Page 1
H3C WA Series WLAN Access Points ACL and QoS Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document Version: 6W100-20100910...
Page 2
SecPro, SecPoint, SecEngine, SecPath, Comware, Secware, Storware, NQA, VVG, V G, V G, PSPT, XGbus, N-Bus, TiGem, InnoVision and HUASAN are trademarks of Hangzhou H3C Technologies Co., Ltd. All other trademarks that may be mentioned in this manual are the property of their respective owners.
Page 3
The H3C WA documentation set includes 10 configuration guides, which describe the software features for the H3C WA series WLAN access points and guide you through the software configuration procedures. These configuration guides also provide configuration examples to help you apply the software features to different network scenarios.
Page 4
Means an action or information that needs special attention to ensure successful configuration or good performance. Means a complementary description. Means techniques helpful for you to make configuration with ease. About the H3C WA Documentation Set The H3C WA documentation set includes: Category Documents...
Page 5
Obtaining Documentation You can access the most up-to-date H3C product documentation on the World Wide Web at http://www.h3c.com. Click the links on the top navigation bar to obtain different categories of product documentation: [Technical Support &...
Table of Contents 1 Applicable Models and Software Versions ·····························································································1-1 2 Feature Matrix ············································································································································2-1 3 Command/Parameter Matrix·····················································································································3-1 4 ACL Configuration·····································································································································4-1 ACL Overview ·········································································································································4-1 ACL Categories ·······························································································································4-2 ACL Numbering and Naming ··········································································································4-2 Match Order·····································································································································4-2 ACL Rule Numbering·······················································································································4-4 Implementing Time-Based ACL Rules ····························································································4-4 IPv4 Fragments Filtering with ACLs ································································································4-4 ACL Configuration Task List ···················································································································4-4 Configuring an ACL·································································································································4-5...
Page 7
Defining a QoS Policy and Applying the QoS Policy to an Interface ··············································6-3 Displaying and Maintaining QoS Policies ·······························································································6-3 7 Priority Mapping Configuration················································································································7-1 Introduction to Packet Precedences ·······································································································7-1 IP Precedence and DSCP Values···································································································7-1 802.1p Priority ·································································································································7-2 802.11e Priority ·······························································································································7-3 Priority Mapping Overview ······················································································································7-3 Introduction to Priority Mapping·······································································································7-3 Introduction to Priority Mapping Tables···························································································7-4 Priority Mapping Configuration Task List ································································································7-5...
Read this chapter before using an H3C WA series WLAN access point. Applicable Models and Software Versions H3C WA series WLAN access points include the WA2200 series and WA2600 series. Table 1-1 shows the applicable models and software versions.
Feature Matrix Support of the H3C WA series WLAN access points for features, commands and parameters may vary by device model. See this document for more information. For information about feature support, see Table 2-1. For information about command and...
Command/Parameter Matrix Table 3-1 Command/Parameter matrix Document Module Command/Parameter WA2200 series WA2600 series display ip https Not supported Supported ip https acl Not supported Supported Fundamentals Command HTTP commands ip https certificate Not supported Supported Reference access-control-policy ip https enable...
Page 11
Document Module Command/Parameter WA2200 series WA2600 series The maximum number of broadcast packets pps max-pps pps max-pps broadcast-suppression that can be ranges from 1 to ranges from 1 to { ratio | pps max-pps } forwarded on an 148810. 1488100.
The models listed in this document are not applicable to all regions. Please consult your local sales office for the models applicable to your region. Support of the H3C WA series WLAN access points (APs) for features may vary by AP model. For more information, see Feature Matrix.
ACL Categories ACL Numbering and Naming Match Order ACL Rule Numbering Implementing Time-Based ACL Rules IPv4 Fragments Filtering with ACLs ACL Categories ACLs fall into four categories, as shown in Table 4-1. Table 4-1 ACL categories Category ACL number IP version Match criteria WLAN ACLs 100 to 199...
Page 14
auto – Sorts ACL rules in depth-first order. Depth-first ordering ensures that any subset of a rule is always matched before the rule. Table 4-2 lists the sequence of tie breakers that depth-first ordering uses to sort rules for each type of ACL. The match order of WLAN ACLs can only be config.
Traditional packet filtering matches only first fragments of IPv4 packets, and allows all subsequent non-first fragments to pass through. Attackers can fabricate non-first fragments to attack networks. To avoids the risks, the H3C ACL implementation: Filters all fragments by default, including non-first fragments.
Task Remarks Creating a Time Range Optional Configuring a WLAN ACL Configuring an IPv4 basic ACL Required Configure at least one task. Configuring an IPv4 advanced ACL Configuring an Ethernet Frame Header ACL Copying an IPv4 ACL Optional IPv6 ACL configuration task list Complete the following tasks to configure an IPv6 ACL: Task Remarks...
To do… Use the command… Remarks Required Create a WLAN ACL and acl number acl-number By default, no ACL exists. enter its view WLAN ACLs are numbered in the range 100 to 199. Optional Configure a description description text for the WLAN ACL By default, a WLAN ACL has no ACL description.
To do… Use the command… Remarks Enter system view system-view –– Required By default, no ACL exists. Create an IPv6 basic acl ipv6 number acl6-number IPv6 basic ACLs are numbered in the range 2000 ACL view and enter its [ name acl6-name ] to 2999.
Page 19
To do… Use the command… Remarks Optional Set the rule numbering step step-value step 5 by default. rule [ rule-id ] { deny | permit } protocol [ { { ack ack-value | fin fin-value | psh psh-value | rst rst-value | syn syn-value | urg Required urg-value } * | established } |...
Copying an ACL You can create an ACL by copying an existing ACL. The new ACL has the same properties and content as the source ACL except the ACL number and name. To successfully copy an ACL, ensure that: The destination ACL number is from the same category as the source ACL number. The source ACL already exists but the destination ACL does not.
Page 22
Permits access from the President’s office at any time to the salary server of the Financial department. Deny access from any other department to the salary server during working hours (from 8:00 to 18:00) on working days. Figure 4-1 Network diagram for ACL configuration Configuration Procedure Create a time range for office hours # Create a periodic time range from 8:00 to 18:00 in working days.
[AP-behavior-access2] filter deny [AP-behavior-access2] qos policy access [AP-qospolicy-access] classifier access1 behavior access1 [AP-qospolicy-access] classifier access2 behavior access2 [AP-qospolicy-access] interface wlan-bss1 [AP-WLAN-BSS1] qos apply policy access inbound IPv6 ACL Configuration Example Network Requirements Perform packet filtering in the inbound direction of interface WLAN-BSS 1 to deny all IPv6 packets but those with source addresses in the range 4050::9000 to 4050::90FF.
The models listed in this document are not applicable to all regions. Please consult your local sales office for the models applicable to your region. Support of the H3C WA series WLAN access points (APs) for features may vary by AP model. For more information, see Feature Matrix.
IntServ Service Model The integrated service (IntServ) model is a multiple-service model that can accommodate diverse QoS requirements. It provides the most granularly differentiated QoS by identifying and guaranteeing definite QoS for each data flow. In the IntServ model, an application must request service from the network before it sends data. IntServ signals the service request with the Resource Reservation Protocol (RSVP).
Applying QoS Techniques in a Network Figure 5-1 Positions of the QoS techniques in a network As shown in Figure 5-1, traffic classification, traffic shaping, traffic policing, congestion management, and congestion avoidance mainly implement the following functions: Traffic classification uses certain match criteria to assign packets with the same characteristics to a class.
QoS Processing Flow in an AP Figure 5-2 QoS processing flow Figure 5-2 briefly describes how the QoS module processes traffic: Traffic classifier identifies and classifies traffic for subsequent QoS actions. The QoS module takes various QoS actions on classified traffic as configured, depending on the traffic processing phase and network status.
QoS Policy Configuration This chapter includes these sections: QoS Configuration Approach Overview Configuring a QoS Policy Displaying and Maintaining QoS Policies QoS Configuration Approach Overview Two approaches are available for configuring QoS: Non-Policy Approach Policy Approach. Some features support both approaches, but some support only one. Non-Policy Approach In non-policy approach, you configure QoS service parameters directly without using a QoS policy.
Figure 6-1 QoS policy configuration procedure Define a class Define a traffic behavior Define a policy Apply the policy to an interface Defining a Class To define a class, specify its name and then configure the match criteria in class view. Follow these steps to define a class: To do...
To do... Use the command... Remarks Optional To drop matching packets, select the deny Drop or send packets filter { deny | permit } keyword. To permit matching packets to pass through, select the permit keyword. Set the local precedence remark local-precedence Optional for packets...
Page 31
To do... Use the command... Remarks Display traffic behavior display traffic behavior Available in any view configuration information user-defined [ behavior-name ] Display the configuration of one or display qos policy user-defined all classes in one or all QoS [ policy-name [ classifier Available in any view policies and the associated tcl-name ] ]...
Priority Mapping Configuration This chapter includes these sections: Introduction to Packet Precedences Priority Mapping Overview Priority Mapping Configuration Task List Configuring Priority Mapping Displaying and Maintaining Priority Mapping Priority Mapping Configuration Example Introduction to Packet Precedences IP Precedence and DSCP Values Figure 7-1 ToS and DS fields As shown in Figure...
called the 802.1p priority, because its use is defined in IEEE 802.1p. Table 7-3 presents the values for 802.1p priority. Figure 7-3 802.1Q tag header Byte 1 Byte 2 Byte 3 Byte 4 TPID (Tag protocol identifier) TCI (Tag control information) 1 0 0 0 0 0 0 1 0 0 0 0 0 0 0 Priority VLAN ID...
rules depending on AP status. This process is called priority mapping. The set of QoS priority parameters decides the scheduling priority and forwarding priority of the packet. Priority mapping is implemented with priority mapping tables and involves priorities such as 802.11e priority and 802.1p priority.
Table 7-6 The default lp-dot1p and lp-dscp mappings Local precedence 802.1p priority DSCP Table 7-7 The default port priority-local precedence mapping Port priority Local precedence For the default dot11e-lp and lp-dot11e mappings, an input value yields a target value that is equal to Priority Mapping Configuration Task List You can configure priority mapping in two approaches: Configuring priority trust mode.
Task Remarks Configuring a Priority Mapping Table Optional Configuring a Port to Trust Packet Priority for Priority Mapping Optional Changing the Port Priority of an Interface Optional Configuring Priority Mapping Configuring a Priority Mapping Table Follow these steps to configure a priority mapping table: To do...
Changing the Port Priority of an Interface If an interface does not trust any packet priority, the AP uses its port priority to look for the set of priority parameters for the incoming packets. By changing port priority, you can prioritize traffic received on different interfaces.
Page 39
Figure 7-5 Network diagram for priority mapping configuration Eth1/0/2 Eth1/0/3 Switch Eth1/0/1 Host A Host B Eth1/0/1 ESS 1( WLAN - BSS 1) ESS 2 ( WLAN - BSS 2 ) Configuration procedure Configure the switch # Create VLAN 2 and VLAN 3. <Switch>...
Page 40
[AP-wlan-st-2]quit # Create interface WLAN-BSS2, and configure its port priority as 7. [AP] interface wlan-bss 2 [AP-WLAN-BSS2] qos priority 7 [AP-WLAN-BSS2] quit [AP] interface wlan-radio 1/0/2 [AP-WLAN-Radio1/0/2] service-template 2 interface WLAN-BSS 2 [AP-wlan-st-2] quit # Assign interfaces WLAN-BSS 1 and WLAN-BSS 2 to different VLANs, such as VLAN 2 and VLAN 3 respectively.
Index ACL Configuration Examples 4-10 ACL Configuration Task List ACL Overview Configuring a QoS Policy Configuring an ACL Configuring Priority Mapping Displaying and Maintaining ACLs 4-10 Displaying and Maintaining Priority Mapping Displaying and Maintaining QoS Policies Introduction to Packet Precedences Introduction to QoS Service Models Introduction to QoS Priority Mapping Configuration Example...
Need help?
Do you have a question about the WA2200 Series and is the answer not in the manual?
Questions and answers