aruba配置手册
Arubavlan基本配置手册
Aruba vlan 基本配置手册本章主要描述有关控制器的基本的网络配置,主要内容如下:一、VLANs 配置二、配置端口三、VLAN 协议四、配置静态路由五、环回IP地址配置六、控制器IP地址配置七、GRE隧道配置第一部分:VLANs配置/虚拟局域网配置2层交换机控制器的操作运用是以VLAN作为广播域,作为2层交换机,控制器要求需要外界的路径来实现与VLANs的路径连通。
该控制器还可以作为第三层交换机,可以定义VLAN 之间的交通路线的控制器。
你可以在控制器上配置一个/多个物理端口实现一个虚拟局域网。
另外,每个无线客户端口关联是连接到一个特定的虚拟局域网的端口控制器上。
你可以根据你的网络需要替换所有经认证授权的无线用户到单个VLAN或者替换到不同的VLANs。
VLANs可以单独存在在控制器里面或者可以通过802.1q VLAN标签存在在控制器外部。
你可以选择在控制器上为VLAN配置一个IP地址和子网掩码,当VLAN上最近的物理端口被激活的同时,该IP地址也被激活。
该VLAN IP地址可以作为外部设备的一个接入点,指向虚拟局域网IP地址的数据包不是为控制器指定的而是根据控制器的IP路由表来转发的。
创建和更新VLANs:创建和更新单个/多个VLANs1. 通过WEBUI 来创建或者修改单个VLAN1)打开2)点击“ADD新建”按钮创建一个新的VLAN。
(若需要修改,点击Edit按钮)具体参照58页创建一系列的VLANs。
3)为VLAN增加一个物理端口,点击选项4)点击2. 通过CLI(命令)创建或者修改VLAN3.通过WEBUI 来创建或者修改多个VLAN1)一次性增加并联的VLANs,点击2)在弹出的窗口,输入你想要创建的VLANs 序列。
例如,增加一个ID号码为200-300和302-350的VLAN,输入200-300,302-350。
3)点击“OK”4)为VLAN增加物理端点,点击“EDIT”进入你想要配置的VLAN页面,点击“PortSelection”选项设置端口。
(完整)aruba配置手册
拓扑图如下:客户的要求如下:ap地址通过核心交换机分配,全部在一个vlan中无线用户地址通过核心交换机分配,按照楼层不同,对应不同的vlan,分配不同的地址用户采用web或802.1x认证方式,与内部radius认证服务器联动所有ap均向外公布同一个ssid设备初始化设置拿到设备后,先进行初始化配置,恢复设备到出厂设置状态,在恢复出厂设置后,通过console连接到设备上,按照下面的提示进行初始信息的输入:Enter System name [Aruba5000]: Aruba—masterEnter VLAN 1 interface IP address [172。
16。
0。
254]:Enter VLAN 1 interface subnet mask [255。
255。
255。
0]:Enter IP Default gateway [none]:Enter Switch Role, (master|local) [master]:Enter Country code (ISO-3166), <ctrl—I> for supported list: cnYou have chosen Country code CN for China (yes|no)?: yEnter Time Zone [PST—8:0]:Enter Time in GMT [09:44:27]:Enter Date (MM/DD/YYYY) [3/6/2007]:Enter Password for admin login (up to 32 chars): *****Re—type Password for admin login: *****Enter Password for enable mode (up to 15 chars): ******Re-type Password for enable mode: ******Do you wish to shutdown all the ports (yes|no)?[no]: nCurrent choices are:System name: Aruba800—4VLAN 1 interface IP address: 172。
Aruba设备配置操作手册
Aruba 无线控制器内部试验文档2010年06月目录第一章.Aruba售后基础.................................................................................................. - 4 -一.Aruba产品简介 .................................................................................................................... - 4 -1.Aruba 无线控制器(AC) ................................................................................................. - 4 -2.Aruba 无线接入点(AP) ................................................................................................. - 5 -二.组网方式 ............................................................................................................................. - 6 -1.与有线网二层连接............................................................................................................. - 6 -2.与有线网三层连接............................................................................................................. - 7 -三.控制器登陆方式 .................................................................................................................. - 7 -第二章.控制器Web基本管控 ......................................................................................... - 8 -1.登陆控制器............................................................................................................................ - 8 -2.修改登录密码........................................................................................................................ - 9 -3.查看控制器状态 .................................................................................................................. - 12 -4.查看接口状态...................................................................................................................... - 13 -5.查看AP状态.......................................................................................................................... - 15 -6.查看用户状态...................................................................................................................... - 17 -7.添加/清除黑名单 ................................................................................................................ - 19 -第三章.控制器CLI配置调试 .......................................................................................... - 21 -一.Aruba基础配置 .................................................................................................................. - 21 -1.Console登陆...................................................................................................................... - 21 -2.恢复出厂配置 .................................................................................................................. - 22 -3.初始化配置 ...................................................................................................................... - 22 -4.保存配置参数 .................................................................................................................. - 23 -5.Image升级 ........................................................................................................................ - 23 -6.备份与恢复配置文件 ....................................................................................................... - 23 -7.DHCP配置 ......................................................................................................................... - 24 -8.配置AP ............................................................................................................................. - 25 -9.为无线终端用户单独配置VLAN ....................................................................................... - 29 -二.Aruba无线认证加密方式................................................................................................... - 31 -1.OPEN ................................................................................................................................ - 31 -2.PSK 认证 .......................................................................................................................... - 32 -3.MAC地址认证................................................................................................................... - 33 -4.Dot1x (802.1x)认证: ................................................................................................. - 34 -5.Captive-portal认证............................................................................................................ - 35 -三.Aruba无线安全策略 .......................................................................................................... - 37 -1.Captive Portal界面定制 .................................................................................................... - 37 -2.Demo License .................................................................................................................... - 38 -3.PEF license ........................................................................................................................ - 39 -4.role 应用.......................................................................................................................... - 42 -5.利用role做带宽限制策略 ................................................................................................. - 43 -6.Radius服务器.................................................................................................................... - 44 -7.Master Local ..................................................................................................................... - 46 -8.VRRP ................................................................................................................................. - 47 -第四章.控制器Web配置调试 ....................................................................................... - 49 -1.AP更改组配置...................................................................................................................... - 49 -2.AP更改名字配置 .................................................................................................................. - 50 -第五章.Troubleshooting........................................................................................... - 52 -1.AP指示灯说明...................................................................................................................... - 52 -2.AP未启动故障检查 .............................................................................................................. - 52 -第一章.Aruba售后基础一.Aruba产品简介这里只是把Aruba全套产品线构成做简单展现,以便了解使用Aruba设备,详细产品说明请查看产品详细资料。
