightweight Access Point (LAP) fails to join a WLC and how to troubleshoot the issues.Cisco Support Community - Featured ConversationsCisco Support Community is a forum for you to ask and answer questions, share suggestions, and collaborate with your peers. Below are just some of the most recent and relevant conversations happening right now.。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
AIR-CT5508-500-K9 AIR-CT5508-250-K9 AIR-CT5508-100-K9 AIR-CT5508-50-K9 AIR-CT5508-25-K9 AIR-CT5508-12-K9
Cisco 5508 Series Wireless Controller for up to 500 APs Cisco 5508 Series Wireless Controller for up to 250 APs Cisco 5508 Series Wireless Controller for up to 100 APs Cisco 5508 Series Wireless Controller for up to 50 APs Cisco 5508 Series Wireless Controller for up to 25 APs Cisco 5508 Series Wireless Controller for up to 12 APs
3、VLAN40用作WPA/WPA2认证,认 SSID:VLAN30 证用本地EAP
SSC
所有3层网关设置在3层交换机上,地址254
WLC的组成及接口
▪ 管理接口:使用静态IP 地址的接口,用于传输带内管理数据流,这些接口用于建立 到 WLC 的Web、安全外壳(SSH)或Telnet 会话。
▪ AP 管理接口:使用静态IP 源自址的接口,所有LAP 都使用它来端接CAPWAP 隧道, WLC 也在该接口上侦听LAP 试图发现控制器时发送的子网广播。
▪ 虚拟接口:用于中继来自无线客户端的DHCP 请求的逻辑接口,给该接口分配一个 伪造 (但唯一)的静态IP 地址,这样客户端将把该虚拟地址视为其DHCP 服务器, 在同一个移 动组中,所有WLC 都必须使用相同的虚拟接口地址。
▪ 服务端口:Cisco 5500 系列WLC 使用的带外以太网接口,仅当控制器正在启动或网 络问 题导致无法进行其他方式的接入时才使用它,Catalyst 6500 无线服务模块 ( Wireless Service Module,WiSM )有一个连接到机架监控器的内部服务端口。
▪ 集散系统端口:将WLC 连接到园区网中交换机的接口,该接口通常是一个中继链路 , 用于传输覆盖了LAP 和VLAN 的数据流。
WLC的组成及接口(续)
▪ 动态接口:根据需要,为通过CAPWAP 隧道扩展到LAP 的VLAN自动创建 的接口,动态 接口有时也被称为用户接口,动态接口使用的IP 地址属于无 线客户端VLAN 的子网。
$220,490.00 $136,490.00
$83,990.00 $47,240.00 $33,590.00 $23,090.00
准备工作
▪ 网线和Console线。 ▪ 如果是5508,需要GLC光纤模块和光纤或者GLC-T模块 ▪ 确认控制器版本是否需要升级 (用命令show sysinfo查看系统版本) ▪ 相应数量的瘦AP
实验拓扑示例
VLAN1
PC//AAA服务器
SSID:VLAN20
SSC
TRUNK
fa0/1
Si
port 1
VLAN1/20/30/40 WLC
说明:
1、VLAN1用于连接控制器、AP和 ACS; 2、VLAN20用于WPA/WPA2认证,认 证服务器用ACS。 3、VLAN30用作OPEN/WEP/GUEST 客户接入
Cisco无线控制器配置基础文稿演示
优选Cisco无线控制器配置基础
基本配置任务及过程
▪ 准备工作
1. 控制器启动配置和升级控制器软件版本 2. 熟悉控制器配置界面 3. 连接AP到控制器上
▪ 配置任务
1. 思科CSSC无线客户端的安装和简单配置 2. 构建一个OPEN和一个WEP的无线网络 3. 构建一个简单WEB认证的无线网络 4. 构建一个支持本地EAP认证的无线网络 5. 构建一个用ACS做AAA认证的无线网络
4个GE口, 2个上联口,2个下联口 其中2个GE口有以太网供电 最多支持到50个AP,500个客户 端; 多达300Mbps的吞吐量
AIR-CT2504-5-K9 AIR-CT2504-15-K9 AIR-CT2504-25-K9 AIR-CT2504-50-K9
2504 Wireless Controller with 5 AP Licenses 2504 Wireless Controller with 15 AP Licenses 2504 Wireless Controller with 25 AP Licenses 2504 Wireless Controller with 50 AP Licenses
PS准irz备ees工e3n0作tPaTtion Title Option 2: Live
基本设备
▪ 控制器 5500或者2500系列 ▪ AP:1140或者1260等支持802.11n的产品 ▪ 交换机: 最好是3560X千兆POE交换机
2500系列无线控制器
▪ 支持802.11a/b/g/n ▪ 支持PCI认证 ▪ WLC2500 硬件
$3,743.00 $7,493.00 $13,493.00 $19,493.00
5500系列无线控制器
▪ 1 RU 高度
8口千兆上联
▪ 支持 12, 25, 50, 100, 250, 500 AP; ▪ 支持多达7000个客户端; ▪ 经过优化的802.11n性能;
▪ 智能射频控制平面,可以自行配置、修 复和优化。
▪ 分配给 LAP 的IP 地址不必属于AP 管理器子网,在小型网络中,LAP 和 WLC 可能位于 同一个子网中,因此它们在第2 层是相邻的,在大型网络中 ,LAP 将分散在不同的交换模块 中,LAP 和WLC 的IP 地址将各不相同, 因为它们不是第2 层邻居,这些地址将不属于AP 管理子网。
▪ 通常,预留一个管理VLAN 和子网供WLC 和CAPWAP 使用,可以将管理子 网中的IP 地 址分配给管理接口和AP 管理器接口。所有来自外部的管理数 据流 (基于Web 的、Telnet、 SSH 或AAA )和CAPWAP 隧道数据流都 将到达这些地址,LAP 将被放置到网络的各个地方, 甚至是不同的交换模 块中,因此应将LAP 数据流视为外部的。