<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NX5500 VLAN's DHCP Configuration in ExtremeWireless (WiNG)</title>
    <link>https://community.extremenetworks.com/t5/extremewireless-wing/nx5500-vlan-s-dhcp-configuration/m-p/84834#M7923</link>
    <description>&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;Hello good morning, I hope you are well, I have a series of doubts regarding the following case:&lt;BR /&gt;&lt;BR /&gt;* I have an NX5500 with several AP7532 adopted.&lt;BR /&gt;&lt;BR /&gt;* I have 3 SSIDs each with a different VLAN 116,117 and 118, to which I want to assign a DHCP server with another range of IP's to each one from the NX5500.&lt;BR /&gt;&lt;BR /&gt;* Each of these SSIDs should be associated with the internal VLANs of the company (16,17 and 18), that is, 116 exit through the gateway of VLAN 16, 117 through the gateway of VLAN 17 and so on .&lt;BR /&gt;&lt;BR /&gt;* I have 4 VLANs created in the NX5500 Profile, VLAN1 (Native), 116, 117, 118.&lt;BR /&gt;&lt;BR /&gt;* The GE1 port is configured as Trunk and allows the passage of all those VLANs&lt;BR /&gt;&lt;BR /&gt;* The ports on the Switch are configured to pass VLANs 1,16,17,18&lt;BR /&gt;&lt;BR /&gt;What I want is for each SSID to go online and then apply the respective ACLs.&lt;BR /&gt;&lt;BR /&gt;If you can help me with this I would really appreciate it ..&lt;BR /&gt;&lt;BR /&gt;Regards...&lt;BR /&gt;&lt;BR /&gt;Then the current running-config show:&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;! Configuration of NX5500 version 5.9.4.0-020R&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;version 2.6&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;client-identity-group default&lt;BR /&gt; load default-fingerprints&lt;BR /&gt;!&lt;BR /&gt;ip access-list BROADCAST-MULTICAST-CONTROL&lt;BR /&gt; permit tcp any any rule-precedence 10 rule-description "permit all TCP traffic"&lt;BR /&gt; permit udp any eq 67 any eq dhcpc rule-precedence 11 rule-description "permit DHCP replies"&lt;BR /&gt; deny udp any range 137 138 any range 137 138 rule-precedence 20 rule-description "deny windows netbios"&lt;BR /&gt; deny ip any 224.0.0.0/4 rule-precedence 21 rule-description "deny IP multicast"&lt;BR /&gt; deny ip any host 255.255.255.255 rule-precedence 22 rule-description "deny IP local broadcast"&lt;BR /&gt; permit ip any any rule-precedence 100 rule-description "permit all IP traffic"&lt;BR /&gt;!&lt;BR /&gt;mac access-list PERMIT-ARP-AND-IPv4&lt;BR /&gt; permit any any type ip rule-precedence 10 rule-description "permit all IPv4 traffic"&lt;BR /&gt; permit any any type arp rule-precedence 20 rule-description "permit all ARP traffic"&lt;BR /&gt;!&lt;BR /&gt;ip snmp-access-list default&lt;BR /&gt; permit any&lt;BR /&gt;!&lt;BR /&gt;firewall-policy default&lt;BR /&gt; no ip dos tcp-sequence-past-window&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;mint-policy global-default&lt;BR /&gt;!&lt;BR /&gt;meshpoint-qos-policy default&lt;BR /&gt;!&lt;BR /&gt;wlan-qos-policy default&lt;BR /&gt; qos trust dscp&lt;BR /&gt; qos trust wmm&lt;BR /&gt;!&lt;BR /&gt;radio-qos-policy default&lt;BR /&gt;!&lt;BR /&gt;wlan RH-CAP-RF-CD&lt;BR /&gt; ssid RH-CAP-RF-CD&lt;BR /&gt; vlan 116&lt;BR /&gt; bridging-mode local&lt;BR /&gt; encryption-type ccmp&lt;BR /&gt; authentication-type none&lt;BR /&gt; wpa-wpa2 psk 0 Al3rc3-4nd1n0&lt;BR /&gt;!&lt;BR /&gt;wlan RH-USERS-CD&lt;BR /&gt; ssid RH-USERS-CD&lt;BR /&gt; vlan 117&lt;BR /&gt; bridging-mode local&lt;BR /&gt; encryption-type ccmp&lt;BR /&gt; authentication-type none&lt;BR /&gt; wpa-wpa2 psk 0 P4lm4-Ch1l3n4&lt;BR /&gt;!&lt;BR /&gt;wlan RH-VISITAS-CD&lt;BR /&gt; ssid RH-VISITAS-CD&lt;BR /&gt; vlan 118&lt;BR /&gt; bridging-mode local&lt;BR /&gt; encryption-type ccmp&lt;BR /&gt; authentication-type none&lt;BR /&gt; wpa-wpa2 psk 0 Rio-Aconcagua-5295&lt;BR /&gt;!&lt;BR /&gt;wlan prueba&lt;BR /&gt; ssid pruebas&lt;BR /&gt; vlan 1&lt;BR /&gt; bridging-mode local&lt;BR /&gt; encryption-type ccmp&lt;BR /&gt; authentication-type none&lt;BR /&gt; wpa-wpa2 psk 0 pruebatds&lt;BR /&gt;!&lt;BR /&gt;dhcp-server-policy DHCP-VLAN16&lt;BR /&gt; option IPVLAN16 16 ascii&lt;BR /&gt; dhcp-pool VLAN16&lt;BR /&gt;  network 10.45.90.0/24&lt;BR /&gt;  address range 10.45.90.2 10.45.90.254&lt;BR /&gt;  default-router 10.45.90.1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;management-policy default&lt;BR /&gt; no telnet&lt;BR /&gt; no http server&lt;BR /&gt; https server&lt;BR /&gt; rest-server&lt;BR /&gt; ssh&lt;BR /&gt; user admin password 1 82d01196dd1106ce85399528e108e727af41390478b86320fc4dd62f7df28306 role superuser access all&lt;BR /&gt; snmp-server community 0 private rw&lt;BR /&gt; snmp-server community 0 public ro&lt;BR /&gt; snmp-server user snmptrap v3 encrypted des auth md5 0 admin123&lt;BR /&gt; snmp-server user snmpmanager v3 encrypted des auth md5 0 admin123&lt;BR /&gt;!&lt;BR /&gt;ex3500-management-policy default&lt;BR /&gt; snmp-server community public ro&lt;BR /&gt; snmp-server community private rw&lt;BR /&gt; snmp-server notify-filter 1 remote 127.0.0.1&lt;BR /&gt; snmp-server view defaultview 1 included&lt;BR /&gt;!&lt;BR /&gt;ex3500-qos-class-map-policy default&lt;BR /&gt;!&lt;BR /&gt;ex3500-qos-policy-map default&lt;BR /&gt;!&lt;BR /&gt;profile nx5500 default-nx5500&lt;BR /&gt; no autoinstall configuration&lt;BR /&gt; no autoinstall firmware&lt;BR /&gt; no device-upgrade auto&lt;BR /&gt; crypto ikev1 policy ikev1-default&lt;BR /&gt;  isakmp-proposal default encryption aes-256 group 2 hash sha&lt;BR /&gt; crypto ikev2 policy ikev2-default&lt;BR /&gt;  isakmp-proposal default encryption aes-256 group 2 hash sha&lt;BR /&gt; crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt; crypto ikev1 remote-vpn&lt;BR /&gt; crypto ikev2 remote-vpn&lt;BR /&gt; crypto auto-ipsec-secure&lt;BR /&gt; crypto load-management&lt;BR /&gt; crypto remote-vpn-client&lt;BR /&gt; interface ge1&lt;BR /&gt; interface ge2&lt;BR /&gt; interface ge3&lt;BR /&gt; interface ge4&lt;BR /&gt; interface ge5&lt;BR /&gt; interface ge6&lt;BR /&gt; interface vlan1&lt;BR /&gt;  ip address 10.21.1.90/24&lt;BR /&gt;  ip address zeroconf secondary&lt;BR /&gt; interface vlan116&lt;BR /&gt;  ip address 10.45.90.1/24&lt;BR /&gt; interface vlan117&lt;BR /&gt;  ip address 10.45.91.1/24&lt;BR /&gt; interface vlan118&lt;BR /&gt;  ip address 10.45.92.1/24&lt;BR /&gt; interface pppoe1&lt;BR /&gt; use dhcp-server-policy DHCP-VLAN16&lt;BR /&gt; use firewall-policy default&lt;BR /&gt; service pm sys-restart&lt;BR /&gt; router ospf&lt;BR /&gt; router bgp&lt;BR /&gt; adoption-mode controller&lt;BR /&gt;&lt;BR /&gt;.....&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;profile ap7532 default-ap7532&lt;BR /&gt; autoinstall configuration&lt;BR /&gt; autoinstall firmware&lt;BR /&gt; no device-upgrade auto&lt;BR /&gt; crypto ikev1 policy ikev1-default&lt;BR /&gt;  isakmp-proposal default encryption aes-256 group 2 hash sha&lt;BR /&gt; crypto ikev2 policy ikev2-default&lt;BR /&gt;  isakmp-proposal default encryption aes-256 group 2 hash sha&lt;BR /&gt; crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt; crypto ikev1 remote-vpn&lt;BR /&gt; crypto ikev2 remote-vpn&lt;BR /&gt; crypto auto-ipsec-secure&lt;BR /&gt; crypto load-management&lt;BR /&gt; crypto remote-vpn-client&lt;BR /&gt; interface radio1&lt;BR /&gt;  wlan RH-CAP-RF-CD bss 1 primary&lt;BR /&gt;  wlan RH-USERS-CD bss 2 primary&lt;BR /&gt;  wlan RH-VISITAS-CD bss 3 primary&lt;BR /&gt;  wlan prueba bss 4 primary&lt;BR /&gt; interface radio2&lt;BR /&gt; interface ge1&lt;BR /&gt;  switchport mode trunk&lt;BR /&gt;  switchport trunk allowed vlan 1,16-18&lt;BR /&gt; interface vlan1&lt;BR /&gt;  ip address zeroconf secondary&lt;BR /&gt;  ip dhcp client request options all&lt;BR /&gt; interface pppoe1&lt;BR /&gt; use firewall-policy default&lt;BR /&gt; use client-identity-group default&lt;BR /&gt; service pm sys-restart&lt;BR /&gt; router ospf&lt;BR /&gt; adoption-mode controller&lt;BR /&gt;!&lt;BR /&gt;rf-domain default&lt;BR /&gt; country-code cl&lt;BR /&gt;!&lt;BR /&gt;nx5500 40-83-DE-86-63-08&lt;BR /&gt; use profile default-nx5500&lt;BR /&gt; use rf-domain default&lt;BR /&gt; hostname nx5500-866308&lt;BR /&gt; license AAP 6e8043c0fdffcc38f75bb6272286f139292caac02c5641f70ed992a2258fc17e12360918255142fd&lt;BR /&gt; license ADSEC DEFAULT-ADV-SEC-LICENSE&lt;BR /&gt; no device-upgrade auto&lt;BR /&gt; interface vlan1&lt;BR /&gt;  ip address 10.21.1.90/24&lt;BR /&gt;  ip address zeroconf secondary&lt;BR /&gt; use dhcp-server-policy DHCP-VLAN16&lt;BR /&gt; logging on&lt;BR /&gt; logging console warnings&lt;BR /&gt; logging buffered warnings&lt;BR /&gt; controller adopted-devices aps&lt;BR /&gt;!&lt;BR /&gt;ap7532 94-9B-2C-28-FA-60&lt;BR /&gt; use profile default-ap7532&lt;BR /&gt; use rf-domain default&lt;BR /&gt; hostname RP-01-07&lt;BR /&gt; area "Rack Picking"&lt;BR /&gt; floor "Piso 1"&lt;BR /&gt;!&lt;BR /&gt;ap7532 94-9B-2C-28-FB-90&lt;BR /&gt; use profile default-ap7532&lt;BR /&gt; use rf-domain default&lt;BR /&gt; hostname RP-01-06&lt;BR /&gt; area "Rack Picking"&lt;BR /&gt; floor "Piso 1"&lt;BR /&gt;!&lt;BR /&gt;ap7532 94-9B-2C-28-FF-44&lt;BR /&gt; use profile default-ap7532&lt;BR /&gt; use rf-domain default&lt;BR /&gt; hostname EX-03&lt;BR /&gt;!&lt;BR /&gt;ap7532 94-9B-2C-28-FF-48&lt;BR /&gt; use profile default-ap7532&lt;BR /&gt; use rf-domain default&lt;BR /&gt; hostname ap7532-28FF48&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;end&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
.</description>
    <pubDate>Wed, 25 Sep 2019 23:10:47 GMT</pubDate>
    <dc:creator>Wualter</dc:creator>
    <dc:date>2019-09-25T23:10:47Z</dc:date>
    <item>