Aruba无线网络基本配置指导手册
Aruba无线网络基本配置指导手册2009-09一、无线方案设计 (3)1.1.无线网络拓扑图及组网设计........................................................... 错误!未定义书签。
1.1.1工程实施网络拓扑图............................................................ 错误!未定义书签。
1.1.2无线网络设计描述................................................................ 错误!未定义书签。
1.2无线网络设备的部署设计............................................................... 错误!未定义书签。
1.2.1无线控制器的部署................................................................ 错误!未定义书签。
1.2.2无线接入点AP的部署......................................................... 错误!未定义书签。
1.3网络VLAN 和IP地址规划 ........................................................... 错误!未定义书签。
1.3.1无线控制器VLAN 和IP地址规划 .................................... 错误!未定义书签。
1.3.2无线接入点AP的IP地址及VLAN规划 .......................... 错误!未定义书签。
1.3.3无线用户VLAN及IP地址规划 ......................................... 错误!未定义书签。
aruba操作手册
无线控制器配置手册一无线控制器初始化配置无线控制器刚启动的时候,是没有任何配置的,需要进行初始化配置才能进行管理。
启动无线控制器,进入到以下界面:Enter System name [Aruba3200]: Aruba-masterEnter VLAN 1 interface IP address [172.16.0.254]: 172.16.0.254Enter VLAN 1 interface subnet mask [255.255.255.0]: 255.255.255.0Enter IP Default gateway [none]:Enter Switch Role, (master|local) [master]:masterEnter Country code (ISO-3166), <ctrl-I> for supported list: CNYou have chosen Country code GB for United Kingdom (yes|no)?: yesEnter Time Zone [PST-8:0]: GMT-0:0Enter Time in GMT [14:27:05]: 14:27:05Enter Date (MM/DD/YYYY) [2/20/2007]: 11/03/2008Enter Password for admin login (up to 32 chars): adminRe-type Password for admin login: adminEnter Password for enable mode (up to 15 chars):enableRe-type Password for enable mode:******Do you wish to shutdown all the ports (yes|no)? [no]: noCurrent choices are:System name: Aruba_masterVLAN 1 interface IP address: 172.16.0.254VLAN 1 interface subnet mask: 255.255.255.0IP Default gateway: noneSwitch Role: masterTime Zone: GMT-0:0Ports shutdown: noIf you accept the changes the switch will restart!Type <ctrl-P> to go back and change answer for any questionDo you wish to accept the changes (yes|no)yesCreating configuration... Done.System will now restart!初始化配置完成后,设备会重新启动重启完成以后进入到以下配置界面,用刚刚初始化配置的用户名和密码进行登陆。
aruba配置手册
wlan ssid-profile "default"wpa-passphrase 1234567890 ---tkip设置provision-ap copy-provisioning-params ip-addr 192.168.102.250 provision-ap no ipaddrprovision-ap a-ant-gain 2provision-ap g-ant-gain 2provision-ap a-antenna 1provision-ap g-antenna 1provision-ap external-antennaprovision-ap master 192.168.102.100provision-ap server-ip 192.168.102.100provision-ap ap-group "default"provision-ap ap-name "00:0b:86:cb:bd:62"provision-ap no syslocationprovision-ap fqln ""provision-ap reprovision ip-addr 192.168.102.250interface loopback ip address "192.168.30.200"apboot> helpboot - run bootcmd or boot AP image or elf file or from flashcd - cfg register displaycw - cfg register writedis - disassemble instructionsdhcp - invoke DHCP client to obtain IP/boot paramseloop - loopback received ethernet framesflash - FLASH sub-systemgo - start application at address 'addr'help - print online helpmc - memory copymd - memory displaymii - MII sub-systemmtest - simple RAM testnetstat - net statisticsmw - memory writeping - ping net hostprintenv - env displaypurgeenv - purge envregs - display various regsreset - reset processorrun - run commands in an environment variablesaveenv - save environment variables to persistent storagesetenv - set variable in env (ipaddr/netmask/gatewayip/master/serverip) setenv ipaddr x.x.x.xsetenv netmask x.x.x.xsetenv gatewayip x.x.x.xsetenv serverip x.x.x.xsetenv master x.x.x.xtcpdump - dump received packetstcpsend - send TCP packettftpboot - boot via tftptlb - dump TLBtrace - dump trace bufferversion - print monitor versionwdog - stop refreshing watchdog timerapboot>No spanning-tree 关闭spanning-treeAdp discover disable 关闭ADPAdp imgp-join disable 关闭im-j一、WEB页面认证1、wlan ssid-profile (staff-ssid-profile) :定义ssid配置文件1.1 essid staff :定义ssid下的essid—显示出来的ssid2、wlan virtual-ap (staff-vap-profile) :定义virtual-ap的配置文件2.1 ssid-profile (staff-ssid-profile) :在virtual-ap下引用定义过SSID2.2 vlan ID aa,bb :把virtual-ap加入到要ssid所属VLAN3、aaa profile staff-aaa-profile :定义AAA认证配置文件4、aaa server-group (staff-servergroup) :定义server-group配置文件4.1 auth-server internal :定义认证服务器为本地认证4.2 set role condition role value-of 设置角色set role condition <condition> set-value <role> position <number>5、aaa authentication captive-portal (staff-auth-profile) :captive-portal配置5.1 server-group staff-servergroup :在下面引用定义过的server-group6、user-role staff-logon :定义用户登陆前权限的配文件6.1 access-list session logon-control position 1定义用户登陆前的权限--位置16.2 access-list session captiveportal position 2 定义用户登陆前的权限--26.3 Captive-Portal staff-auth-profile position 3定义过captive-portalRe-authentication interval 480 再次认证间隔480秒默认3600秒7、user-role vip-role :定义用户成功登陆后的配置文件7.1session-acl allowall 赋予所有允许权限session-acl http-acl 只有http8、wlan virtual-ap staff-vap-profile :进入定义过的virtual-ap配置文件8.1 aaa-profile staff-aaa-profile :引用定义过的AAA配置文件9、ap-group default :定义ap-group,最好用默认的9.1 virtual-ap staff-vap-profile :引用定义过的Virtual-ap配置文件10、aaa profile staff-aaa-profile :进入定义过的AAA配置文件10.1 initial-role staff-logon :把initial-role改为定义过用户登陆前配置11、aaa authentication-server internal use-local-switch :定义认证SERVER为本地交换机12、local-userdb add username staff password 123456 role vip-role :定义用户的登陆的用户名和密码及权限二、MAC 地址认证配置1、wlan ssid-profile (staff-ssid-profile) :定义ssid配置文件1.1 essid staff :定义ssid下的essid2、wlan virtual-ap (staff-vap-profile) :定义virtual-ap的配置文件2.1 ssid-profile (staff-ssid-profile) :virtual-ap下引用定义过的SSID配置文件2.2 vlan ID :把virtual-ap加入到要ssid所属的VLAN3、aaa profile staff-aaa-mac-profile :定义AAA认证配置文件4、aaa authentication mac staff-mac-profile :定义mac配置文件4.1 Delimiter dash :定义mac地址的格式4.2 Case upper (upper/lower):定义mac地址的大/小写备注:aaa authentication mac staff-mac-profileclone <profile>delimiter {colon|dash|none}max-authentication-failures 数字aaa authentication mac mac-blacklist MAC黑名单max-authentication-failures 5 最多认证失败次数5、aaa server-group (staff-macservergroup) :定义server-group配置文件5.1 auth-server internal :定义认证服务器为本地认证5.2 set role condition role value-of6、user-role staff-logon :定义用户登陆前权限的配文件6.1 access-list session logon-control :定义用户登陆前的权限6.2 access-list session captiveportal :定义用户登陆前的权限7、user-role vip-role :定义用户成功登陆后的配置文件7.1session-acl allowall :赋予权限8、wlan virtual-ap staff-vap-profile :进入定义过的virtual-ap配置文件8.1 aaa-profile staff-aaa-mac-profile :引用定义过的AAA配置文件9、ap-group default :定义ap-group,最好用默认的9.1 virtual-ap staff-vap-profile :引用定义过的Virtual-ap配置文件10、aaa profile staff-aaa-mac-profile :进入定义过的AAA配置文件10.1 initial-role staff-logon :把initial-role改为定义过的用户登陆前的配置文件10.2 authentication-mac staff-mac-profile :把定义的authentication mac文件引用10.3 mac-server-group staff-macservergroup :把定义的servergroup加入11、aaa authentication-server internal use-local-switch :定义认证SERVER为本地交换机12、local-userdb add username mac地址password mac地址 role vip-role :定义用户的登陆的用户名和密码及权限注意:如果是有线直接连在端口上的话要进行认证必须把连接口设为UNTRUSTED.同时在设定:进入aaa authentication wired 后设定:profile (staff-aaa-profile) 为你设定认证的AAA profileBlacklist:5次错误就拒绝访问show aaa authentication captive-portal default:Max authentication failures 改为5次show aaa authentication dot1x default:Max authentication failures 改为5次1、aaa bandwidth-contract "256" kbits "256"2、aaa bandwidth-contract "256" kbits 256ip access-list session "pass"any any any permit queue low!user-role "ap512"access-list "pass" position 1bw-contract "256" per-user upstreambw-contract "256" per-user downstreamaaa bandwidth-contract "2M-BW" mbits "2" 带宽2M控制aaa bandwidth-contract 128_up kbits 128 带宽128k控制aaa bandwidth-contract 512 kbits 512aaa bandwidth-contract 64 kbits 64aaa bandwidth-contract 256 kbits 256aaa bandwidth-contract 1 mbits 1 带宽1M控制aaa bandwidth-contract 128_up kbits 128user-role 128bw-contract 128_up per-user upstreamuser-role ap-rolesession-acl controlsession-acl ap-acl!user-role pre-employeesession-acl allowallMaster mobility controller configuration1Initial setup of Aruba-master2Core VLAN configuration and IP addressing3Core VLAN port assignment4Loopback IP address ----- interface loopback ip address 设置环回地址Deploy APs5配置AP VLAN6配置 AP VLAN DHCP Server7Connect Aruba APs8Provisioning Aruba APs(Aruba-master) (config-if)#write mSaving Configuration...ip dhcp pool "userpool" 定义pool的名字default-router 192.168.11.254 定义默认路由网关—loopback地址dns-server 192.168.11.254---202.106.0.20 定义DNS网关lease 8 0 0network 192.168.11.0 255.255.255.0service dhcp 启动dhcpinterface gigabitethernet 1/1no muxportswitchport mode trunkip default-gateway 192.168.0.254interface vlan 1no ip addressno ip igmpinterface gigabitethernet 1/1no switchport access vlaninterface loopback ip address "192.168.0.100"(Aruba800-4) (config) # show ip interface briefInterface IP Address / IP Netmask Admin Protocolvlan 1 172.16.0.254 / 255.255.255.0 up upvlan 10 192.168.0.1 / 255.255.255.0 up upvlan 30 192.168.30.200 / 255.255.255.0 up uploopback unassigned / unassigned up up(Aruba800-4) (config) # rf arm-profile default ----------关闭ARM后调整channel---ok (Aruba800-4) (Adaptive Radio Management (ARM) profile "default") #assignment disable (Aruba800-4) (Adaptive Radio Management (ARM) profile "default") #no scan(Aruba800-4) (Adaptive Radio Management (ARM) profile "default") #write memoryrf dot11g-radio-profile "default"tx-power 20 ------------------------发射功率调整rf dot11g-radio-profile "default"channel 11 ------------------------调整AP信道interface vlan 20ip address 192.168.0.1 255.255.255.0ip nat insideno ip igmp存配置:24 (Aruba2400) #configure t25(Aruba2400) (config) #copy tftp: 172.16.0.100 aruba2400-0904.cfg flash: 2400.bak 26(Aruba2400) (config) #copy flash: 2400.bak flash: 2400.cfg27(Aruba2400) # copy running-config tftp: 192.168.4.100 aruba2400-0904.cfgRadius配置:aaa authentication-server radius Radius1host <ipaddr>key <key>enableaaa server-group corpnetauth-server Radius1dot1x配置:aaa authentication dot1x corpnetaaa profile corpnetauthentication-dot1x corpnetdot1x-default-role employeedot1x-server-group corpnetvirtual AP:wlan ssid-profile corpnetessid Corpnetopmode wpa2-aeswlan virtual-ap corpnetvlan 1aaa-profile corpnetssid-profile corpnetap-group defaultvirtual-ap corpnet时间设定:time-range workhours periodic周期weekday 09:00 to 17:00ip access-list session restricted 受限制any any svc-http permit time-range workhoursany any svc-https permit time-range workhoursuser-role guestsession-acl restrictedmesh设置:ap mesh-radio-profile <profile-name>11a-portal-channel <11a-portal-channel>11g-portal-channel <11g-portal-channel>a-tx-rates [6|9|12|18|24|36|48|54]beacon-period <beacon-period>children <children>clone <source-profile-name>g-tx-rates [1|2|5|6|9|11|12|18|24|36|48|54]heartbeat-threshold <count>hop-count <hop-count>link-threshold <count>max-retries <max-retries>metric-algorithm {best-link-rssi|distributed-tree-rssimpv <vlan-id>rts-threshold <rts-threshold>tx-power <tx-power>ap mesh-radio-profile <profile-name>clone <source-profile-name>ap-group <group>mesh-radio-profile <profile-name>ap-name <name>mesh-radio-profile <profile-name>wlan ssid-profile <profile>essid <name>opmode <method> 方式wpa-passphrase <string> (if necessary)wlan virtual-ap <name>ssid-profile <profile>vlan <vlan>forward-mode bridgeaaa-profile <name>rap-operation {always|backup|persistent}ap-group <name>virtual-ap <name># ip access-list session "Employee-Policy"any any any permit queue lowRemote AP配置The firewall must be configured to pass NAT-T traffic (UDP port 4500) to the controller.)1、Configure a public IP address for the controller.2、Configure the VPN server on the controller. The remote AP will be a VPN client to the server.3、Configure the remote AP role.4、Configure the authentication server that will validate the username and password for the remote AP.5、Provision the AP with IPSec settings, including the username and passwordfor the AP, before you install it at the remote location.1、Cli:vlan <id>interface fastethernet <slot>/<port>switchport access vlan <id>interface vlan <id>ip address <ipaddr> <mask>2、Using the CLI to configure VPN server:vpdn group l2tpppp authentication PAPip local pool <pool> <start-ipaddr> <end-ipaddr>crypto isakmp key <key> address <ipaddr> netmask <mask>3、Using the CLI to configure the user role:(table1) (config) # user-role remote(table1) (config-role) #session-acl allowallip access-list session <policy>any any svc-papi permitany any svc-gre permitany any svc-l2tp permitany alias mswitch svc-tftp permitany alias mswitch svc-ftp permit4、Using the CLI to configure the VPN authentication profile:4.1 aaa server-group <group>auth-server <server>4.2 aaa authentication vp ndefault-role <role>server-group <group>5、Using the CLI to enable double encryption:ap system-profile <profile>double-encryptap-name <name> 需要插上远端AP后配置ap-system-profile <profile>Using the CLI to enable double encryption:ap system-profile <profile>double-encryptap-name <name>ap-system-profile <profile>Using the CLI to configure the AAA profile:aaa profile <name>initial-role <role>authentication-dot1x <dot1x-profile>dot1x-default-role <role>dot1x-server-group <group>Using the CLI to define the backup configuration in the virtual AP profile: wlan ssid-profile <profile>essid <name>opmode <method>wpa-passphrase <string> (if necessary)wlan virtual-ap <name>ssid-profile <profile>vlan <vlan>forward-mode bridgeaaa-profile <name>rap-operation {always|backup|persistent}ap-group <name>virtual-ap <name>orap-name <name>virtual-ap <name>Using the CLI to configure the DHCP server on the AP:ap system-profile <name>lms-ip <ipaddr>master-ip <ipaddr>rap-dhcp-server-vlan <vlan>wlan virtual-ap <name>ssid-profile <profile>vlan <vlan>forward-mode bridgeaaa-profile <name>rap-operation {always|backup|persistent}ap-group <name>ap-system-profile <name>virtual-ap <name>orap-name <name>ap-system-profile <name> virtual-ap <name>。
Aruba快速配置手册
Aruba快速配置手册测试环境:连接在同一台交换机上面AP93 ip:172.16.20.254/244Aruba-650 VLAN 1:192.168.16.0/24AP VLAN 20:172.16.20.0/24User VLAN 30:172.16.30.1/241、Aruba-650初始化配置基本配置成功之后,会提示你自动重启2、通过web界面登录,浏览器输入https://192.168.16.1633、配置Aruba-650 上联端口的接入模式为trunk,允许所有vlan 通过(Aruba650) (config) #interface gigabitethernet 1/0(Aruba650) (config-if)#switchport mode trunk(Aruba650) (config-if)#switchport trunk allowed vlan all4、Aruba650配置DHCP,其中VLAN 20:172.16.20.0/24、AC的VLAN1:192.168.16.0/24、USER的VLAN 30:172.16.30.0/24;配置三个DHCP (Aruba650) (config) #vlan 20(Aruba650) (config) #interface vlan 20(Aruba650) (config-subif)#ip address 172.16.20.1 255.255.255.0(Aruba650) (config-subif)#operstate up(Aruba650) (config-subif)#no shut(Aruba650) (config-subif)#exit(Aruba650) (config) #ip dhcp pool ap(Aruba650) (config-dhcp)#network 172.16.20.0 255.255.255.0(Aruba650) (config-dhcp)#default-router 172.16.20.1(Aruba650) (config-dhcp)#dns-server 61.177.7.1(Aruba650) (config-dhcp)#exit(Aruba650) (config) #service dhcp(Aruba650) (config) #vlan 30(Aruba650) (config) #interface vlan 30(Aruba650) (config-subif)#ip address 172.16.30.1 255.255.255.0 (Aruba650) (config-subif)#operstate up(Aruba650) (config-subif)#no shut(Aruba650) (config-subif)#exit(Aruba650) (config) #ip dhcp pool user_client(Aruba650) (config-dhcp)#network 172.16.30.0 255.255.255.0 (Aruba650) (config-dhcp)#default-router 172.16.30.1(Aruba650) (config-dhcp)#dns-server 61.177.7.1查看已配置的DHCP,show ip dhcp database(Aruba650) (config) #show ip dhcp databaseDHCP enabled# apsubnet 172.16.20.0 netmask 255.255.255.0 {option vendor-class-identifier "ArubaAP";option vendor-encapsulated-options "192.168.16.163";option domain-name-servers 61.177.7.1;option routers 172.16.20.1;range 172.16.20.2 172.16.20.254;authoritative;}# user_clientsubnet 172.16.30.0 netmask 255.255.255.0 {option vendor-class-identifier "ArubaAP";option vendor-encapsulated-options "192.168.16.163";option domain-name-servers 61.177.7.1;option routers 172.16.30.1;range 172.16.30.2 172.16.30.254;authoritative;}5、开启Aruba650的telnet端口,telnet cli6、新增的SSID的模式为open定义aaa profile(Aruba650)(config)#aaa profile open-aaa(Aruba650) (AAA Profile "open-aaa") #Initial-role authenticated //默认为logon 打开IE 会有问题(Aruba650) (AAA Profile "open-aaa") #exit定义ssid profile(Aruba650) (config)# wlan ssid profile open-ssid(Aruba650) (SSID Profile "open-ssid") #essid Aruba-AP //定义ssid名字(Aruba650) (SSID Profile "open-ssid") #opmod opensystem //定义加密方式(Aruba650) (SSID Profile "open-ssid") #exit定义virtual-ap profile(Aruba650) (config) #wlan virtual-ap open-vap(Aruba650) (Virtual AP profile "open-vap") #aaa prolife open-aaa //关联aaa profile(Aruba650) (Virtual AP profile "open-vap") #ssid profile open-ssid //关联ssid profile(Aruba650) (Virtual AP profile "open-vap") #vlan 30 //关联用户vlan创建的open-aaaAAA相关联定义ap-group profile(Aruba650) (config) #ap-group open-ap(Aruba650) (AP group "open-ap") #virtual-ap open-vap //关联virtual-ap profileap加组到定义好的ap-group(Aruba650) (config)#ap-regroup [ap-name | serial-num | wired-mac]open-ap创建的AP组最后需要做NAT,才能让VLAN 30的客户能够出去上网,输入一下命令就可以上网了、(Aruba650) (config) #interface vlan 30(Aruba650) (config-subif)#ip nat inside7、查看吐出的SSID:Aruba-AP8、连接Aruba-AP,查看获取的IP地址,可以上网输入以上为Aruba650测试文档。
