Page 2
The information in this document is subject to change without notice. All contents in this document, including statements, information, and recommendations, are believed to be accurate, but they are presented without warranty of any kind, express or implied. H3C shall not be liable for technical or editorial errors or omissions contained herein.
Page 3
Preface This configuration guide describes fundamentals and configuration of WLAN Interface, WLAN Service, WLAN RRM, WLAN Security, WLAN IDS, and WLAN QoS. This preface includes the following topics about the documentation: • Audience. • Conventions. • Documentation feedback. Audience This documentation is intended for: •...
Page 4
Symbols Convention Description An alert that calls attention to important information that if not understood or followed WARNING! can result in personal injury. An alert that calls attention to important information that if not understood or followed CAUTION: can result in data loss, data corruption, or damage to hardware or software. An alert that calls attention to essential information.
Page 5
Documentation feedback You can e-mail your comments about product documentation to info@h3c.com. We appreciate your comments.
NOTE: The terms AP and fat AP in this document refer to MSR800, MSR 900, MSR900-E, MSR 930, and MSR 20-1X routers with IEEE 802.11b/g and MSR series routers installed with a SIC WLAN module. • Wireless routers support WLAN radio interfaces, which are physical interfaces that provide wireless network access.
WLAN BSS interface is no greater than 31. For more information about IMC, see H3C Intelligent Management Center Getting Started Guide. Optional. Set the description string for By default, the description string description text the interface.
WLAN Ethernet interface WLAN Ethernet interfaces are virtual Layer 3 interfaces. They operate like Layer 3 Ethernet interfaces. You can assign an IP address to a WLAN Ethernet interface. On a wireless router, a WLAN radio interface bound to a WLAN Ethernet interface operates as a Layer 3 interface. Entering WLAN Ethernet interface view Step Command...
Page 11
Step Command • ip count inbound-packets • ip count outbound-packets 10. Assign an IP address to the interface. ip address • ip forward-broadcast 11. Configure IP performance. • tcp mss 12. Configure policy-based routing. ip policy-based-route 13. Configure UDP helper. udp-helper server 14.
Configuring WLAN access The terms AP and fat AP in this document refer to MSR800, MSR 900, MSR900-E, MSR 930, and MSR 20-1X routers with IEEE 802.11b/g and MSR series routers installed with a SIC WLAN module. WLAN access overview A WLAN can provide the following services: •...
Page 17
When a wireless client operates, it periodically searches for (scans) surrounding wireless networks. During active scanning, the wireless client actively sends probe request frames and obtains network signals from received probe response frames. Active scanning includes two modes according to whether a specified SSID is carried in a probe request. A client sends a probe request (with the SSID null, or, the SSID IE length is 0)—The client periodically sends a probe request frame on each of its supported channels to scan wireless networks.
Figure 4 Passive scanning Authentication To secure wireless links, the wireless clients must be authenticated before accessing the AP, and only wireless clients passing the authentication can be associated with the AP. 802.11 links define two authentication mechanisms: open system authentication and shared key authentication. For more information about the two authentication mechanisms, see "Configuring WLAN security."...
Figure 5 Network diagram Printer Workgroup Bridge Client For an AP with two radios, you can configure one radio as a workgroup bridge and configure the other radio to provide normal access services. As shown in Figure 6, Radio 1 operates as a workgroup bridge, and Radio 2 provides normal access services.
Step Command Remarks By default, the country code for Specify the global country wlan country-code code North American models is US, code. and for other models is CN. Configuring a WLAN service template Creating a service template and specifying an SSID Step Command Remarks...
Configuring the maximum number of associated clients Step Command Remarks Enter system view. system-view Create a WLAN service wlan service-template You cannot change an existing template and enter WLAN service-template-number { clear | service template to another type. service template view. crypto } Configure the maximum number of clients allowed to...
Step Command Remarks Enable the fat AP to respond Optional. to probe requests with null broadcast-probe reply The default setting is enabled. SSID. Configuring radio parameters Configuring radio parameters Step Command Remarks Enter system view. system-view interface wlan-radio Enter radio interface view. interface-number radio-type { dot11b | dot11g Configure a radio type.
