This guide shows how to configure a Huawei device with the following AP models running firmware FitAP_Model_V200R006C10SPC800:

  • AP6010SN-GN
  • AP6010DN-AGN
  • AP6310SN-GN
  • AP6510DN-AGN
  • AP6610DN-AGN
  • AP7110SN-GN
  • AP7110DN-AGN
  • AP5010SN-GN
  • AP5010DN-AGN
  • AP3010DN-AGN
  • AP6510DN-AGN-US
  • AP6610DN-AGN-US
  • AP5030DN
  • AP5130DN
  • AP7030DE
  • AP2010DN
  • AP8130DN
  • AP8030DN
  • AP9330DN
  • AP4030DN
  • AP4130DN
  • AP3030DN
  • AP2030DN
  • AP9131DN
  • AP9132DN
  • AP5030DN-S
  • AP3010DN-V2

Please note that the images contained in this article may have outdated configuration data. Please check the data in the article "Parameters for the Solution" at the bottom of the page, as that information is up to date.


The configuration procedure has been performed and tested on Huawei Access Controller AC6005-8-PWR running firmware VRP (R) software, Version 5.130 (AC6005 V200R006C10) and Access Point AP5030DN running firmware FitAP5X30XN_V200R006C10SPC800.

Before integrating the Access Controller with Volare, it is necessary that it is connected to the Internet and reachable on the network and has open the UDP port 2000.

This guide will refer to the Access Controller AC6005 and the network architecture in the picture below.
In this case:

  • Network 1 includes the Access Controller
  • Network 2 includes the Access Points, any switch or any client


For all other network topologies. please contact Huawei support or read through the Huawei documentation available their site:

Accessing the device

By default, the Access Controller has the following IP address: You can manage and configure the AC by Telnet or by opening a web browser, visiting the following URL: and logging in as the admin user with a default password This guide will drive the configuration based on CLI.

Network 1 (AC)

Ethernet interfaces and VLANs

  • Configure a Service VLAN and the CapWap source IP address (in this example is the IP address configured in Vlan150) on the GigabitEthernet interface attached to your default gateway (GigabitEthernet0/0/1).
  • Configure a management VLAN. (Management of APs - Vlan30).
  • Configure the CapWap source to your public IP address of the AC 6005.
  • Configure a tagged VLAN. (Service for the STAs - Vlan200)


In Telnet session, we start to configure the VLAN interface GigabitEthernet 0/0/1 as following:


Enter system view, return user view with Ctrl+Z.

# Change the system name to the public IP address of the AC 6005. This is a mandatory step and the name of the controller needs to be its public IP address. If AC controller uses private IP address, then you need to provide public IP address after NATting.


# VLAN / Capwap source (public IP address of the AC 6005)

[]interface vlanif 150
[]description public-ip-AC
[]ip address 29

# Service VLAN with the address pool of the STAs (Client devices will connect to AP)

[]interface vlanif 200
[]description service-VLAN
[]ip address 24

# Management VLAN (IP pool for APs)

[]interface vlanif 30
[]description Management-VLAN
[]ip address 24

# Associate the VLAN created to interface GigabitEthernet 0/0/1

[]interface GigabitEthernet0/0/1
[]port hybrid pvid vlan 150
[]port hybrid tagged vlan 200
[]port hybrid untagged vlan 30 150
[]vlan batch 30, 150, 200

# Capwap source is the public IP address of the AC

[]capwap source ip-address

# Add the default gateway of the AC. In this case

[]ip route-static

# Verify the portal version of the AC

[]undo web-auth-server version

The Portal version on the AC should be set to Ver 1. If the AC is running on different version then you can execute the following command.

Configuring ACL and free-rules (Walled garden)

Security consideration. To permit the connections between the Portal Server and the Access Controller, it's necessary the AC is reachable from the Internet and have open the UDP port 2000 (check your firewall configuration guide).

# Free domains

[]passthrough-domain name * id 1


# Example to configure free domains for facebook login

[]passthrough-domain name * id 2
[]passthrough-domain name * id 3
[]passthrough-domain name * id 4
[]passthrough-domain name * id 5



[]acl number 6000
[]rule 4 permit ip destination 0
[]rule 5 permit udp source 0 destination-port eq dns


# RADIUS server

[]rule 6 permit ip destination 0
[]rule 39 permit tcp destination passthrough-domain *
[]rule 40 permit tcp destination passthrough-domain *
[]rule 41 permit tcp destination passthrough-domain *
[]rule 42 permit tcp destination passthrough-domain *


# Create a free rule template

[]free-rule-template name free1
[]free-rule acl 6000


To configure the walled garden, please check the following articles:


Configuring RADIUS server template

[]radius-server template radius

# Cloud4Wi RADIUS server IP: authentication port: 1812, accounting port:1813

[]radius-server shared-key cipher secret provided by cloud4wi
[]radius-server authentication 1812
[]radius-server accounting 1813
[]radius-server user-name domain-included
[]authentication-scheme radius
[]authentication-mode radius
[]authorization-scheme radius
[]authorization-mode if-authenticated
[]accounting-scheme radius
[]accounting-mode radius
[]accounting realtime 900
[]domain d1
[]authentication-scheme radius
[]authorization-scheme radius
[]accounting-scheme radius
[]radius-server radius