Aruba WLAN简明配置手册-v1
Aruba WLAN 简明配置手册目录目录 (2)1.初始化配置 (3)1.1.无线控制器初始化配置 (3)1.2.恢复出厂设置-无线控制器 (4)1.3.恢复出厂设置-Aruba AP (4)2.基本网络参数配置及维护 (6)2.1.基本网络参数配置 (6)2.2.控制器基本维护操作 (7)2.3.管理员帐号管理 (9)3.理解Aruba WLAN配置结构框架 (11)3.1.基本WLAN服务配置 (11)3.2.基于角色的用户策略管理 (12)4.配置范例 (14)4.1.建立WPA2-PSK服务 (14)4.2.建立Portal认证 (19)4.3.建立802.1X认证 (28)4.4.同一SSID中为不同用户配置不同的权限 (38)4.5.设置用户期限 (39)4.6.设定区域管理 (43)4.7.配置日志服务器 (49)4.8.带宽限制 (49)1.初始化配置1.1.无线控制器初始化配置Enter System name [Aruba3400]:Enter VLAN 1 interface IP address [172.16.0.254]:Enter VLAN 1 interface subnet mask [255.255.255.0]:Enter IP Default gateway [none]:Enter Switch Role, (master|local) [master]: ————————————控制器角色Enter Country code (ISO-3166), <ctrl-I> for supported list: cn———————控制器所在国家代码,此选项影响You have chosen Country code CN for China (yes|no)?:yes可用RF channel及功率参数Enter Time Zone [PST-8:0]: UTC8:0——————————————-时区系统(UTC、PST等)及所在时区Enter Time in UTC [06:07:59]: 6:11:30——————————————所选时区系统的标准时间而不是本地时间,Enter Date (MM/DD/YYYY) [8/14/2011]: 否则控制器的时钟可能就不对了。
Aruba无线控制器用户初始配置手册(suning)
Aruba无线控制器用户初始配置手册(suning)苏宁电器Aruba无线控制器用户配置手册Version 1.3苏宁电器Aruba无线控制器用户配置手册一、连接Aruba无线控制器1.将console线RJ45一端连接至无线控制器的SERIAL端口,另一端连接至电脑COM口(笔记本没有COM口的可以使用USB-COM线)。
2.打开相应的配置终端软件(可以使用Secure-CRT或者使用系统自带的超级终端软件,建议使用Secure-CRT这款第三方终端软件)3.配置终端软件的参数Secure-CRT配置步骤:协议选择Serial,点击“下一步”端口选择好本电脑上使用的COM接口,波特率选择“9600”,数据流控制选型将前面的勾全部去掉,其它选项保持不变,点击“下一步”点击“完成”即可登录到配置界面。
超级终端配置步骤:点击“开始”>“所有程序”>“附件”>“通讯”>“超级终端”在名称一栏自定义输入一个名称,例如:“suning”,点击“确定”在连接时使用选择好相应的COM接口,点击“确定”点击“还原为默认值”,再点击“确定”即可登录到配置界面。
二、配置向导第一次登录控制器会出现配置向导进行简单的配置开机运行到如下图所示,即到了配置向导界面配置如下:Enter System name [Aruba200]:此处直接回车即选择[]内的内容,例如此处回车即选择设备名称为:Aruba200,也可自己自定义系统名称Enter VLAN 1 interface IP address [172.16.0.254]:此处直接回车即选择VLAN 1的IP地址为:172.16.0.254,一般此处直接回车,后面可以另行更改Enter VLAN 1 interface subnet mask [255.255.255.0]:此处直接回车即选择VLAN1的IP地址的子网掩码为:255.255.255.0 Enter IP Default gateway [none]:此处为指定控制器的网关地址,即路由地址,一般这边不指定,等进入系统后重新配置指定Enter Switch Role, (master|local) [master]:此处为指定控制器角色,一般默认为master,可直接回车到下一步Enter Country code (ISO-3166), <ctrl-I> for supported list:此处为指定国家代码,中国即输入“CN”You have chosen Country code CN for China (yes|no)?:此处为让您确认是否为中国,可直接“yes”到下一步Enter Time Zone [PST-8:0]:此处为指定时区,一般我们指定为“GMT+8:0”Enter Time in UTC [11:44:55]:此处为指定时间,我们可根据当时北京时间进行配置Enter Date (MM/DD/YYYY) [11/22/2010]:此处为配置日期,月/日/年份Enter Password for admin login (up to 32 chars):此处为配置admin登录密码,自定义Re-type Password for admin login:重新确认admin登录密码Enter Password for enable mode (up to 15 chars):指定enable密码Re-type Password for enable mode:重新确认enable密码Do you wish to shutdown all the ports (yes|no)? [no]:此处为询问您是否想shutdown所有端口,默认配置为“no”,一般选择默认配置直接回车Do you wish to accept the changes (yes|no)此处询问你是否接受刚才的配置,直接“yes”此时控制器会重新启动,启动完之后便可进入系统。
aruba配置手册(参考模板)
wlan ssid-profile "default"wpa-passphrase 1234567890 ---tkip设置provision-ap copy-provisioning-params ip-addr 192.168.102.250 provision-ap no ipaddrprovision-ap a-ant-gain 2provision-ap g-ant-gain 2provision-ap a-antenna 1provision-ap g-antenna 1provision-ap external-antennaprovision-ap master 192.168.102.100provision-ap server-ip 192.168.102.100provision-ap ap-group "default"provision-ap ap-name "00:0b:86:cb:bd:62"provision-ap no syslocationprovision-ap fqln ""provision-ap reprovision ip-addr 192.168.102.250interface loopback ip address "192.168.30.200"apboot> helpboot - run bootcmd or boot AP image or elf file or from flashcd - cfg register displaycw - cfg register writedis - disassemble instructionsdhcp - invoke DHCP client to obtain IP/boot paramseloop - loopback received ethernet framesflash - FLASH sub-systemgo - start application at address 'addr'help - print online helpmc - memory copymd - memory displaymii - MII sub-systemmtest - simple RAM testnetstat - net statisticsmw - memory writeping - ping net hostprintenv - env displaypurgeenv - purge envregs - display various regsreset - reset processorrun - run commands in an environment variablesaveenv - save environment variables to persistent storagesetenv - set variable in env (ipaddr/netmask/gatewayip/master/serverip) setenv ipaddr x.x.x.xsetenv netmask x.x.x.xsetenv gatewayip x.x.x.xsetenv serverip x.x.x.xsetenv master x.x.x.xtcpdump - dump received packetstcpsend - send TCP packettftpboot - boot via tftptlb - dump TLBtrace - dump trace bufferversion - print monitor versionwdog - stop refreshing watchdog timerapboot>No spanning-tree 关闭spanning-treeAdp discover disable 关闭ADPAdp imgp-join disable 关闭im-j一、WEB页面认证1、wlan ssid-profile (staff-ssid-profile) :定义ssid配置文件1.1 essid staff :定义ssid下的essid—显示出来的ssid2、wlan virtual-ap (staff-vap-profile) :定义virtual-ap的配置文件2.1 ssid-profile (staff-ssid-profile) :在virtual-ap下引用定义过SSID2.2 vlan ID aa,bb :把virtual-ap加入到要ssid所属VLAN3、aaa profile staff-aaa-profile :定义AAA认证配置文件4、aaa server-group (staff-servergroup) :定义server-group配置文件4.1 auth-server internal :定义认证服务器为本地认证4.2 set role condition role value-of 设置角色set role condition <condition> set-value <role> position <number>5、aaa authentication captive-portal (staff-auth-profile) :captive-portal配置5.1 server-group staff-servergroup :在下面引用定义过的server-group6、user-role staff-logon :定义用户登陆前权限的配文件6.1 access-list session logon-control position 1定义用户登陆前的权限--位置16.2 access-list session captiveportal position 2 定义用户登陆前的权限--26.3 Captive-Portal staff-auth-profile position 3定义过captive-portalRe-authentication interval 480 再次认证间隔480秒默认3600秒7、user-role vip-role :定义用户成功登陆后的配置文件7.1session-acl allowall 赋予所有允许权限session-acl http-acl 只有http8、wlan virtual-ap staff-vap-profile :进入定义过的virtual-ap配置文件8.1 aaa-profile staff-aaa-profile :引用定义过的AAA配置文件9、ap-group default :定义ap-group,最好用默认的9.1 virtual-ap staff-vap-profile :引用定义过的Virtual-ap配置文件10、aaa profile staff-aaa-profile :进入定义过的AAA配置文件10.1 initial-role staff-logon :把initial-role改为定义过用户登陆前配置11、aaa authentication-server internal use-local-switch :定义认证SERVER为本地交换机12、local-userdb add username staff password 123456 role vip-role :定义用户的登陆的用户名和密码及权限二、MAC 地址认证配置1、wlan ssid-profile (staff-ssid-profile) :定义ssid配置文件1.1 essid staff :定义ssid下的essid2、wlan virtual-ap (staff-vap-profile) :定义virtual-ap的配置文件2.1 ssid-profile (staff-ssid-profile) :virtual-ap下引用定义过的SSID配置文件2.2 vlan ID :把virtual-ap加入到要ssid所属的VLAN3、aaa profile staff-aaa-mac-profile :定义AAA认证配置文件4、aaa authentication mac staff-mac-profile :定义mac配置文件4.1 Delimiter dash :定义mac地址的格式4.2 Case upper (upper/lower):定义mac地址的大/小写备注:aaa authentication mac staff-mac-profileclone <profile>delimiter {colon|dash|none}max-authentication-failures 数字aaa authentication mac mac-blacklist MAC黑名单max-authentication-failures 5 最多认证失败次数5、aaa server-group (staff-macservergroup) :定义server-group配置文件5.1 auth-server internal :定义认证服务器为本地认证5.2 set role condition role value-of6、user-role staff-logon :定义用户登陆前权限的配文件6.1 access-list session logon-control :定义用户登陆前的权限6.2 access-list session captiveportal :定义用户登陆前的权限7、user-role vip-role :定义用户成功登陆后的配置文件7.1session-acl allowall :赋予权限8、wlan virtual-ap staff-vap-profile :进入定义过的virtual-ap配置文件8.1 aaa-profile staff-aaa-mac-profile :引用定义过的AAA配置文件9、ap-group default :定义ap-group,最好用默认的9.1 virtual-ap staff-vap-profile :引用定义过的Virtual-ap配置文件10、aaa profile staff-aaa-mac-profile :进入定义过的AAA配置文件10.1 initial-role staff-logon :把initial-role改为定义过的用户登陆前的配置文件10.2 authentication-mac staff-mac-profile :把定义的authentication mac文件引用10.3 mac-server-group staff-macservergroup :把定义的servergroup加入11、aaa authentication-server internal use-local-switch :定义认证SERVER为本地交换机12、local-userdb add username mac地址password mac地址 role vip-role :定义用户的登陆的用户名和密码及权限注意:如果是有线直接连在端口上的话要进行认证必须把连接口设为UNTRUSTED.