Step Command Remarks 12. Set the maximum number of Optional. retransmission attempts for long-retry threshold count By default, the long retry threshold frames larger than the RTS is 4. threshold. Optional. 13. Specify the maximum number of attempts to transmit a frame short-retry threshold count By default, the short retry shorter than the RTS threshold.
Map a service template to service-template-number binding service, make sure the the radio. interface wlan-bss interface number of the WLAN interface-number BSS interface is no more than 31. For more information about IMC, see H3C Intelligent Management Center Getting Started Guide.
Enabling a radio Step Command Remarks Enter system view. system-view interface wlan-radio Enter radio interface view. interface-number Optional. Enable the radio. undo shutdown By default, the radio is disabled. Displaying and maintaining WLAN access You can use the wlan link-test command to perform a Radio Frequency Ping (RFPing) operation to a client.
To specify a permitted SSID: Step Command Remarks Enter system view. system-view If the specified user profile does Enter user profile view. user-profile profile-name not exist, this command creates it and enters its view. By default, no permitted SSID is Specify a permitted SSID.
Step Command Remarks client-mode Optional. Configure the authentication authentication-method method for the workgroup By default, open system { open-system | shared-key | bridge. authentication is used. wpa2-psk } client-mode cipher-suite { ccmp Optional. Configure the cipher suite | tkip | { wep40 | wep104 | and pre-shared key for the wep128 } [ key-id key-id ] } key By default, no cipher suite or...
[AP] interface wlan-bss 1 [AP-WLAN-BSS1] quit # Configure a clear type WLAN service template with no authentication. [AP] wlan service-template 1 clear [AP-wlan-st-1] ssid service [AP-wlan-st-1] authentication-method open-system [AP-wlan-st-1] service-template enable [AP-wlan-st-1] quit # Bind WLAN-Radio 2/0 to service template 1 and WLAN-BSS 1. [AP] interface WLAN-Radio 2/0 [AP-WLAN-Radio2/0] radio-type dot11gn [AP-WLAN-Radio2/0] service-template 1 interface WLAN-BSS 1...
Page 30
# Configure the SSID as China-net. [AP-WLAN-Radio2/0] client-mode ssid China-net # Connect the AP to the wireless network. [AP-WLAN-Radio2/0] client-mode connect [AP-WLAN-Radio2/0] return Verifying the configuration Use the display wlan client-mode radio command to display the configuration and connection status for the workgroup bridge. <AP>...
Page 31
• To configure VLAN settings for the uplink wireless interface on the workgroup bridge, make sure the uplink wireless interface has the same VLAN ID as the downlink Ethernet interface on the workgroup bridge.
NOTE: The terms AP and fat AP in this document refer to MSR800, MSR 900, MSR900-E, MSR 930, and MSR 20-1X routers with IEEE 802.11b/g and MSR series routers installed with a SIC WLAN module. Overview Radio signals are susceptible to surrounding interference. The causes of radio signal attenuation in different directions are very complex.
Configuring data transmit rates Configuring 802.11b/802.11g rates Step Command Remarks Enter system view. system-view Enter WLAN RRM view. wlan rrm Optional. By default, no rates are disabled. dot11b { disabled-rate | Mandatory rates are 1 and 2. The Configure rates for 802.11b. mandatory-rate | multicast-rate | multicast rate is automatically supported-rate } rate-value...
Page 34
Table 1 MCS data rate table (20 MHz) Data rate (Mbps) Number of MCS index Modulation spatial streams 800ns GI 400ns GI BPSK QPSK 13.0 14.4 QPSK 19.5 21.7 16-QAM 26.0 28.9 16-QAM 39.0 43.3 64-QAM 52.0 57.8 64-QAM 58.5 65.0 64-QAM 65.0...
Data rate (Mbps) Number of MCS index Modulation spatial streams 800ns GI 400ns GI 64-QAM 270.0 300.0 802.11 rates include three types: mandatory rates, supported rates, and multicast rates. • Mandatory rates—The AP must support mandatory rates. Clients can only associate with the AP when they support the mandatory rates.
MSR80 MSR90 Feature MSR 20 MSR 30 MSR 50 20-1X MSR800 930-W-G SIC_WL SIC_WL SIC_WL SIC_WL -10-W U, and module module module module 930-W-G that that that that supports supports supports supports 802.11n 802.11n 802.11n 802.11n The configured maximum bandwidth does not take effect on radios enabled with intelligent bandwidth assurance.