      <title>NX5500 VLAN's DHCP Configuration</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/nx5500-vlan-s-dhcp-configuration/m-p/84834#M7923</link>
      <description>&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;Hello good morning, I hope you are well, I have a series of doubts regarding the following case:&lt;BR /&gt;&lt;BR /&gt;* I have an NX5500 with several AP7532 adopted.&lt;BR /&gt;&lt;BR /&gt;* I have 3 SSIDs each with a different VLAN 116,117 and 118, to which I want to assign a DHCP server with another range of IP's to each one from the NX5500.&lt;BR /&gt;&lt;BR /&gt;* Each of these SSIDs should be associated with the internal VLANs of the company (16,17 and 18), that is, 116 exit through the gateway of VLAN 16, 117 through the gateway of VLAN 17 and so on .&lt;BR /&gt;&lt;BR /&gt;* I have 4 VLANs created in the NX5500 Profile, VLAN1 (Native), 116, 117, 118.&lt;BR /&gt;&lt;BR /&gt;* The GE1 port is configured as Trunk and allows the passage of all those VLANs&lt;BR /&gt;&lt;BR /&gt;* The ports on the Switch are configured to pass VLANs 1,16,17,18&lt;BR /&gt;&lt;BR /&gt;What I want is for each SSID to go online and then apply the respective ACLs.&lt;BR /&gt;&lt;BR /&gt;If you can help me with this I would really appreciate it ..&lt;BR /&gt;&lt;BR /&gt;Regards...&lt;BR /&gt;&lt;BR /&gt;Then the current running-config show:&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;! Configuration of NX5500 version 5.9.4.0-020R&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;version 2.6&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;client-identity-group default&lt;BR /&gt; load default-fingerprints&lt;BR /&gt;!&lt;BR /&gt;ip access-list BROADCAST-MULTICAST-CONTROL&lt;BR /&gt; permit tcp any any rule-precedence 10 rule-description "permit all TCP traffic"&lt;BR /&gt; permit udp any eq 67 any eq dhcpc rule-precedence 11 rule-description "permit DHCP replies"&lt;BR /&gt; deny udp any range 137 138 any range 137 138 rule-precedence 20 rule-description "deny windows netbios"&lt;BR /&gt; deny ip any 224.0.0.0/4 rule-precedence 21 rule-description "deny IP multicast"&lt;BR /&gt; deny ip any host 255.255.255.255 rule-precedence 22 rule-description "deny IP local broadcast"&lt;BR /&gt; permit ip any any rule-precedence 100 rule-description "permit all IP traffic"&lt;BR /&gt;!&lt;BR /&gt;mac access-list PERMIT-ARP-AND-IPv4&lt;BR /&gt; permit any any type ip rule-precedence 10 rule-description "permit all IPv4 traffic"&lt;BR /&gt; permit any any type arp rule-precedence 20 rule-description "permit all ARP traffic"&lt;BR /&gt;!&lt;BR /&gt;ip snmp-access-list default&lt;BR /&gt; permit any&lt;BR /&gt;!&lt;BR /&gt;firewall-policy default&lt;BR /&gt; no ip dos tcp-sequence-past-window&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;mint-policy global-default&lt;BR /&gt;!&lt;BR /&gt;meshpoint-qos-policy default&lt;BR /&gt;!&lt;BR /&gt;wlan-qos-policy default&lt;BR /&gt; qos trust dscp&lt;BR /&gt; qos trust wmm&lt;BR /&gt;!&lt;BR /&gt;radio-qos-policy default&lt;BR /&gt;!&lt;BR /&gt;wlan RH-CAP-RF-CD&lt;BR /&gt; ssid RH-CAP-RF-CD&lt;BR /&gt; vlan 116&lt;BR /&gt; bridging-mode local&lt;BR /&gt; encryption-type ccmp&lt;BR /&gt; authentication-type none&lt;BR /&gt; wpa-wpa2 psk 0 Al3rc3-4nd1n0&lt;BR /&gt;!