{"id":236,"date":"2024-09-19T10:35:46","date_gmt":"2024-09-19T02:35:46","guid":{"rendered":"http:\/\/192.168.5.24\/?p=236"},"modified":"2025-03-04T17:51:58","modified_gmt":"2025-03-04T09:51:58","slug":"%e5%8d%8e%e4%b8%baacap%e5%ae%9e%e7%8e%b0wlan","status":"publish","type":"post","link":"https:\/\/bigvip.dpdns.org\/?p=236","title":{"rendered":"\u534e\u4e3aAC+AP\u5b9e\u73b0WLAN"},"content":{"rendered":"\n<p>AC\u7ec4\u7f51\u65b9\u5f0f\uff1a\u65c1\u6302\u4e8c\u5c42\u7ec4\u7f51\u3002\u4e1a\u52a1\u6570\u636e\u8f6c\u53d1\u65b9\u5f0f\uff1a\u96a7\u9053\u8f6c\u53d1\u3002<br>DHCP\u90e8\u7f72\u65b9\u5f0f\uff1a<br>AC\u4f5c\u4e3aDHCP\u670d\u52a1\u5668\u4e3aAP\u5206\u914dIP\u5730\u5740\u3002<br>\u6c47\u805a\u4ea4\u6362\u673aS2\u4f5c\u4e3aDHCP\u670d\u52a1\u5668\u4e3aSTA\u5206\u914dIP\u5730\u5740\u3002<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"526\" height=\"598\" src=\"http:\/\/192.168.5.24\/wp-content\/uploads\/2024\/09\/wlan-1.jpg\" alt=\"\" class=\"wp-image-240\" srcset=\"https:\/\/bigvip.dpdns.org\/wp-content\/uploads\/2024\/09\/wlan-1.jpg 526w, https:\/\/bigvip.dpdns.org\/wp-content\/uploads\/2024\/09\/wlan-1-264x300.jpg 264w\" sizes=\"auto, (max-width: 526px) 100vw, 526px\" \/><\/figure>\n\n\n\n<p>WLAN\u7684\u914d\u7f6e\u6bd4\u8f83\u590d\u6742\uff0c\u5404\u6a21\u7248\u76f4\u63a5\u7684\u5957\u7528\u5173\u7cfb\u53ef\u4ee5\u53c2\u8003\u4e00\u4e0b\u56fe\uff1a<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"984\" height=\"244\" src=\"http:\/\/192.168.5.24\/wp-content\/uploads\/2024\/09\/wlan.png\" alt=\"\" class=\"wp-image-247\" srcset=\"https:\/\/bigvip.dpdns.org\/wp-content\/uploads\/2024\/09\/wlan.png 984w, https:\/\/bigvip.dpdns.org\/wp-content\/uploads\/2024\/09\/wlan-300x74.png 300w, https:\/\/bigvip.dpdns.org\/wp-content\/uploads\/2024\/09\/wlan-768x190.png 768w, https:\/\/bigvip.dpdns.org\/wp-content\/uploads\/2024\/09\/wlan-816x202.png 816w\" sizes=\"auto, (max-width: 984px) 100vw, 984px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>1\u3001\u914d\u7f6e\u597d\u4ea4\u6362\u673a\u548cAC\u7684\u63a5\u53e3\uff0c\u8ba9AP\u80fd\u4e0eAC\u5efa\u7acbCAPWAP\u96a7\u9053\u3002<\/p>\n\n\n\n<p>2\u3001AC\u4e0a\u8bbe\u7f6eAP\u7684\u8ba4\u8bc1\u6a21\u5f0f\u4e3a\u65e0\u8ba4\u8bc1\u6a21\u5f0f\uff1a ap auth-mode no-auth<\/p>\n\n\n\n<p>3\u3001\u7528dis ap all \u67e5\u770bAP\u662f\u5426\u8fde\u63a5AC<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"663\" height=\"272\" src=\"http:\/\/192.168.5.24\/wp-content\/uploads\/2024\/09\/image-6.png\" alt=\"\" class=\"wp-image-972\" srcset=\"https:\/\/bigvip.dpdns.org\/wp-content\/uploads\/2024\/09\/image-6.png 663w, https:\/\/bigvip.dpdns.org\/wp-content\/uploads\/2024\/09\/image-6-300x123.png 300w\" sizes=\"auto, (max-width: 663px) 100vw, 663px\" \/><\/figure>\n\n\n\n<p>4\u3001\u5f53AP\u4e0eAC\u5efa\u7acb\u8fde\u63a5\u540e\u5c31\u53ef\u4ee5\u5728AC\u4e0a\u8fdb\u884cap-id\u7684\u8bbe\u7f6e<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"662\" height=\"138\" src=\"http:\/\/192.168.5.24\/wp-content\/uploads\/2024\/09\/image-7.png\" alt=\"\" class=\"wp-image-973\" srcset=\"https:\/\/bigvip.dpdns.org\/wp-content\/uploads\/2024\/09\/image-7.png 662w, https:\/\/bigvip.dpdns.org\/wp-content\/uploads\/2024\/09\/image-7-300x63.png 300w\" sizes=\"auto, (max-width: 662px) 100vw, 662px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>\u5404\u8bbe\u5907\u7684\u5177\u4f53\u914d\u7f6e\u5982\u4e0b\uff1a<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>&lt;AC&gt;dis current-configuration \n#\n sysname AC\n#\n set memory-usage threshold 0\n#\nssl renegotiation-rate 1 \n#\nvlan batch 100 to 101\n#\nauthentication-profile name default_authen_profile\nauthentication-profile name dot1x_authen_profile\nauthentication-profile