同时在设定:进入aaa authentication wired 后设定:profile (staff-aaa-profile) 为你设定认证的AAA profileBlacklist:5次错误就拒绝访问show aaa authentication captive-portal default:Max authentication failures 改为5次show aaa authentication dot1x default:Max authentication failures 改为5次1、aaa bandwidth-contract "256" kbits "256"2、aaa bandwidth-contract "256" kbits 256ip access-list session "pass"any any any permit queue low!user-role "ap512"access-list "pass" position 1bw-contract "256" per-user upstreambw-contract "256" per-user downstreamaaa bandwidth-contract "2M-BW" mbits "2" 带宽2M控制aaa bandwidth-contract 128_up kbits 128 带宽128k控制aaa bandwidth-contract 512 kbits 512aaa bandwidth-contract 64 kbits 64aaa bandwidth-contract 256 kbits 256aaa bandwidth-contract 1 mbits 1 带宽1M控制aaa bandwidth-contract 128_up kbits 128user-role 128bw-contract 128_up per-user upstreamuser-role ap-rolesession-acl controlsession-acl ap-acl!user-role pre-employeesession-acl allowallMaster mobility controller configuration1Initial setup of Aruba-master2Core VLAN configuration and IP addressing3Core VLAN port assignment4Loopback IP address ----- interface loopback ip address 设置环回地址Deploy APs5配置AP VLAN6配置 AP VLAN DHCP Server7Connect Aruba APs8Provisioning Aruba APs1 Default5 VLAN0004 Fa2/0-23 Gig2/24 Gig2/25(Aruba-master) (config-if)#write mSaving Configuration...ip dhcp pool "userpool" 定义pool的名字default-router 192.168.11.254 定义默认路由网关—loopback地址dns-server 192.168.11.254---202.106.0.20 定义DNS网关lease 8 0 0network 192.168.11.0 255.255.255.0service dhcp 启动dhcpinterface gigabitethernet 1/1no muxportswitchport mode trunkip default-gateway 192.168.0.254interface vlan 1no ip addressno ip igmpinterface gigabitethernet 1/1no switchport access vlaninterface loopback ip address "192.168.0.100"(Aruba800-4) (config) # show ip interface briefInterface IP Address / IP Netmask Admin Protocolvlan 1 172.16.0.254 / 255.255.255.0 up upvlan 10 192.168.0.1 / 255.255.255.0 up upvlan 30 192.168.30.200 / 255.255.255.0 up uploopback unassigned / unassigned up up(Aruba800-4) (config) # rf arm-profile default ----------关闭ARM后调整channel---ok (Aruba800-4) (Adaptive Radio Management (ARM) profile "default") #assignment disable (Aruba800-4) (Adaptive Radio Management (ARM) profile "default") #no scan(Aruba800-4) (Adaptive Radio Management (ARM) profile "default") #write memoryrf dot11g-radio-profile "default"tx-power 20 ------------------------发射功率调整rf dot11g-radio-profile "default"channel 11 ------------------------调整AP信道interface vlan 20ip address 192.168.0.1 255.255.255.0ip nat insideno ip igmp存配置:24 (Aruba2400) #configure t25(Aruba2400) (config) #copy tftp: 172.16.0.100 aruba2400-0904.cfg flash: 2400.bak 26(Aruba2400) (config) #copy flash: 2400.bak flash: 2400.cfg27(Aruba2400) # copy running-config tftp: 192.168.4.100 aruba2400-0904.cfgRadius配置:aaa authentication-server radius Radius1host <ipaddr>key <key>enableaaa server-group corpnetauth-server Radius1dot1x配置:aaa authentication dot1x corpnetaaa profile corpnetauthentication-dot1x corpnetdot1x-default-role employeedot1x-server-group corpnetvirtual AP:wlan ssid-profile corpnetessid Corpnetopmode wpa2-aeswlan virtual-ap corpnetvlan 1aaa-profile corpnetssid-profile corpnetap-group defaultvirtual-ap corpnet时间设定:time-range workhours periodic周期weekday 09:00 to 17:00ip access-list session restricted 受限制any any svc-http permit time-range workhoursany any svc-https permit time-range workhoursuser-role guestsession-acl restrictedmesh设置:ap mesh-radio-profile <profile-name>11a-portal-channel <11a-portal-channel>11g-portal-channel <11g-portal-channel>a-tx-rates [6|9|12|18|24|36|48|54]beacon-period <beacon-period>children <children>clone <source-profile-name>g-tx-rates [1|2|5|6|9|11|12|18|24|36|48|54]heartbeat-threshold <count>hop-count <hop-count>link-threshold <count>max-retries <max-retries>metric-algorithm {best-link-rssi|distributed-tree-rssi mpv <vlan-id>rts-threshold <rts-threshold>tx-power <tx-power>ap mesh-radio-profile <profile-name>clone <source-profile-name>ap-group <group>mesh-radio-profile <profile-name>ap-name <name>mesh-radio-profile <profile-name>wlan ssid-profile <profile>essid <name>opmode <method> 方式wpa-passphrase <string> (if necessary)wlan virtual-ap <name>ssid-profile <profile>vlan <vlan>forward-mode bridgeaaa-profile <name>rap-operation {always|backup|persistent}ap-group <name>virtual-ap <name># ip access-list session "Employee-Policy"any any any permit queue lowRemote AP配置The firewall must be configured to pass NAT-T traffic (UDP port 4500) to the controller.)1、Configure a public IP address for the controller.2、Configure the VPN server on the controller. The remote AP will be a VPN client to the server.3、Configure the remote AP role.4、Configure the authentication server that will validate the username and password for the remote AP.5、Provision the AP with IPSec settings, including the username and passwordfor the AP, before you install it at the remote location.1、Cli:vlan <id>interface fastethernet <slot>/<port>switchport access vlan <id>interface vlan <id>ip address <ipaddr> <mask>2、Using the CLI to configure VPN server:vpdn group l2tpppp authentication PAPip local pool <pool> <start-ipaddr> <end-ipaddr>crypto isakmp key <key> address <ipaddr> netmask <mask>3、Using the CLI to configure the user role:(table1) (config) # user-role remote(table1) (config-role) #session-acl allowallip access-list session <policy>any any svc-papi permitany any svc-gre permitany any svc-l2tp permitany alias mswitch svc-tftp permitany alias mswitch svc-ftp permit4、Using the CLI to configure the VPN authentication profile:4.1 aaa server-group <group>auth-server <server>4.2 aaa authentication vp ndefault-role <role>server-group <group>5、Using the CLI to enable double encryption:ap system-profile <profile>double-encryptap-name <name> 需要插上远端AP后配置ap-system-profile <profile>Using the CLI to enable double encryption:ap system-profile <profile>double-encryptap-name <name>ap-system-profile <profile>Using the CLI to configure the AAA profile:aaa profile <name>initial-role <role>authentication-dot1x <dot1x-profile>dot1x-default-role <role>dot1x-server-group <group>Using the CLI to define the backup configuration in the virtual AP profile: wlan ssid-profile <profile>essid <name>opmode <method>wpa-passphrase <string> (if necessary)wlan virtual-ap <name>ssid-profile <profile>vlan <vlan>forward-mode bridgeaaa-profile <name>rap-operation {always|backup|persistent}ap-group <name>virtual-ap <name>orap-name <name>virtual-ap <name>Using the CLI to configure the DHCP server on the AP:ap system-profile <name>lms-ip <ipaddr>master-ip <ipaddr>rap-dhcp-server-vlan <vlan>wlan virtual-ap <name>ssid-profile <profile>vlan <vlan>forward-mode bridgeaaa-profile <name>rap-operation {always|backup|persistent}ap-group <name>ap-system-profile <name>virtual-ap <name>or如不慎侵犯了你的权益,请联系告知!ap-name <name>ap-system-profile <name>virtual-ap <name>(本资料素材和资料部分来自网络,仅供参考。
Aruba 无线控制器配置手册
上海市徐汇区漕宝路 400 号明申商务广场 608 室
路雨信息为您提供最佳的无线体验
十、 修改 AP 名称和所在组
在新跳出来的页面里在 AP Group 的下拉选项里选择合适的已经建立好的 AP Group, 把页面拉到最下端后修改 AP 的名称。具体操作如下图:
上海市徐汇区漕宝路 400 号明申商务广场 608 室
配置好以上的设置后,我们就可以使用配置好的 IP 地址,在 PC 端通过 HTTPS 连接到 控制器上进行配置。
三、 配置新的 Policy
配置接入客户端在接入到无线网络后的规则。使用页面的方式找到 configuration SECURITY Access Control Policies 在 policy 下可以配置接入客户端的 rules。这些 rule 可以根据源和目标的来进行,同时还可以配置相应的协议 rule。示例如下:
七、 配置 SSID 和加密方式
SSID 里可以配置连接加密方式和修改 SSID 名称。 具体的配置路径如下: Configuration WIRELESS AP Configuration SSID 修改示例如下图:
上海市徐汇区漕宝路 400 号明申商务广场 608 室
路雨信息为您提供最佳的无线体验
上海市徐汇区漕宝路 400 号明申商务广场 608 室
路雨信息为您提供最佳的无线体验
Do you wish to shutdown all the ports (yes|no)? [no]: Current choices are: System name: Aruba200 VLAN 1 interface IP address: 192.168.0.123 VLAN 1 interface subnet mask: 255.255.255.0 IP Default gateway: none Switch Role: master Country code: cn Time Zone: PST-8:0 Ports shutdown: no If you accept the changes the switch will restart! Type <ctrl-P> to go back and change answer for any question Do you wish to accept the changes (yes|no)y System restarted!
