

图1 配置WLAN外置Portal认证示例组网图

某企业为了提高 WLAN 网络的安全性,采用外置 Portal 认证方式,实现对用户的接入控制。
配置项 | 数据 |
|---|---|
AP管理VLAN | VLAN100 |
STA业务VLAN | VLAN101 |
DHCP服务器 | AC为AP分配IP,SwitchB为STA分配IP |
AP地址池 | 10.23.100.2~10.23.100.254/24 |
STA地址池 | 10.23.101.4~10.23.101.254/24 |
AC源接口IP | VLANIF100:10.23.100.1/24 |
capwap dtls no-auth enable
undo capwap dtls no-auth enable
sysname SwitchA
vlan batch 100
interface GigabitEthernet0/0/1
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100
port-isolate enable
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 100
sysname SwitchB
vlan batch 100 101
dhcp enable
interface Vlanif101
ip address 10.23.101.1 255.255.255.0
dhcp select interface
dhcp server gateway-list 10.23.101.2
dhcp server dns-list 8.8.8.8
dhcp server excluded-ip-address 10.23.101.3
sysname Router
vlan batch 101
interface Vlanif101
ip address 10.23.101.2 255.255.255.0
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 101
sysname AC
vlan batch 100 101
dhcp enable
interface Vlanif100
ip address 10.23.100.1 255.255.255.0
dhcp select interface
interface Vlanif101
ip address 10.23.101.3 255.255.255.0
ip route-static 0.0.0.0 0.0.0.0 10.23.101.2
capwap source interface vlanif100
capwap dtls no-auth enable
AP上线成功后:
undo capwap dtls no-auth enable
radius-server template wlan-net
radius-server authentication 10.23.102.1 1812
radius-server shared-key cipher Huawei123
aaa
authentication-scheme wlan-net
authentication-mode radius
accounting-scheme wlan-net
accounting-mode radius
accounting realtime 15
url-template name wlan-net
url http://portal.com:8080/portal
url-parameter ssid ssid redirect-url url
web-auth-server wlan-net
server-ip 10.23.103.1
port 50200
shared-key cipher Huawei123
portal-access-profile name wlan-net
web-auth-server wlan-net direct
free-rule-template name default_free_rule
free-rule 1 destination ip 8.8.8.8 mask 255.255.255.255
authentication-profile name wlan-net
portal-access-profile wlan-net
free-rule-template default_free_rule
authentication-scheme wlan-net
radius-server wlan-net
wlan
security-profile name wlan-net
security open
ssid-profile name wlan-net
ssid wlan-net
vap-profile name wlan-net
forward-mode tunnel
service-vlan vlan-id 101
ssid-profile wlan-net
security-profile wlan-net
authentication-profile wlan-net
ap-group name ap-group1
vap-profile wlan-net wlan 1 radio 0
vap-profile wlan-net wlan 1 radio 1
#
sysname SwitchA
#
vlan batch 100
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100
port-isolate enable group 1
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 100
#
return
#
sysname SwitchB
#
vlan batch 100 to 101
#
dhcp enable
#
interface Vlanif101
ip address 10.23.101.1 255.255.255.0
dhcp select interface
dhcp server gateway-list 10.23.101.2
dhcp server dns-list 8.8.8.8
dhcp server excluded-ip-address 10.23.101.3
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 100
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 100 to 101
#
interface GigabitEthernet0/0/3
port link-type trunk
port trunk allow-pass vlan 101
#
return
#
sysname Router
#
vlan batch 101
#
interface Vlanif101
ip address 10.23.101.2 255.255.255.0
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 101
#
return
#
sysname AC
#
vlan batch 100 to 101
#
authentication-profile name wlan-net
portal-access-profile wlan-net
free-rule-template default_free_rule
authentication-scheme wlan-net
radius-server wlan-net
#
dhcp enable
#
aaa
authentication-scheme wlan-net
authentication-mode radius
accounting-scheme wlan-net
accounting-mode radius
accounting realtime 15
#
interface Vlanif100
ip address 10.23.100.1 255.255.255.0
dhcp select interface
#
interface Vlanif101
ip address 10.23.101.3 255.255.255.0
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 100 101
#
ip route-static 0.0.0.0 0.0.0.0 10.23.101.2
#
capwap source interface vlanif100
#
radius-server template wlan-net
radius-server shared-key cipher %^%#Oc6_BMCw#9gZ2@SMVtk!PAC6>Ou*eLW/"qLp+f#$%^%#
radius-server authentication 10.23.102.1 1812 weight 80
#
free-rule-template name default_free_rule
free-rule 1 destination ip 8.8.8.8 mask 255.255.255.255
#
url-template name wlan-net
url http://portal.com:8080/portal
#
web-auth-server wlan-net
server-ip 10.23.103.1
port 50200
shared-key cipher %^%#4~ZXE3]6@BXu;2;aw}hA{rSb,@"L@T#e{%6G1AiD%^%#
url-template wlan-net ciphered-parameter-name cpname iv-parameter-name iv-value key cipher %^%#4~ZXE3]6@BXu;2;aw}hA{rSb,@"L@T#e{%6G1AiD%^%#
#
portal-access-profile name wlan-net
web-auth-server wlan-net direct
#
wlan
security-profile name wlan-net
ssid-profile name wlan-net
ssid wlan-net
vap-profile name wlan-net
forward-mode tunnel
service-vlan vlan-id 101
ssid-profile wlan-net
security-profile wlan-net
authentication-profile wlan-net
ap-group name ap-group1
regulatory-domain-profile default
radio 0
vap-profile wlan-net wlan 1
radio 1
vap-profile wlan-net wlan 1
ap-id 0 type-id 35 ap-mac 60de-4476-e360 ap-sn 210235554710CB000042
ap-name area_1
ap-group ap-group1
#
return