&lt;BR /&gt;wlan RH-USERS-CD&lt;BR /&gt; ssid RH-USERS-CD&lt;BR /&gt; vlan 117&lt;BR /&gt; bridging-mode local&lt;BR /&gt; encryption-type ccmp&lt;BR /&gt; authentication-type none&lt;BR /&gt; wpa-wpa2 psk 0 P4lm4-Ch1l3n4&lt;BR /&gt;!&lt;BR /&gt;wlan RH-VISITAS-CD&lt;BR /&gt; ssid RH-VISITAS-CD&lt;BR /&gt; vlan 118&lt;BR /&gt; bridging-mode local&lt;BR /&gt; encryption-type ccmp&lt;BR /&gt; authentication-type none&lt;BR /&gt; wpa-wpa2 psk 0 Rio-Aconcagua-5295&lt;BR /&gt;!&lt;BR /&gt;wlan prueba&lt;BR /&gt; ssid pruebas&lt;BR /&gt; vlan 1&lt;BR /&gt; bridging-mode local&lt;BR /&gt; encryption-type ccmp&lt;BR /&gt; authentication-type none&lt;BR /&gt; wpa-wpa2 psk 0 pruebatds&lt;BR /&gt;!&lt;BR /&gt;dhcp-server-policy DHCP-VLAN16&lt;BR /&gt; option IPVLAN16 16 ascii&lt;BR /&gt; dhcp-pool VLAN16&lt;BR /&gt;  network 10.45.90.0/24&lt;BR /&gt;  address range 10.45.90.2 10.45.90.254&lt;BR /&gt;  default-router 10.45.90.1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;management-policy default&lt;BR /&gt; no telnet&lt;BR /&gt; no http server&lt;BR /&gt; https server&lt;BR /&gt; rest-server&lt;BR /&gt; ssh&lt;BR /&gt; user admin password 1 82d01196dd1106ce85399528e108e727af41390478b86320fc4dd62f7df28306 role superuser access all&lt;BR /&gt; snmp-server community 0 private rw&lt;BR /&gt; snmp-server community 0 public ro&lt;BR /&gt; snmp-server user snmptrap v3 encrypted des auth md5 0 admin123&lt;BR /&gt; snmp-server user snmpmanager v3 encrypted des auth md5 0 admin123&lt;BR /&gt;!&lt;BR /&gt;ex3500-management-policy default&lt;BR /&gt; snmp-server community public ro&lt;BR /&gt; snmp-server community private rw&lt;BR /&gt; snmp-server notify-filter 1 remote 127.0.0.1&lt;BR /&gt; snmp-server view defaultview 1 included&lt;BR /&gt;!&lt;BR /&gt;ex3500-qos-class-map-policy default&lt;BR /&gt;!&lt;BR /&gt;ex3500-qos-policy-map default&lt;BR /&gt;!&lt;BR /&gt;profile nx5500 default-nx5500&lt;BR /&gt; no autoinstall configuration&lt;BR /&gt; no autoinstall firmware&lt;BR /&gt; no device-upgrade auto&lt;BR /&gt; crypto ikev1 policy ikev1-default&lt;BR /&gt;  isakmp-proposal default encryption aes-256 group 2 hash sha&lt;BR /&gt; crypto ikev2 policy ikev2-default&lt;BR /&gt;  isakmp-proposal default encryption aes-256 group 2 hash sha&lt;BR /&gt; crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt; crypto ikev1 remote-vpn&lt;BR /&gt; crypto ikev2 remote-vpn&lt;BR /&gt; crypto auto-ipsec-secure&lt;BR /&gt; crypto load-management&lt;BR /&gt; crypto remote-vpn-client&lt;BR /&gt; interface ge1&lt;BR /&gt; interface ge2&lt;BR /&gt; interface ge3&lt;BR /&gt; interface ge4&lt;BR /&gt; interface ge5&lt;BR /&gt; interface ge6&lt;BR /&gt; interface vlan1&lt;BR /&gt;  ip address 10.21.1.90/24&lt;BR /&gt;  ip address zeroconf secondary&lt;BR /&gt; interface vlan116&lt;BR /&gt;  ip address 10.45.90.1/24&lt;BR /&gt; interface vlan117&lt;BR /&gt;  ip address 10.45.91.1/24&lt;BR /&gt; interface vlan118&lt;BR /&gt;  ip address 10.45.92.1/24&lt;BR /&gt; interface pppoe1&lt;BR /&gt; use dhcp-server-policy DHCP-VLAN16&lt;BR /&gt; use firewall-policy default&lt;BR /&gt; service pm sys-restart&lt;BR /&gt; router ospf&lt;BR /&gt; router bgp&lt;BR /&gt; adoption-mode controller&lt;BR /&gt;&lt;BR /&gt;.....