0% found this document useful (0 votes)
83 views3 pages

AP Huawei

The document contains configuration commands for a network switch, setting things like the system name, VLANs, interfaces, wireless network profiles including SSIDs and passwords, authentication and authorization settings, and enabling services like SSH, HTTP, and disabling NTP. Default policies and templates are also defined for things like SSL, RADIUS, and free access rules. The configuration is customized for a wireless network named #LAB-BILINGUISMO-UTS in Colombia.

Uploaded by

O-Javier M-Parra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
83 views3 pages

AP Huawei

The document contains configuration commands for a network switch, setting things like the system name, VLANs, interfaces, wireless network profiles including SSIDs and passwords, authentication and authorization settings, and enabling services like SSH, HTTP, and disabling NTP. Default policies and templates are also defined for things like SSL, RADIUS, and free access rules. The configuration is customized for a wireless network named #LAB-BILINGUISMO-UTS in Colombia.

Uploaded by

O-Javier M-Parra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 3

sy

ctrl+B or ctrl+E into the BootRom

select 7 clear password for console user

after that you should choose the 1. Boot with default mode , (not choose the 8.
Reboot.)

Restart the Switch and press Ctrl+B to enter the BootROM menu,
and then enter the default password huawei / Admin@huawei.com. Press Ctrl+Z to
enter the hidden menu,
and then select option 2 to enter flash memory. Delete the vrpcfg.cfg file from the
flash memory, and then restart the

sysname AP01-64904
#
http secure-server ssl-policy default_policy
http server enable
#
undo clock timezone
#
ssl renegotiation-rate 1
#
vlan batch 100 367
#
authentication-profile name default_authen_profile
authentication-profile name dot1x_authen_profile
authentication-profile name mac_authen_profile
authentication-profile name portal_authen_profile
authentication-profile name macportal_authen_profile
#
dns resolve
dns proxy enable
#
dhcp enable
#
vlan 367
description VLAN-LAB.BILINGUISMO
#
radius-server template default
#
pki realm default
certificate-check none
rsa local-key-pair default
enrollment self-signed
#
ssl policy default_policy type server
pki-realm default
version tls1.0 tls1.1 tls1.2
ciphersuite rsa_aes_128_cbc_sha rsa_aes_128_sha256 rsa_aes_256_sha256
ssl policy https type client
pki-realm default
version tls1.2
server-verify enable
prefer-ciphersuite rsa_aes_128_sha256 rsa_aes_256_sha256
#
acl name nat 2000
rule 5 permit
#
free-rule-template name default_free_rule
#
portal-access-profile name portal_access_profile
#
aaa
authentication-scheme default
authentication-scheme radius
authentication-mode radius
authorization-scheme default
accounting-scheme default
domain default
authentication-scheme default
domain default_admin
authentication-scheme default
local-user admin password irreversible-cipher
$1a$#Z+@NTEZ(#$zgPXAg.gw'M9^w*WhE"2/eUCPZ|T3&j~Cq165M3N$
local-user admin privilege level 15
local-user admin service-type ssh http
#
interface Vlanif1
nat outbound 2000
#
interface Vlanif100
#
interface Vlanif367
ip address 172.15.67.4 255.255.255.192
#
interface GigabitEthernet0/0/0
port hybrid pvid vlan 367
undo port hybrid vlan 1
port hybrid untagged vlan 367
#
interface NULL0
#
undo snmp-agent
#
stelnet server enable
ssh server secure-algorithms cipher aes256_ctr aes128_ctr
ssh server secure-algorithms hmac sha2_256
ssh server key-exchange dh_group14_sha1
ssh client secure-algorithms cipher aes256_ctr aes128_ctr
ssh client secure-algorithms hmac sha2_256
ssh client key-exchange dh_group14_sha1
#
user-interface con 0
authentication-mode password
set authentication password cipher %^%#@YZo4R7|e2'q`T:M#"f&FN]TO+P0Z9`/*/ZM|2dL
%qi*;(Gx-F`1WqYZRuRI%^%#
user-interface vty 0 4
authentication-mode aaa
protocol inbound ssh
user-interface vty 16 20
protocol inbound all
#
wlan
traffic-profile name default
traffic-profile name default-ssid
traffic-profile name #LAB-BILINGUISMO-UTS
security-profile name default
security wpa-wpa2 psk pass-phrase %^%#*#Uh;PT5JJ:mi4>=25QGVCdj5h57JOQ=tzC.\@~)%^
%# aes
security-profile name default-ssid
security wpa-wpa2 psk pass-phrase %^%#2LR+Ic'>H;>~FHAO$oM':H(j2Z.bf~UZ97)N'\l:%^
%# aes
security-profile name #LAB-BILINGUISMO-UTS
security wpa-wpa2 psk pass-phrase %^%#2LR+Ic'>H;>~FHAO$oM':H(j2Z.bf~UZ97)N'\l:%^
%# aes
ssid-profile name default
ssid-profile name default-ssid
ssid #LAB.BILINGUISMO-UTS
ssid-profile name #LAB-BILINGUISMO-UTS
ssid #LAB-BILINGUISMO-UTS
vap-profile name default
vap-profile name default-ssid
service-vlan vlan-id 367
ssid-profile default-ssid
security-profile default-ssid
traffic-profile default-ssid
vap-profile name #LAB-BILINGUISMO-UTS
service-vlan vlan-id 367
ssid-profile #LAB-BILINGUISMO-UTS
security-profile #LAB-BILINGUISMO-UTS
traffic-profile #LAB-BILINGUISMO-UTS
country-code CO
air-scan-profile name default
rrm-profile name default
calibrate auto-txpower-select disable
radio-2g-profile name default
radio-5g-profile name default
wids
#
interface Wlan-Radio0/0/0
vap-profile #LAB-BILINGUISMO-UTS wlan 2
#
interface Wlan-Radio0/0/1
vap-profile #LAB-BILINGUISMO-UTS wlan 2
#
dot1x-access-profile name dot1x_access_profile
#
mac-access-profile name mac_access_profile
#
undo ntp-service enable
#
return

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy