{"id":976,"date":"2025-03-05T15:55:57","date_gmt":"2025-03-05T07:55:57","guid":{"rendered":"http:\/\/192.168.5.24\/?p=976"},"modified":"2025-03-05T15:55:58","modified_gmt":"2025-03-05T07:55:58","slug":"wlan%e7%9b%b4%e6%8e%a5%e8%bd%ac%e5%8f%91%e6%a8%a1%e5%bc%8f%e7%9a%84%e9%85%8d%e7%bd%ae","status":"publish","type":"post","link":"https:\/\/bigvip.dpdns.org\/?p=976","title":{"rendered":"WLAN\u76f4\u63a5\u8f6c\u53d1\u6a21\u5f0f\u7684\u914d\u7f6e"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"732\" src=\"http:\/\/192.168.5.24\/wp-content\/uploads\/2025\/03\/image-1024x732.png\" alt=\"\" class=\"wp-image-977\" srcset=\"https:\/\/bigvip.dpdns.org\/wp-content\/uploads\/2025\/03\/image-1024x732.png 1024w, https:\/\/bigvip.dpdns.org\/wp-content\/uploads\/2025\/03\/image-300x214.png 300w, https:\/\/bigvip.dpdns.org\/wp-content\/uploads\/2025\/03\/image-768x549.png 768w, https:\/\/bigvip.dpdns.org\/wp-content\/uploads\/2025\/03\/image-816x583.png 816w, https:\/\/bigvip.dpdns.org\/wp-content\/uploads\/2025\/03\/image.png 1052w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>\u62d3\u6251\u56fe\u5982\u4e0a\uff0c\u8981\u6c42AC\u4f7f\u7528\u76f4\u63a5\u8f6c\u53d1\u6a21\u5f0f\uff0c\u7ba1\u7406\u6570\u636e\u4f7f\u7528vlan100\uff0c\u4e1a\u52a1\u6570\u636e\u4f7f\u7528vlan101\u3002AP\u7684IP\u7531AC\u7684DHCP\u5206\u914d\uff1bSTA\u7684IP\u7531SW2\u5206\u914d\u3002<\/p>\n\n\n\n<p>\u5404\u8bbe\u5907\u7684\u914d\u7f6e\u5982\u4e0b\uff1a<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>#\n set memory-usage threshold 0\n#\nssl renegotiation-rate 1 \n#\nvlan batch 100 to 101\n#\nauthentication-profile name default_authen_profile\nauthentication-profile name dot1x_authen_profile\nauthentication-profile name mac_authen_profile\nauthentication-profile name portal_authen_profile\nauthentication-profile name macportal_authen_profile\n#\ndhcp enable\n#\ndiffserv domain default\n#\nradius-server template default\n#\npki realm default\n rsa local-key-pair default\n enrollment self-signed\n#\nike proposal default\n encryption-algorithm aes-256 \n dh group14 \n authentication-algorithm sha2-256 \n authentication-method pre-share\n integrity-algorithm hmac-sha2-256 \n prf hmac-sha2-256 \n#\nfree-rule-template name default_free_rule\n#\nportal-access-profile name portal_access_profile\n#\naaa\n authentication-scheme default\n authentication-scheme radius\n  authentication-mode radius\n authorization-scheme default\n accounting-scheme default\n domain default\n  authentication-scheme radius\n  radius-server default\n domain default_admin\n  authentication-scheme default\n local-user admin password irreversible-cipher $1a$cXi,6$&#91;,5~$f@H&#91;*GFxs6z,kYD\/Ge\nsI%*i&amp;)x}lcNKG@S90q]X#$\n local-user admin privilege level 15\n local-user admin service-type http\n#\ninterface Vlanif100\n ip address 192.168.100.1 255.255.255.0\n dhcp select interface\n#\ninterface MEth0\/0\/1\n undo negotiation auto\n duplex half\n#\ninterface GigabitEthernet0\/0\/1\n port link-type trunk\n port trunk allow-pass vlan 2 to 4094\n#\ninterface GigabitEthernet0\/0\/2\n\n#\n snmp-agent local-engineid 800007DB03000000000000\n snmp-agent \n#\nssh server secure-algorithms cipher aes256_ctr aes128_ctr\nssh server key-exchange dh_group14_sha1\nssh client secure-algorithms cipher aes256_ctr aes128_ctr\nssh client secure-algorithms hmac sha2_256\nssh client key-exchange dh_group14_sha1\n#\ncapwap source interface vlanif100\n#\nuser-interface con 0\n authentication-mode password\nuser-interface vty 0 4\n protocol inbound all\nuser-interface vty 16 20\n protocol inbound all\n#\nwlan\n traffic-profile name default\n security-profile name secp1\n  security wpa-wpa2 psk pass-phrase %^%#wfzhVFVUj:POitNvz7a$&#91;6H$T&amp;g&amp;tS!R+S+@j*V$\n%^%# aes\n security-profile name default\n security-profile name default-wds\n security-profile name default-mesh\n ssid-profile name ssidp\n  ssid qingmei\n ssid-profile name default\n vap-profile name vapp1\n  service-vlan vlan-id 101\n  