Configuring URL template and authentication profile

[]url-template name u1

# Uam parameters

[]url-parameter user-ipaddress wlanuserip ac-ip wlanacip ac-mac wlanacmac ap-ip wlanapip ap-mac wlanapmac redirect-url wlanuserfirsturl ssid ssid sysname wlanacname user-mac wlanusermac
[]web-auth-server web
[]server-ip (Cloud4wi splash portal ip)
[]port 50100 (default port communication between AC-Portal)
[]url-template u1
[]portal-access-profile name portal
[]web-auth-server web direct
[]authentication-profile name portal
[]portal-access-profile portal
[]free-rule-template free1
[]access-domain d1


Configuring WLAN, SSID profile, and VAP profile

# Create SSID Profile

[]ssid-profile name C4W-huawei
[]ssid name_of_ssid


# Create VAP Profile and associate it with authentication profile

[]vap-profile name C4W-huawei
[]service-vlan vlan-id 200
[]ssid-profile C4W-huawei
[]security-profile C4W-huawei
[]authentication-profile portal


Configuring AP group and setting the radio profile to vap-profile

The following schema defines the functional priorities of the operations necessary to configure AP groups, radio profile, and vap-profile.


# Create a new ap-group

[]ap-group name default
[]vap-profile C4W-huawei wlan id_wlan radio all

# Change the AP update mode to ac-mode

[]ap update mode ac-mode
[]ap auth-mode no-auth


Creating a QoS profile and associate it to a user-group

For example, we'll configure a QoS profile to limit the bandwidth in Uplink and Downlink to 1Mb/s for a specific user group (group-1M).

The User-group name will represent the Filter-Id (In this case group-1M) to configure on Volare platform. For further details, check the link:

# Create a new QoS profile (example to limit a bandwidth in Uplink and downlink to 1 Mb/s)

[]qos-profile name limit-1M
[]car inbound cir 1024
[]car outbound cir 1024

# Create a new User-Group and associate it with qos-profile

[]user-group group-1M
[]qos-profile limit-1M


Entering the device details into the Admin Panel

For Huawei devices, the Volare platform requires only the MAC address. The Identifier field is not required.

Network 2 (APs and STAs)

It’s mandatory to configure the following VLAN on a local switch:

  1. The service VLAN with the same ID as the previously configured on the AC (Vlan200) with a DHCP server for the STAs (customer devices) will connect through the SSID. In this case, the address pool will be
  2. The Management VLAN for the APs with the same ID and pool as the previously configured on the AC (Vlan30) with a DHCP server for the APs. In this case, the pool will be
  3. We have 2 possibilities to configure the CapWap source IP address on APs.
    1. Recommended for a small number of APs
      Enter for each AP via telnet or ssh with the default credentials admin/
      In this example AC_ip_address = (Capwap source IP address)
      [fce3-3ca3-c820]ap-address static ac-list ‘AC_ip_address’
      Info: The configuration takes effect after the AP is restarted.
    2. Recommended for a large number of APs
      In the DHCP server for management APs configure an option-43 with sub-option 2 ip-address ‘AC_ip_address’. In this specific example, we have option 43 sub-option 2 ip-address


Parameters for the Solution

Network 1 (Access Controller)

  • The system name of the AC has to set to a public IP address.
  • Configure a service VLAN in tagged mode (Vlan200).
  • Configure a management VLAN (to manage the APs) (Vlan30).
  • Capwap source IP address has to be set to AC IP address.
  • Configure ACL to permit navigation to * domain and Cloud4Wi RADIUS IP address.
    • RADIUS server primary(Authentication) → on port 1812 secret provided by Cloud4Wi.
    • RADIUS server primary(Accounting) → on port 1813 secret provided by Cloud4Wi.
    • RADIUS server secondary(Authentication) → on port 1812 secret provided by Cloud4Wi.
    • RADIUS server primary(Accounting) → on port 1813 secret provided by Cloud4Wi.
  • Configure the RADIUS server template:
    radius-server shared-key cipher secret provided by cloud4wi
    radius-server authentication 1812
    radius-server accounting 1813
  • Set URL to Cloud4Wi Splash portal
    url-parameter user-ipaddress wlanuserip user-mac wlanusermac ac-ip wlanapip sysname wlanacname ap-mac wlanapmac ssid redirect-url wlanuserfirsturl
  • Set web auth-server to IP address of Splash Portal IP address:
    server-ip (Cloud4wi splash portal ip)
    port 50100 (default port communication between AC and Portal)
    url-template u1
    source-ip (ip address of the AC)
  • Configure an authentication profile
    authentication-profile name portal
  • Configure a VAP profile and associate it with WLAN and SSID profile.
    vap-profile name C4W-huawei
    service-vlan vlan-id 200
    ssid-profile C4W-huawei
    security-profile C4W-huawei
    authentication-profile portal
  • Create an AP group and associate it with the VAP profile previously created.en

Network 2 (Switch, APs, and STAs)

  • On the switch, create one service VLAN with the same ID configured on AC in tagged mode(Vlan200) and one for the AP management with the same ID and pool configured on the AC (Vlan30)
  • Create one DHCP server for the STAs and one for the APs (eventually with the option 43 sub option 2) recommended for large networks.
Have more questions? Submit a request