name mac_authen_profile\nauthentication-profile name portal_authen_profile\nauthentication-profile name macportal_authen_profile\n#\ndhcp enable\n#\ndiffserv domain default\n#\nradius-server template default\n#\npki realm default\n rsa local-key-pair default\n enrollment self-signed\n#\nike proposal default\n encryption-algorithm aes-256 \n dh group14 \n authentication-algorithm sha2-256 \n authentication-method pre-share\n integrity-algorithm hmac-sha2-256 \n prf hmac-sha2-256 \n#\nfree-rule-template name default_free_rule\n#\nportal-access-profile name portal_access_profile\n#\naaa\n authentication-scheme default\n authentication-scheme radius\n  authentication-mode radius\n authorization-scheme default\n accounting-scheme default\n domain default\n  authentication-scheme radius\n  radius-server default\n domain default_admin\n  authentication-scheme default\n local-user admin password irreversible-cipher $1a$-j(u\"#;&amp;G*$9!,Z0(_'ML81\/~0U\\h\n.#d6&#91;.QA(-#9V,L@!]fmdQ$\n local-user admin privilege level 15\n local-user admin service-type http\n#\ninterface Vlanif100\n ip address 192.168.100.1 255.255.255.0\n dhcp select interface\n#\ninterface MEth0\/0\/1\n undo negotiation auto\n duplex half\n#\ninterface GigabitEthernet0\/0\/1\n port link-type trunk\n port trunk allow-pass vlan 2 to 4094\n#\ninterface NULL0\n#\n snmp-agent local-engineid 800007DB03000000000000\n snmp-agent \n#\nssh server secure-algorithms cipher aes256_ctr aes128_ctr\nssh server key-exchange dh_group14_sha1\nssh client secure-algorithms cipher aes256_ctr aes128_ctr\nssh client secure-algorithms hmac sha2_256\nssh client key-exchange dh_group14_sha1\n#\ncapwap source interface vlanif100\n#\nuser-interface con 0\n authentication-mode password\nuser-interface vty 0 4\n protocol inbound all\nuser-interface vty 16 20\n protocol inbound all\n#\nwlan\n traffic-profile name default\n security-profile name secp\n  security wpa2 psk pass-phrase %^%#yl#t4a-(BQ^=\"(AwoLUAvbe@WIY&lt;XRhozj)w{xuA%^%#\n aes\n security-profile name default\n security-profile name default-wds\n security-profile name default-mesh\n ssid-profile name ssidp\n  ssid qingmeiT1\n ssid-profile name default\n vap-profile name vapp\n  forward-mode tunnel\n  service-vlan vlan-id 101\n  ssid-profile ssidp\n  security-profile secp\n vap-profile name default\n wds-profile name default\n mesh-handover-profile name default\n mesh-profile name default\n regulatory-domain-profile name rdp\n regulatory-domain-profile name default\n air-scan-profile name default\n rrm-profile name default\n radio-2g-profile name default\n radio-5g-profile name default\n wids-spoof-profile name default\n wids-profile name default\n wireless-access-specification\n ap-system-profile name default\n port-link-profile name default\n wired-port-profile name default\n serial-profile name preset-enjoyor-toeap \n ap auth-mode no-auth\n ap-group name apg\n  regulatory-domain-profile rdp\n  radio 0\n   vap-profile vapp wlan 1\n  radio 1\n   vap-profile vapp wlan 1\n  radio 2\n   vap-profile vapp wlan 1\n ap-group name default\n ap-id 0 type-id 69 ap-mac 00e0-fc6a-5d40 ap-sn 2102354483103A24C14B\n  ap-group apg\n ap-id 1 type-id 69 ap-mac 00e0-fcb1-04e0 ap-sn 2102354483106C0D3447\n  ap-group apg\n provision-ap\n#\ndot1x-access-profile name dot1x_access_profile\n#\nmac-access-profile name mac_access_profile\n#\nreturn\n&lt;AC&gt;<\/code><\/pre>\n\n\n\n<p>\u6838\u5fc3\u4ea4\u6362\u673a\u7684\u914d\u7f6e\uff1a<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>&lt;s2&gt;dis cur\n#\nsysname s2\n#\nvlan batch 100 to 101\n#\ncluster enable\nntdp enable\nndp enable\n#\ndrop illegal-mac alarm\n#\ndhcp enable\n#\ndiffserv domain default\n#\ndrop-profile