Step Command Remarks disabled. Enabling 802.11g protection reduces network performance. Configuring 802.11g protection mode 802.11g protection modes include RTS/CTS and CTS-to-self. • RTS/CTS—An AP sends an RTS packet before sending data to a client. After receiving the RTS packet, all the devices within the coverage of the AP do not send data within the specified time.
• A non-802.11n client associates with the 802.11n AP. In this case, 802.11g protection is always enabled without manual intervention. • The 802.11n AP detects a non-802.11n BSS or some 802.11n packets that are not destined to it. To enable 802.11n protection, issue the dot11g protection enable command. To enable 802.11n protection: Step Command...
Step Command Remarks By default, the scan mode is auto. Optional. Set the scan type. scan type { active | passive } By default, the scan type is passive. Optional. Set the scan report interval. scan report-interval seconds By default, the scan report interval is 10 seconds.
Configuring WLAN security The terms AP and fat AP in this document refer to MSR800, MSR 900, MSR900-E, MSR 930, and MSR 20-1X routers with IEEE 802.11b/g and MSR series routers installed with a SIC WLAN module. Overview The wireless security incorporated in 802.11 is inadequate for protecting networks that contain sensitive information.
Figure 12 Shared key authentication process Client Authentication Request Authentication Response(Challenge) Authentication(Encrypted Challenge) Authentication Response(Success) WLAN data security Compared with wired networks, WLAN networks are more susceptible to attacks because all WLAN devices share the same medium and thus every device can receive data from any other sending device.
Client access authentication PSK authentication To implement pre-shared key (PSK) authentication, the client and the authenticator must have the same shared key configured. Otherwise, the client cannot pass the PSK authentication. 802.1X authentication As a port-based access control protocol, 802.1X authenticates and controls accessing devices at the port level.
• MSR3600-51F. Configuring WLAN security Configuration task list To configure WLAN security in a service template, map the service template to a radio policy, and add radios to the radio policy. The SSID name, advertisement setting (beaconing), and encryption settings are configured in the service template. You can configure an SSID to support any combination of WPA, RSN, and Pre-RSN clients Task Remarks...
To configure the PTK lifetime: Step Command Remarks Enter system view. system-view Enter WLAN service wlan service-template template view. service-template-number crypto Optional. Configure the PTK lifetime. ptk-lifetime time By default, the PTK lifetime is 43200 seconds. Configuring the GTK rekey method A fat AP generates a group temporal key (GTK) and sends the GTK to a client during the authentication process between an AP and the client through group key handshake or the 4-way handshake.
Step Command Remarks Enable GTK rekey. gtk-rekey enable By default, GTK rekey is enabled. Configure GTK rekey gtk-rekey method packet-based The default packet number is based on packet. [ packet ] 10000000. Optional. By default, the device does not start Configure the device to GTK rekey when a client goes start GTK rekey when a...
Page 46
• WEP40/WEP104/WEP128 • TKIP • AES-CCMP Configuring WEP cipher suite The WEP encryption mechanism requires that the authenticator and clients on a WLAN have the same key configured. WEP adopts the RC4 algorithm (a stream encryption algorithm), supporting WEP40, WEP104 and WEP128 keys. You can use WEP with either open system or shared key authentication mode: •...
Step Command Remarks countermeasures are taken. Configuring AES-CCMP cipher suite Step Command Remarks Enter system view. system-view Enter WLAN service wlan service-template template view. service-template-number crypto Enable the AES-CCMP By default, no cipher suite is cipher-suite ccmp cipher suite. selected. Configuring port security The authentication type configuration includes the following options: •...
Configuring MAC address authentication 802.11i does not support MAC address authentication. To configure MAC address authentication: Step Command Enter system view. system-view Enter WLAN-BSS interface view. interface wlan-bss interface-number Enable MAC port security mode. port-security port-mode mac-authentication Configuring PSK and MAC address authentication For more information about port security configuration commands, see Security Configuration Guide.
• You can use the display wlan client command and display port-security preshared-key user command to view the online clients. MAC and PSK authentication configuration example Network requirements As shown in Figure 14, perform MAC and PSK authentication on the client. Figure 14 Network diagram RADIUS server 10.18.1.88/24...
Page 51
On the page that appears, enter 12345678 for Shared Key, add ports 1812, and 1813 for Authentication Port and Accounting Port, respectively, select LAN Access Service for Service Type, select H3C for Access Device Type, and select or manually add an access device with the IP address 10.18.1.1, and click Apply.
Page 52
Figure 15 Adding an access device Add a service: a. Click the Service tab. b. Select Access Service > Access Device from the navigation tree. c. Click Add. d. On the page that appears, set the service name to mac, keep the default values for other parameters, and click Apply.
Page 53
Figure 17 Adding an account Configuring the RADIUS server (IMCv5) The following takes the IMC (the IMC versions are IMC PLAT 5.0 and IMC UAM 5.0) as an example to illustrate the basic configurations of the RADIUS server. Add an access device: a.
Figure 19 Adding a service Add an account: a. Click the User tab. b. Select User > All Access Users from the navigation tree to enter the user page. c. Click Add. d. On the page that appears, enter username 00146c8a43ff, set the account name and password both to 00146c8a43ff, select the service mac, and click Apply.
Page 55
Figure 21 Network diagram RADIUS server 10.18.1.88/24 IP network FAT AP L2 switch Client 10.18.1.1/24 Configuration procedure Configure the fat AP: # Enable port security. <Sysname> system-view [Sysname] port-security enable # Configure the 802.1X authentication mode as EAP. [Sysname] dot1x authentication-method eap # Create a RADIUS scheme rad, and specify the extended RADIUS server type.
Page 56
# Create crypto-type service template 1, configure its SSID as dot1x, and configure the tkip and ccmp cipher suite. [Sysname] wlan service-template 1 crypto [Sysname-wlan-st-1] ssid dot1x # Enable the RSN-IE in the beacon and probe responses and enable the AES-CCMP cipher suite in the encryption of frames.
Page 57
Figure 22 Configuring the wireless card (1)
Page 58
Figure 23 Configuring the wireless card (2)
Figure 24 Configuring the wireless card (3) Verifying the configuration. • Enter the username user and password dot1x. The client can pass 802.1X authentication and access the WLAN. • You can use the display wlan client command, display connection command and display dot1x command to view the online clients.
Configuring WLAN IDS The terms AP and fat AP in this document refer to MSR800, MSR 900, MSR900-E, MSR 930, and MSR 20-1X routers with IEEE 802.11b/g and MSR series routers installed with a SIC WLAN module. Overview 802.11 networks are susceptible to a wide array of threats such as unauthorized access points and clients, ad hoc networks, and DoS attacks.
Flood attack detection A flood attack refers to the case where WLAN devices receive large volumes of frames of the same kind within a short span of time. When this occurs, the WLAN devices are overwhelmed. Consequently, they are unable to service normal clients. WIDS attacks detection counters flood attacks by constantly keeping track of the density of traffic generated by each device.
If the source MAC address does not match any entry in the white list, the frame is dropped. If there is a match, the frame is considered valid and is processed further. If no white list entries exist, the static and dynamic blacklists are searched. If the source MAC address matches an entry in any of the two lists, the frame is dropped.
Configuring AP operating mode A WLAN consists of various APs that span across the building offering WLAN services to the clients. The administrator may want some of these APs to detect rogue devices. The administrator can configure an AP to operate in any of the three modes, normal, monitor, or hybrid. •...
Task Command Remarks Clear the history of attacks reset wlan ids history Available in user view. detected by the WLAN system. Clear the statistics of attacks reset wlan ids statistics Available in user view. detected in the WLAN system. Configuring blacklist and whitelist Perform this task to configure the static blacklist, static white list, enable dynamic blacklist feature, and configure the lifetime for dynamic entries.
Displaying and maintaining blacklist and whitelist Task Command Remarks display wlan blacklist { static | dynamic } [ | Display blacklist entries. Available in any view. { begin | exclude | include } regular-expression ] display wlan whitelist [ | { begin | Display white list entries.
Configuring WLAN QoS The terms AP and fat AP in this document refer to MSR800, MSR 900, MSR900-E, MSR 930, and MSR 20-1X routers with IEEE 802.11b/g and MSR series routers installed with a SIC WLAN module. Overview An 802.11 network offers contention-based wireless access. To provide applications with QoS services, IEEE developed 802.11e for the 802.11-based WLAN architecture.
Page 70
queue. The idle duration increases as the AIFSN value increases (see Figure 28 for the AIFS durations). • Exponent form of CWmin (ECWmin) and exponent form of CWmax (ECWmax)—Determine the average backoff slots, which increases as the two values increase (see Figure 28 for the backoff slots).
(except the TXOPLimit parameter for devices using 802.11b radio cards) unless it is necessary to modify the default settings. • When the radio card of a device is 802.11b, H3C recommends that you set the TXOPLimit values of the AC-BK, AC-BE, AC-VI, and AC-VO queues to 0, 0, 188, and 102, respectively. •...
Configuration procedure Step Command Remarks Enter system view. system-view Enter WLAN-radio interface interface wlan-radio view. radio-number By default, WMM is enabled. The 802.11n protocol stipulates that all 802.11n clients support WLAN QoS. Therefore, when the Enable WMM. wmm enable radio operates in 802.11gn mode, you should enable WMM.
Table 4 The default EDCA parameters for APs AC queue AIFSN ECWmin ECWmax TXOP Limit AC-BK queue AC-BE queue AC-VI queue AC-VO queue Displaying and maintaining WMM Task Command Remarks display wlan statistics client { all | mac-address Display WLAN statistics of the mac-address } [ | { begin | Available in any view.
Page 74
[Sysname-WLAN-BSS1] quit # Configure interface Ethernet 1/0 to use the 802.1p priority of received packets for priority mapping. [Sysname] interface Ethernet 1/0 [Sysname-Ethernet1/0] qos trust dot1p [Sysname-Ethernet1/0] quit # Create a clear-type WLAN service template, configure its SSID as market, configure its authentication method as Open System, and then enable the WLAN service template.
Page 75
[Sysname] interface ethernet 1/0 [Sysname-Ethernet1/0] qos trust dot1p [Sysname-Ethernet1/0] quit # Create a clear-type WLAN service template, configure its SSID as market, configure its authentication method as Open System, and then enable the WLAN service template. [Sysname] wlan service-template 1 clear [Sysname-wlan-st-1] ssid market [Sysname-wlan-st-1] authentication-method open-system [Sysname-wlan-st-1] service-template enable...
# Configure interface WLAN-BSS 1 to use the 802.11e priority of received packets for priority mapping. <Sysname> system-view [Sysname] interface wlan-bss 1 [Sysname-WLAN-BSS1] qos trust dot11e [Sysname-WLAN-BSS1] quit # Configure interface Ethernet 1/0 to use the 802.1p priority of received packets for priority mapping.
Analysis The SVP packet priority mapping function or CAC takes effect only after WMM is enabled. Solution Use the wmm enable command to enable the WMM function. Check the state of the SVP priority mapping function or CAC again. The SVP packet priority mapping function takes effect on only non-WMM clients. Check whether the client is a non-WMM client.
Client rate limiting configuration example Network requirements The fat AP is connected to Switch. Configure client rate limiting on the fat AP, so that fat AP limits the incoming traffic in static mode and limits the outgoing traffic in dynamic mode for the clients. Figure 32 Network diagram Configuration procedure # Create a WLAN-ESS interface.
Page 79
Inbound Static 8000 Outbound Dynamic 8000 -------------------------------------------------------------------------------- When only Client 1 accesses the WLAN through SSID service, the available bandwidth is limited to around 8000 kbps. When both Client 1 and Client 2 access the WLAN through SSID service, the bandwidth available for the traffic from either Client 1 or Client 2 to the AP is limited to around 8000 kbps, and the bandwidth available for the traffic from the AP to either Client 1 or Client 2 is limited to around 4000 kbps.
Index C D H O S W Hardware compatibility with WLAN,57 Hardware compatibility with WLAN,11 Configuration task list,25 Hardware compatibility with WLAN,64 Configuring 802.11g protection,29 Hardware compatibility with WLAN,25 Configuring 802.11n protection,30 Hardware compatibility with WLAN,35 Configuring a WLAN BSS interface,2 Hardware compatibility with WLAN,1...
Need help?
Do you have a question about the MSR Series and is the answer not in the manual?
Questions and answers