&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;profile ap7532 default-ap7532&lt;BR /&gt; autoinstall configuration&lt;BR /&gt; autoinstall firmware&lt;BR /&gt; no device-upgrade auto&lt;BR /&gt; crypto ikev1 policy ikev1-default&lt;BR /&gt;  isakmp-proposal default encryption aes-256 group 2 hash sha&lt;BR /&gt; crypto ikev2 policy ikev2-default&lt;BR /&gt;  isakmp-proposal default encryption aes-256 group 2 hash sha&lt;BR /&gt; crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt; crypto ikev1 remote-vpn&lt;BR /&gt; crypto ikev2 remote-vpn&lt;BR /&gt; crypto auto-ipsec-secure&lt;BR /&gt; crypto load-management&lt;BR /&gt; crypto remote-vpn-client&lt;BR /&gt; interface radio1&lt;BR /&gt;  wlan RH-CAP-RF-CD bss 1 primary&lt;BR /&gt;  wlan RH-USERS-CD bss 2 primary&lt;BR /&gt;  wlan RH-VISITAS-CD bss 3 primary&lt;BR /&gt;  wlan prueba bss 4 primary&lt;BR /&gt; interface radio2&lt;BR /&gt; interface ge1&lt;BR /&gt;  switchport mode trunk&lt;BR /&gt;  switchport trunk allowed vlan 1,16-18&lt;BR /&gt; interface vlan1&lt;BR /&gt;  ip address zeroconf secondary&lt;BR /&gt;  ip dhcp client request options all&lt;BR /&gt; interface pppoe1&lt;BR /&gt; use firewall-policy default&lt;BR /&gt; use client-identity-group default&lt;BR /&gt; service pm sys-restart&lt;BR /&gt; router ospf&lt;BR /&gt; adoption-mode controller&lt;BR /&gt;!&lt;BR /&gt;rf-domain default&lt;BR /&gt; country-code cl&lt;BR /&gt;!&lt;BR /&gt;nx5500 40-83-DE-86-63-08&lt;BR /&gt; use profile default-nx5500&lt;BR /&gt; use rf-domain default&lt;BR /&gt; hostname nx5500-866308&lt;BR /&gt; license AAP 6e8043c0fdffcc38f75bb6272286f139292caac02c5641f70ed992a2258fc17e12360918255142fd&lt;BR /&gt; license ADSEC DEFAULT-ADV-SEC-LICENSE&lt;BR /&gt; no device-upgrade auto&lt;BR /&gt; interface vlan1&lt;BR /&gt;  ip address 10.21.1.90/24&lt;BR /&gt;  ip address zeroconf secondary&lt;BR /&gt; use dhcp-server-policy DHCP-VLAN16&lt;BR /&gt; logging on&lt;BR /&gt; logging console warnings&lt;BR /&gt; logging buffered warnings&lt;BR /&gt; controller adopted-devices aps&lt;BR /&gt;!&lt;BR /&gt;ap7532 94-9B-2C-28-FA-60&lt;BR /&gt; use profile default-ap7532&lt;BR /&gt; use rf-domain default&lt;BR /&gt; hostname RP-01-07&lt;BR /&gt; area "Rack Picking"&lt;BR /&gt; floor "Piso 1"&lt;BR /&gt;!&lt;BR /&gt;ap7532 94-9B-2C-28-FB-90&lt;BR /&gt; use profile default-ap7532&lt;BR /&gt; use rf-domain default&lt;BR /&gt; hostname RP-01-06&lt;BR /&gt; area "Rack Picking"&lt;BR /&gt; floor "Piso 1"&lt;BR /&gt;!&lt;BR /&gt;ap7532 94-9B-2C-28-FF-44&lt;BR /&gt; use profile default-ap7532&lt;BR /&gt; use rf-domain default&lt;BR /&gt; hostname EX-03&lt;BR /&gt;!&lt;BR /&gt;ap7532 94-9B-2C-28-FF-48&lt;BR /&gt; use profile default-ap7532&lt;BR /&gt; use rf-domain default&lt;BR /&gt; hostname ap7532-28FF48&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;end&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
.</description>
      <pubDate>Wed, 25 Sep 2019 23:10:47 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/nx5500-vlan-s-dhcp-configuration/m-p/84834#M7923</guid>
      <dc:creator>Wualter</dc:creator>
      <dc:date>2019-09-25T23:10:47Z</dc:date>
    </item>
  </channel>
</rss>