default\n#\naaa\n authentication-scheme default\n authorization-scheme default\n accounting-scheme default\n domain default\n domain default_admin\n local-user admin password simple admin\n local-user admin service-type http\n#\ninterface Vlanif1\n#\ninterface Vlanif101\n ip address 192.168.101.1 255.255.255.0\n dhcp select interface\n#\ninterface MEth0\/0\/1\n#\ninterface GigabitEthernet0\/0\/1\n port link-type trunk\n port trunk allow-pass vlan 2 to 4094\n#\ninterface GigabitEthernet0\/0\/2\n port link-type trunk\n port trunk allow-pass vlan 2 to 4094\n#<\/code><\/pre>\n\n\n\n<p>\u63a5\u5165\u4ea4\u6362\u673a\u7684\u914d\u7f6e\uff1a<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>&lt;s1&gt;dis current-configuration \n#\nsysname s1\n#\nvlan batch 100\n#\ncluster enable\nntdp enable\nndp enable\n#\ndrop illegal-mac alarm\n#\ndiffserv domain default\n#\ndrop-profile default\n#\naaa\n authentication-scheme default\n authorization-scheme default\n accounting-scheme default\n domain default\n domain default_admin\n local-user admin password simple admin\n local-user admin service-type http\n#\ninterface Vlanif1\n#\ninterface MEth0\/0\/1\n#\ninterface Ethernet0\/0\/1\n port link-type access\n port default vlan 100\n#\ninterface Ethernet0\/0\/2\n port link-type access\n port default vlan 100\n#\ninterface Ethernet0\/0\/3\n port link-type trunk\n port trunk allow-pass vlan 2 to 4094\n#<\/code><\/pre>\n\n\n\n<p>5\u3001AP\u65e0\u9700\u4efb\u4f55\u914d\u7f6e\uff0c\u8fde\u63a5\u4e0a\u5f00\u673a\u5373\u53ef\u4f7f\u7528\u3002<\/p>\n\n\n\n<p>6\u3001STA\u5728VAP\u5217\u8868\u4e2d\u9009\u62e9SSID\u5e76\u8f93\u5165\u5bc6\u7801\u8fde\u63a5\u5373\u53ef\u3002<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"516\" src=\"http:\/\/192.168.5.24\/wp-content\/uploads\/2024\/09\/sta.png\" alt=\"\" class=\"wp-image-243\" srcset=\"https:\/\/bigvip.dpdns.org\/wp-content\/uploads\/2024\/09\/sta.png 750w, https:\/\/bigvip.dpdns.org\/wp-content\/uploads\/2024\/09\/sta-300x206.png 300w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/figure>\n\n\n\n<p>\u603b\u7ed3\uff1a<\/p>\n\n\n\n<p>1\u3001VAP\u4e2d\u8bbe\u7f6e\u7684service-vlan vlan-id 101  \u628a\u4e1a\u52a1\u6570\u636e\u5c01\u88c5\u5230vlan 101\u4e2d\u3002<\/p>\n\n\n\n<p>2\u3001\u5f53AC\u4e3aforward-mode tunnel \u65f6vlan101\u5728AC\u4e2d\u4ea7\u751f\uff0c\u4f46AC\u4e3aforward-mode direct-forward\u65f6\uff0cVLAN101\u5728AP\u5904\u4ea7\u751f\uff0c\u8fd9\u65f6\u5019\u8981\u6ce8\u610f\u5404\u4ea4\u6362\u673a\u5fc5\u987b\u8fd0\u884cVLAN101\u901a\u8fc7\u3002<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AC\u7ec4\u7f51\u65b9\u5f0f\uff1a\u65c1\u6302\u4e8c\u5c42\u7ec4\u7f51\u3002\u4e1a\u52a1\u6570\u636e\u8f6c\u53d1\u65b9\u5f0f\uff1a\u96a7\u9053\u8f6c\u53d1\u3002DHCP\u90e8\u7f72\u65b9\u5f0f\uff1aAC\u4f5c\u4e3aDHCP\u670d\u52a1\u5668\u4e3aAP\u5206\u914dIP [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"aside","meta":{"footnotes":""},"categories":[7],"tags":[48,47,6,46],"class_list":["post-236","post","type-post","status-publish","format-aside","hentry","category-7","tag-ac","tag-ap","tag-vlan","tag-wlan","post_format-post-format-aside"],"_links":{"self":[{"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=\/wp\/v2\/posts\/236","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=236"}],"version-history":[{"count":7,"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=\/wp\/v2\/posts\/236\/revisions"}],"predecessor-version":[{"id":975,"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=\/wp\/v2\/posts\/236\/revisions\/975"}],"wp:attachment":[{"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=236"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=236"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}