Aruba-vlan-基本配置手册
Aruba vlan基本配置手册本章主要描述有关控制器的基本的网络配置,主要内容如下:1、VLANs 配置2、配置端口3、VLAN 协议4、配置静态路由5、环回IP地址配置6、控制器IP地址配置7、GRE 隧道配置2) 在弹出的 窗口,输入你想要创建的 VLANs 序列。
例如,增加一个ID 号码为200-300和302-350的 VLAN ,输入200-300,302-350。
打开1) 2) 点击“ADD 新建”按钮创建一个新的 VLAN 。
(若需要修改,点击 Edit 按钮)具体参照58页创建一系列的 VLANs 。
3) 为 VLAN 增加一个物理端口,点击 选项4) 点击2. 通过 CLI(命令)创建或者修改 VLAN3. 通过WEBUI 来创建或者修改多个 VLAN 1) 一次性增加并联的 VLANs ,点击3) 点击“OK ”4) 为 VLAN 增加物理端点,点击“EDIT ”进入你想要配置的 VLAN 页面,点击“PortSelection ”选项 设置端口。
5) 点击“APPLY"4. 通过 CLI(命令)创建或者修改 VLANs创建、更新和删除 VLANs 池:创建、更新和删除 VLANs 池1. 通过 WEBUI 来创建单个 VLAN :以下的配置操作创建一个名为"Mygroup"的 VLAN 池, VLAN IDs 2,4和12将被分配到该池1. 通过 WEBUI 来创建或者修改单个 VLAN1)打开2)选择“”选项打开窗口3)点击“ADD"4)在一栏输入你确定的VLAN池名称,名称大小在32字节内(不允许空格)。
VLAN名称不能修改,请谨慎选择5)在一栏输入你想要增加的VLAN ID号码。
如果你知道ID,输入IP号码,以逗号隔开;或者点击下拉菜单中的<---箭头选择需要增加的ID到VLAN 池。
6)必须增加2个或2个以上的VLAN IDs创建池7)完成所有IDs的增加后,点击”ADD“选项:VLAN池和指定的ID 同时显示在VLAN 池的窗口上。
Aruba无线控制器用户初始配置手册(suning)
苏宁电器Aruba无线控制器用户配置手册Version 1.3苏宁电器Aruba无线控制器用户配置手册一、连接Aruba无线控制器1.将console线RJ45一端连接至无线控制器的SERIAL端口,另一端连接至电脑COM口(笔记本没有COM口的可以使用USB-COM线)。
2.打开相应的配置终端软件(可以使用Secure-CRT或者使用系统自带的超级终端软件,建议使用Secure-CRT这款第三方终端软件)3.配置终端软件的参数Secure-CRT配置步骤:协议选择Serial,点击“下一步”端口选择好本电脑上使用的COM接口,波特率选择“9600”,数据流控制选型将前面的勾全部去掉,其它选项保持不变,点击“下一步”点击“完成”即可登录到配置界面。
超级终端配置步骤:点击“开始”>“所有程序”>“附件”>“通讯”>“超级终端”在名称一栏自定义输入一个名称,例如:“suning”,点击“确定”在连接时使用选择好相应的COM接口,点击“确定”点击“还原为默认值”,再点击“确定”即可登录到配置界面。
二、配置向导第一次登录控制器会出现配置向导进行简单的配置开机运行到如下图所示,即到了配置向导界面配置如下:Enter System name [Aruba200]:此处直接回车即选择[]内的内容,例如此处回车即选择设备名称为:Aruba200,也可自己自定义系统名称Enter VLAN 1 interface IP address [172.16.0.254]:此处直接回车即选择VLAN 1的IP地址为:172.16.0.254,一般此处直接回车,后面可以另行更改Enter VLAN 1 interface subnet mask [255.255.255.0]:此处直接回车即选择VLAN 1的IP地址的子网掩码为:255.255.255.0Enter IP Default gateway [none]:此处为指定控制器的网关地址,即路由地址,一般这边不指定,等进入系统后重新配置指定Enter Switch Role, (master|local) [master]:此处为指定控制器角色,一般默认为master,可直接回车到下一步Enter Country code (ISO-3166), <ctrl-I> for supported list:此处为指定国家代码,中国即输入“CN”You have chosen Country code CN for China (yes|no)?:此处为让您确认是否为中国,可直接“yes”到下一步Enter Time Zone [PST-8:0]:此处为指定时区,一般我们指定为“GMT+8:0”Enter Time in UTC [11:44:55]:此处为指定时间,我们可根据当时北京时间进行配置Enter Date (MM/DD/YYYY) [11/22/2010]:此处为配置日期,月/日/年份Enter Password for admin login (up to 32 chars):此处为配置admin登录密码,自定义Re-type Password for admin login:重新确认admin登录密码Enter Password for enable mode (up to 15 chars):指定enable密码Re-type Password for enable mode:重新确认enable密码Do you wish to shutdown all the ports (yes|no)? [no]:此处为询问您是否想shutdown所有端口,默认配置为“no”,一般选择默认配置直接回车Do you wish to accept the changes (yes|no)此处询问你是否接受刚才的配置,直接“yes”此时控制器会重新启动,启动完之后便可进入系统。
Aruba配置手册大全要点
第二卷安装Aruba移动边缘系统第2章部署基本移动边缘系统这章主要介绍如何将Aruba移动控制器和Aruba AP接入你的有线网络。
看完这章的介绍以后,你就可以配置AP,同样的介绍在第3卷里。
这章主要介绍了以下几部分:⏹“配置的介绍” 第48页⏹“配置Aruba移动控制器” 第52页⏹“部署APs” 第57页⏹“附加的配置” 第61页配置的介绍这个部分介绍了典型的部署情况和任务,你必须把Aruba移动控制器和Aruba AP接入到你的有线网络。
部署环境一:路由器是控制器和客户端的默认网关在这个部署环境中,Aruba AP和移动控制器连接在相同的子网上,并且使用被指定的子网IP地址。
在AP与控制器中间没有路由器。
AP能够被物理的连接到控制器上。
控制器上的上行端口被连接到2层交换机或者路由器上。
你必须完成下列任务:1. 进行初始化设置●设置VLAN 1的IP地址●设置默认网关的IP地址,将控制器连接到上行的路由器2. 把移动控制器上的上行端口连接到交换机或者路由器的端口上,默认的,控制器上的所有端口都是Access端口并且所有端口都属于同一个VLAN3. 部署AP。
所有的AP会使用Aruba Discovery Protocol(ADP)协议来发现移动控制器。
为所有用户指定VLAN并且配置VLAN 1的SSID。
部署环境二:对于所有客户端来说移动控制器是默认网关在这个部署环境中,Aruba移动控制器和AP在不同的子网中,而且AP在多个子网中。
移动控制器将作为无线网络的一个路由器(移动控制器作为无线客户端的默认网关)。
控制器上的上行端口被连接到2层交换机或路由器上;这是一个属于VLAN 1的Access 端口。
你必须完成下列任务:1. 进行初始化设置●设置VLAN 1的IP地址●设置默认网关的IP地址,将控制器连接到上行的路由器2. 把移动控制器上的接口连接到交换机或者路由器的接口上3. 部署AP。
所有的AP会使用DNS或DHCP来发现移动控制器。
Aruba配置手册大全
第二卷安装Aruba移动边缘系统第2章部署基本移动边缘系统这章主要介绍如何将Aruba移动控制器和Aruba AP接入你的有线网络。
看完这章的介绍以后,你就可以配置AP,同样的介绍在第3卷里。
这章主要介绍了以下几部分:⏹“配置的介绍” 第48页⏹“配置Aruba移动控制器” 第52页⏹“部署APs” 第57页⏹“附加的配置” 第61页配置的介绍这个部分介绍了典型的部署情况和任务,你必须把Aruba移动控制器和Aruba AP接入到你的有线网络。
部署环境一:路由器是控制器和客户端的默认网关在这个部署环境中,Aruba AP和移动控制器连接在相同的子网上,并且使用被指定的子网IP地址。
在AP与控制器中间没有路由器。
AP能够被物理的连接到控制器上。
控制器上的上行端口被连接到2层交换机或者路由器上。
你必须完成下列任务:1. 进行初始化设置●设置VLAN 1的IP地址●设置默认网关的IP地址,将控制器连接到上行的路由器2. 把移动控制器上的上行端口连接到交换机或者路由器的端口上,默认的,控制器上的所有端口都是Access端口并且所有端口都属于同一个VLAN3. 部署AP。
所有的AP会使用Aruba Discovery Protocol(ADP)协议来发现移动控制器。
为所有用户指定VLAN并且配置VLAN 1的SSID。
部署环境二:对于所有客户端来说移动控制器是默认网关在这个部署环境中,Aruba移动控制器和AP在不同的子网中,而且AP在多个子网中。
移动控制器将作为无线网络的一个路由器(移动控制器作为无线客户端的默认网关)。
控制器上的上行端口被连接到2层交换机或路由器上;这是一个属于VLAN 1的Access 端口。
你必须完成下列任务:1. 进行初始化设置●设置VLAN 1的IP地址●设置默认网关的IP地址,将控制器连接到上行的路由器2. 把移动控制器上的接口连接到交换机或者路由器的接口上3. 部署AP。
所有的AP会使用DNS或DHCP来发现移动控制器。
Aruba 配置手册
1.实验环境说明1.1.实验拓扑本次实验只使用一个AP1.2.实验目的测试并学习ARUBA Controller的配置方法,了解ARUBA Controller的功能特性和特点B所需的环境●Cisco Switch 3560-POE(可支持POE供电,并给AP供电),一台●ARUBA Controller 3200,一台●ARUBA AP-105,一颗●WinRadius(模拟Radius Server用,),一台●测试用PC,2台网线若干,Console线一根2.ARUBA Controller的功能设定与配置2.1.Controller的初始化1.在拿到一台设备之后,不管是不是新的还是旧的设备,我们都要清空配置,首先在清空配置之前我们必须备份license可以在console界面直接看:也可以在web界面查看将license复制备份之后,就可以彻底清除配置了重启后我们可以配置最基本的name,管理地址,时间,密码等。
重启完成后输入用户名和密码就可以进入设备了此时查看licence,是没有的我们要加入我们备份的licenceAdd licence之后需要重启重启后可以看到licence2.配置DHCP Server这个POOL是给AP和测试PC提供地址的3.完成后,保存配置4.给交换机配置管理地址,因为所有的的接口都属于vlan1,为vlan1配置地址可以是AP获得IP地址2.2.控制器配置文件的保存恢复以及OS升级1.使用以下命令:●Dir-----查看保存在flash中的所有文件●Show boot-----查看设备启动时读取的配置文件●Show image version-----查看Partition 0 & 1的image信息,和每次设备启用会从那个Partition去读取image2.如果需要导出Controller的配置,需要在PC 1去运行TFTP Server(本LAB使用Cisco TFTP),使用以下命令去把配置文件导出到PC 1中3.成功导出后,在Cisco TFTP可以看到导出的配置文件的信息4.导出来的configuration5.如果需要导入configuration到controller里的话,使用以下命令如上图,导入到flash时,需要重建一个新名字:3400.bak,并把其导入到backup 文件里,然后再把backup文件覆盖掉原来的3400.cfg文件,启动时读取这个配置文件:3400.cfg,最后重启一次controller2.3.使用WEB登录和AP的初始化配置1.使用web登录,我们设置的管理地址是172.16.1.254点击登录2.在Monitoring-->Network Summary,我们可以找到AP。
Aruba设备配置操作手册
Aruba 无线控制器内部试验文档2010年06月目录第一章.Aruba售后基础.................................................................................................. - 4 -一.Aruba产品简介 .................................................................................................................... - 4 -1.Aruba 无线控制器(AC) ................................................................................................. - 4 -2.Aruba 无线接入点(AP) ................................................................................................. - 5 -二.组网方式 ............................................................................................................................. - 6 -1.与有线网二层连接............................................................................................................. - 6 -2.与有线网三层连接............................................................................................................. - 7 -三.控制器登陆方式 .................................................................................................................. - 7 -第二章.控制器Web基本管控 ......................................................................................... - 8 -1.登陆控制器............................................................................................................................ - 8 -2.修改登录密码........................................................................................................................ - 9 -3.查看控制器状态 .................................................................................................................. - 12 -4.查看接口状态...................................................................................................................... - 13 -5.查看AP状态.......................................................................................................................... - 15 -6.查看用户状态...................................................................................................................... - 17 -7.添加/清除黑名单 ................................................................................................................ - 19 -第三章.控制器CLI配置调试 .......................................................................................... - 21 -一.Aruba基础配置 .................................................................................................................. - 21 -1.Console登陆...................................................................................................................... - 21 -2.恢复出厂配置 .................................................................................................................. - 22 -3.初始化配置 ...................................................................................................................... - 22 -4.保存配置参数 .................................................................................................................. - 23 -5.Image升级 ........................................................................................................................ - 23 -6.备份与恢复配置文件 ....................................................................................................... - 23 -7.DHCP配置 ......................................................................................................................... - 24 -8.配置AP ............................................................................................................................. - 25 -9.为无线终端用户单独配置VLAN ....................................................................................... - 29 -二.Aruba无线认证加密方式................................................................................................... - 31 -1.OPEN ................................................................................................................................ - 31 -2.PSK 认证 .......................................................................................................................... - 32 -3.MAC地址认证................................................................................................................... - 33 -4.Dot1x (802.1x)认证: ................................................................................................. - 34 -5.Captive-portal认证............................................................................................................ - 35 -三.Aruba无线安全策略 .......................................................................................................... - 37 -1.Captive Portal界面定制 .................................................................................................... - 37 -2.Demo License .................................................................................................................... - 38 -3.PEF license ........................................................................................................................ - 39 -4.role 应用.......................................................................................................................... - 42 -5.利用role做带宽限制策略 ................................................................................................. - 43 -6.Radius服务器.................................................................................................................... - 44 -7.Master Local ..................................................................................................................... - 46 -8.VRRP ................................................................................................................................. - 47 -第四章.控制器Web配置调试 ....................................................................................... - 49 -1.AP更改组配置...................................................................................................................... - 49 -2.AP更改名字配置 .................................................................................................................. - 50 -第五章.Troubleshooting........................................................................................... - 52 -1.AP指示灯说明...................................................................................................................... - 52 -2.AP未启动故障检查 .............................................................................................................. - 52 -第一章.Aruba售后基础一.Aruba产品简介这里只是把Aruba全套产品线构成做简单展现,以便了解使用Aruba设备,详细产品说明请查看产品详细资料。
ARUBA配置手册
ARUBA配置手册一、网络设置1、创建VLANSConfiguration-Network-VLANS,点击右边的Add a vlan按钮,出现创建VLAN的界面,输入VLAN ID后点Apply。
2、设置各VLAN的IPConfiguration-Network-IP,点击右边VLAN ID对应的Edit按钮,出现配置IP的界面,输入IP后点击Apply。
3、端口设置Configuration-Network-Port,选择与交换机连接的端口,选中Trunk 后点Apply按钮。
4、Controller设置二、安全设置1、访问控制Configuration-Security-Access Control,点击右侧Add按钮,创建两个规则分别用于公司出差员工(PEC)和外来用户(user),只开放需要的端口。
2、认证设置①创建W EB账号:Configuration-Security-Authentication-InternalDB,点击Add User按钮,输入用户名和密码,选择规则后点击Apply按钮。
创建两个账号分别用于公司人员出差(guest)和外来用户(president)。
②创建AAA profiles:Configuration-Security-Authentication-AAAProfiles,点击Add按钮,输入名字后点击Apply按钮。
创建AAA配置文件用于选择SSID的认证方式。
③选择认证方式:Configuration-Security-Authentication-AAAProfiles,点击创建好的配置文件,在Initial role下拉框中选择认证方式。
Authenticated:加密认证Guest-logon:WEB认证三、无线设置1、创建AP配置文件2、修改配置参数①修改VLAN②修改AAA配置③创建SSID配置文件四、无线客户端IP设置com线连接无线AP重启AP,3秒内按Enter键purgesetenv ipaddr 10.96.1.179 setenv netmask 255.255.255.0 setenv gatewayip 10.96.1.254 setenv serverip 10.96.1.160 setenv master 10.96.1.160 setenv name BF-AP-125-04 setenv location BF-AP-125-04 save。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
wlan ssid-profile "default"wpa-passphrase 1234567890 ---tkip设置provision-ap copy-provisioning-params ip-addr 192.168.102.250 provision-ap no ipaddrprovision-ap a-ant-gain 2provision-ap g-ant-gain 2provision-ap a-antenna 1provision-ap g-antenna 1provision-ap external-antennaprovision-ap master 192.168.102.100provision-ap server-ip 192.168.102.100provision-ap ap-group "default"provision-ap ap-name "00:0b:86:cb:bd:62"provision-ap no syslocationprovision-ap fqln ""provision-ap reprovision ip-addr 192.168.102.250interface loopback ip address "192.168.30.200"apboot> helpboot - run bootcmd or boot AP image or elf file or from flashcd - cfg register displaycw - cfg register writedis - disassemble instructionsdhcp - invoke DHCP client to obtain IP/boot paramseloop - loopback received ethernet framesflash - FLASH sub-systemgo - start application at address 'addr'help - print online helpmc - memory copymd - memory displaymii - MII sub-systemmtest - simple RAM testnetstat - net statisticsmw - memory writeping - ping net hostprintenv - env displaypurgeenv - purge envregs - display various regsreset - reset processorrun - run commands in an environment variablesaveenv - save environment variables to persistent storagesetenv - set variable in env (ipaddr/netmask/gatewayip/master/serverip) setenv ipaddr x.x.x.xsetenv netmask x.x.x.xsetenv gatewayip x.x.x.xsetenv serverip x.x.x.xsetenv master x.x.x.xtcpdump - dump received packetstcpsend - send TCP packettftpboot - boot via tftptlb - dump TLBtrace - dump trace bufferversion - print monitor versionwdog - stop refreshing watchdog timerapboot>No spanning-tree 关闭spanning-treeAdp discover disable 关闭ADPAdp imgp-join disable 关闭im-j一、WEB页面认证1、wlan ssid-profile (staff-ssid-profile) :定义ssid配置文件1.1 essid staff :定义ssid下的essid—显示出来的ssid2、wlan virtual-ap (staff-vap-profile) :定义virtual-ap的配置文件2.1 ssid-profile (staff-ssid-profile) :在virtual-ap下引用定义过SSID2.2 vlan ID aa,bb :把virtual-ap加入到要ssid所属VLAN3、aaa profile staff-aaa-profile :定义AAA认证配置文件4、aaa server-group (staff-servergroup) :定义server-group配置文件4.1 auth-server internal :定义认证服务器为本地认证4.2 set role condition role value-of 设置角色set role condition <condition> set-value <role> position <number>5、aaa authentication captive-portal (staff-auth-profile) :captive-portal配置5.1 server-group staff-servergroup :在下面引用定义过的server-group6、user-role staff-logon :定义用户登陆前权限的配文件6.1 access-list session logon-control position 1定义用户登陆前的权限--位置16.2 access-list session captiveportal position 2 定义用户登陆前的权限--26.3 Captive-Portal staff-auth-profile position 3定义过captive-portalRe-authentication interval 480 再次认证间隔480秒默认3600秒7、user-role vip-role :定义用户成功登陆后的配置文件7.1session-acl allowall 赋予所有允许权限session-acl http-acl 只有http8、wlan virtual-ap staff-vap-profile :进入定义过的virtual-ap配置文件8.1 aaa-profile staff-aaa-profile :引用定义过的AAA配置文件9、ap-group default :定义ap-group,最好用默认的9.1 virtual-ap staff-vap-profile :引用定义过的Virtual-ap配置文件10、aaa profile staff-aaa-profile :进入定义过的AAA配置文件10.1 initial-role staff-logon :把initial-role改为定义过用户登陆前配置11、aaa authentication-server internal use-local-switch :定义认证SERVER为本地交换机12、local-userdb add username staff password 123456 role vip-role :定义用户的登陆的用户名和密码及权限二、MAC 地址认证配置1、wlan ssid-profile (staff-ssid-profile) :定义ssid配置文件1.1 essid staff :定义ssid下的essid2、wlan virtual-ap (staff-vap-profile) :定义virtual-ap的配置文件2.1 ssid-profile (staff-ssid-profile) :virtual-ap下引用定义过的SSID配置文件2.2 vlan ID :把virtual-ap加入到要ssid所属的VLAN3、aaa profile staff-aaa-mac-profile :定义AAA认证配置文件4、aaa authentication mac staff-mac-profile :定义mac配置文件4.1 Delimiter dash :定义mac地址的格式4.2 Case upper (upper/lower):定义mac地址的大/小写备注:aaa authentication mac staff-mac-profileclone <profile>delimiter {colon|dash|none}max-authentication-failures 数字aaa authentication mac mac-blacklist MAC黑名单max-authentication-failures 5 最多认证失败次数5、aaa server-group (staff-macservergroup) :定义server-group配置文件5.1 auth-server internal :定义认证服务器为本地认证5.2 set role condition role value-of6、user-role staff-logon :定义用户登陆前权限的配文件6.1 access-list session logon-control :定义用户登陆前的权限6.2 access-list session captiveportal :定义用户登陆前的权限7、user-role vip-role :定义用户成功登陆后的配置文件7.1session-acl allowall :赋予权限8、wlan virtual-ap staff-vap-profile :进入定义过的virtual-ap配置文件8.1 aaa-profile staff-aaa-mac-profile :引用定义过的AAA配置文件9、ap-group default :定义ap-group,最好用默认的9.1 virtual-ap staff-vap-profile :引用定义过的Virtual-ap配置文件10、aaa profile staff-aaa-mac-profile :进入定义过的AAA配置文件10.1 initial-role staff-logon :把initial-role改为定义过的用户登陆前的配置文件10.2 authentication-mac staff-mac-profile :把定义的authentication mac文件引用10.3 mac-server-group staff-macservergroup :把定义的servergroup加入11、aaa authentication-server internal use-local-switch :定义认证SERVER为本地交换机12、local-userdb add username mac地址password mac地址 role vip-role :定义用户的登陆的用户名和密码及权限注意:如果是有线直接连在端口上的话要进行认证必须把连接口设为UNTRUSTED.同时在设定:进入aaa authentication wired 后设定:profile (staff-aaa-profile) 为你设定认证的AAA profileBlacklist:5次错误就拒绝访问show aaa authentication captive-portal default:Max authentication failures 改为5次show aaa authentication dot1x default:Max authentication failures 改为5次1、aaa bandwidth-contract "256" kbits "256"2、aaa bandwidth-contract "256" kbits 256ip access-list session "pass"any any any permit queue low!user-role "ap512"access-list "pass" position 1bw-contract "256" per-user upstreambw-contract "256" per-user downstreamaaa bandwidth-contract "2M-BW" mbits "2" 带宽2M控制aaa bandwidth-contract 128_up kbits 128 带宽128k控制aaa bandwidth-contract 512 kbits 512aaa bandwidth-contract 64 kbits 64aaa bandwidth-contract 256 kbits 256aaa bandwidth-contract 1 mbits 1 带宽1M控制aaa bandwidth-contract 128_up kbits 128user-role 128bw-contract 128_up per-user upstreamuser-role ap-rolesession-acl controlsession-acl ap-acl!user-role pre-employeesession-acl allowallMaster mobility controller configuration1Initial setup of Aruba-master2Core VLAN configuration and IP addressing3Core VLAN port assignment4Loopback IP address ----- interface loopback ip address 设置环回地址Deploy APs5配置AP VLAN6配置 AP VLAN DHCP Server7Connect Aruba APs8Provisioning Aruba APs(Aruba-master) (config-if)#write mSaving Configuration...ip dhcp pool "userpool" 定义pool的名字default-router 192.168.11.254 定义默认路由网关—loopback地址dns-server 192.168.11.254---202.106.0.20 定义DNS网关lease 8 0 0network 192.168.11.0 255.255.255.0service dhcp 启动dhcpinterface gigabitethernet 1/1no muxportswitchport mode trunkip default-gateway 192.168.0.254interface vlan 1no ip addressno ip igmpinterface gigabitethernet 1/1no switchport access vlaninterface loopback ip address "192.168.0.100"(Aruba800-4) (config) # show ip interface briefInterface IP Address / IP Netmask Admin Protocolvlan 1 172.16.0.254 / 255.255.255.0 up upvlan 10 192.168.0.1 / 255.255.255.0 up upvlan 30 192.168.30.200 / 255.255.255.0 up uploopback unassigned / unassigned up up(Aruba800-4) (config) # rf arm-profile default ----------关闭ARM后调整channel---ok (Aruba800-4) (Adaptive Radio Management (ARM) profile "default") #assignment disable (Aruba800-4) (Adaptive Radio Management (ARM) profile "default") #no scan(Aruba800-4) (Adaptive Radio Management (ARM) profile "default") #write memoryrf dot11g-radio-profile "default"tx-power 20 ------------------------发射功率调整rf dot11g-radio-profile "default"channel 11 ------------------------调整AP信道interface vlan 20ip address 192.168.0.1 255.255.255.0ip nat insideno ip igmp存配置:24 (Aruba2400) #configure t25(Aruba2400) (config) #copy tftp: 172.16.0.100 aruba2400-0904.cfg flash: 2400.bak 26(Aruba2400) (config) #copy flash: 2400.bak flash: 2400.cfg27(Aruba2400) # copy running-config tftp: 192.168.4.100 aruba2400-0904.cfgRadius配置:aaa authentication-server radius Radius1host <ipaddr>key <key>enableaaa server-group corpnetauth-server Radius1dot1x配置:aaa authentication dot1x corpnetaaa profile corpnetauthentication-dot1x corpnetdot1x-default-role employeedot1x-server-group corpnetvirtual AP:wlan ssid-profile corpnetessid Corpnetopmode wpa2-aeswlan virtual-ap corpnetvlan 1aaa-profile corpnetssid-profile corpnetap-group defaultvirtual-ap corpnet时间设定:time-range workhours periodic周期weekday 09:00 to 17:00ip access-list session restricted 受限制any any svc-http permit time-range workhoursany any svc-https permit time-range workhoursuser-role guestsession-acl restrictedmesh设置:ap mesh-radio-profile <profile-name>11a-portal-channel <11a-portal-channel>11g-portal-channel <11g-portal-channel>a-tx-rates [6|9|12|18|24|36|48|54]beacon-period <beacon-period>children <children>clone <source-profile-name>g-tx-rates [1|2|5|6|9|11|12|18|24|36|48|54]heartbeat-threshold <count>hop-count <hop-count>link-threshold <count>max-retries <max-retries>metric-algorithm {best-link-rssi|distributed-tree-rssimpv <vlan-id>rts-threshold <rts-threshold>tx-power <tx-power>ap mesh-radio-profile <profile-name>clone <source-profile-name>ap-group <group>mesh-radio-profile <profile-name>ap-name <name>mesh-radio-profile <profile-name>wlan ssid-profile <profile>essid <name>opmode <method> 方式wpa-passphrase <string> (if necessary)wlan virtual-ap <name>ssid-profile <profile>vlan <vlan>forward-mode bridgeaaa-profile <name>rap-operation {always|backup|persistent}ap-group <name>virtual-ap <name># ip access-list session "Employee-Policy"any any any permit queue lowRemote AP配置The firewall must be configured to pass NAT-T traffic (UDP port 4500) to the controller.)1、Configure a public IP address for the controller.2、Configure the VPN server on the controller. The remote AP will be a VPN client to the server.3、Configure the remote AP role.4、Configure the authentication server that will validate the username and password for the remote AP.5、Provision the AP with IPSec settings, including the username and passwordfor the AP, before you install it at the remote location.1、Cli:vlan <id>interface fastethernet <slot>/<port>switchport access vlan <id>interface vlan <id>ip address <ipaddr> <mask>2、Using the CLI to configure VPN server:vpdn group l2tpppp authentication PAPip local pool <pool> <start-ipaddr> <end-ipaddr>crypto isakmp key <key> address <ipaddr> netmask <mask>3、Using the CLI to configure the user role:(table1) (config) # user-role remote(table1) (config-role) #session-acl allowallip access-list session <policy>any any svc-papi permitany any svc-gre permitany any svc-l2tp permitany alias mswitch svc-tftp permitany alias mswitch svc-ftp permit4、Using the CLI to configure the VPN authentication profile:4.1 aaa server-group <group>auth-server <server>4.2 aaa authentication vp ndefault-role <role>server-group <group>5、Using the CLI to enable double encryption:ap system-profile <profile>double-encryptap-name <name> 需要插上远端AP后配置ap-system-profile <profile>Using the CLI to enable double encryption:ap system-profile <profile>double-encryptap-name <name>ap-system-profile <profile>Using the CLI to configure the AAA profile:aaa profile <name>initial-role <role>authentication-dot1x <dot1x-profile>dot1x-default-role <role>dot1x-server-group <group>Using the CLI to define the backup configuration in the virtual AP profile: wlan ssid-profile <profile>essid <name>opmode <method>wpa-passphrase <string> (if necessary)wlan virtual-ap <name>ssid-profile <profile>vlan <vlan>forward-mode bridgeaaa-profile <name>rap-operation {always|backup|persistent}ap-group <name>virtual-ap <name>orap-name <name>virtual-ap <name>Using the CLI to configure the DHCP server on the AP:ap system-profile <name>lms-ip <ipaddr>master-ip <ipaddr>rap-dhcp-server-vlan <vlan>wlan virtual-ap <name>ssid-profile <profile>vlan <vlan>forward-mode bridgeaaa-profile <name>rap-operation {always|backup|persistent}ap-group <name>ap-system-profile <name>virtual-ap <name>orap-name <name>ap-system-profile <name> virtual-ap <name>。