ssid-profile ssidp\n  security-profile secp1\n vap-profile name default\n wds-profile name default\n mesh-handover-profile name default\n mesh-profile name default\n regulatory-domain-profile name default\n air-scan-profile name default\n rrm-profile name default\n radio-2g-profile name default\n radio-5g-profile name default\n wids-spoof-profile name default\n wids-profile name default\n wireless-access-specification\n ap-system-profile name default\n port-link-profile name default\n wired-port-profile name default\n serial-profile name preset-enjoyor-toeap \n ap auth-mode no-auth\n ap-group name apg1\n  radio 0\n   vap-profile vapp1 wlan 1\n  radio 1\n   vap-profile vapp1 wlan 1\n  radio 2\n   vap-profile vapp1 wlan 1\n ap-group name default\n ap-id 0 type-id 56 ap-mac 00e0-fc33-3c90 ap-sn 21023544831076043B39\n  ap-name qingmei\n  ap-group apg1\n ap-id 1 type-id 56 ap-mac 00e0-fc0a-78c0 ap-sn 2102354483109E4AE826\n  ap-name qingmei2\n  ap-group apg1\n provision-ap\n#\ndot1x-access-profile name dot1x_access_profile\n#\nmac-access-profile name mac_access_profile\n#\nreturn\n&lt;AC6605>  <\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>#\nsysname SW2\n#\nvlan batch 100 to 101\n#\ncluster enable\nntdp enable\nndp enable\n#\ndrop illegal-mac alarm\n#\ndhcp enable\n#\ndiffserv domain default\n#\ndrop-profile default\n#\naaa\n authentication-scheme default\n authorization-scheme default\n accounting-scheme default\n domain default\n domain default_admin\n local-user admin password simple admin\n local-user admin service-type http\n#\ninterface Vlanif1\n#\ninterface Vlanif101\n ip address 192.168.101.1 255.255.255.0\n dhcp select interface\n#\ninterface MEth0\/0\/1\n#\ninterface GigabitEthernet0\/0\/1\n port link-type trunk\n port trunk allow-pass vlan 2 to 4094\n#\ninterface GigabitEthernet0\/0\/2\n port link-type trunk\n port trunk allow-pass vlan 2 to 4094\n#\nreturn<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>#\nsysname SW1\n#\nvlan batch 100 to 101\n#\ncluster enable\nntdp enable\nndp enable\n#\ndrop illegal-mac alarm\n#\ndiffserv domain default\n#\ndrop-profile default\n#\naaa\n authentication-scheme default\n authorization-scheme default\n accounting-scheme default\n domain default\n domain default_admin\n local-user admin password simple admin\n local-user admin service-type http\n#\ninterface Vlanif1\n#\ninterface MEth0\/0\/1\n#\ninterface Ethernet0\/0\/1\n port link-type trunk\n port trunk pvid vlan 100\n port trunk allow-pass vlan 2 to 4094\n#\ninterface Ethernet0\/0\/2\n port link-type trunk\n port trunk pvid vlan 100\n port trunk allow-pass vlan 2 to 4094\n#\ninterface Ethernet0\/0\/3\n port link-type trunk\n port trunk allow-pass vlan 2 to 4094\n#\nreturn<\/code><\/pre>\n\n\n\n<p>AP\u4e0d\u9700\u8981\u4efb\u4f55\u8bbe\u7f6e\u3002<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u62d3\u6251\u56fe\u5982\u4e0a\uff0c\u8981\u6c42AC\u4f7f\u7528\u76f4\u63a5\u8f6c\u53d1\u6a21\u5f0f\uff0c\u7ba1\u7406\u6570\u636e\u4f7f\u7528vlan100\uff0c\u4e1a\u52a1\u6570\u636e\u4f7f\u7528vlan101\u3002AP\u7684IP\u7531AC [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"aside","meta":{"footnotes":""},"categories":[7],"tags":[46],"class_list":["post-976","post","type-post","status-publish","format-aside","hentry","category-7","tag-wlan","post_format-post-format-aside"],"_links":{"self":[{"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=\/wp\/v2\/posts\/976","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=976"}],"version-history":[{"count":5,"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=\/wp\/v2\/posts\/976\/revisions"}],"predecessor-version":[{"id":982,"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=\/wp\/v2\/posts\/976\/revisions\/982"}],"wp:attachment":[{"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=976"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=976"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bigvip.dpdns.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}