How do I view STA Internet access behavior on a WLAN device

7

APs serve as Layer 2 access nodes and cannot record information about STA Internet access.

Other related questions:
How do WLAN devices restrict access from weak-signal STAs
For details about how to configure an AC to restrict access from weak-signal STAs, see: V200R005: Restricting Access from Weak-Signal or Low-Rate STAs V200R006: Configuring Smart Roaming

How do WLAN devices restrict access from low-rate STAs
For details about how to configure an AC to restrict access from low-rate STAs, see: V200R005: Restricting Access from Weak-Signal or Low-Rate STAs V200R006: Configuring Smart Roaming

How to configure the STA blacklist on WLAN devices
A STA blacklist contains MAC addresses of STAs that are not allowed to connect to the WLAN. To forbid some STAs from connecting to the WLAN, you can configure a STA blacklist. You can configure a global STA blacklist for APs, and the blacklist takes effect on all VAPs. You can also configure a STA blacklist for specified VAPs. If an AP and a VAP are configured with the blacklist or whitelist function, a STA can connect to the WLAN only when it is permitted by both the configuration on the AP and VAP. - For V200R003 and V200R005, you can perform the following steps to configure a STA blacklist for specified APs on an AC or a Fat AP: 1. Run the sta-blacklist mac-address command in the WLAN view to add specified MAC addresses to the STA blacklist. The variable mac-address specifies the MAC addresses in the STA blacklist. 2. For ACs: run the sta-access-mode ap { { start-id [ to end-id ] } &<1-10> | all } blacklist command in the WLAN view to set the access control mode to the STA blacklist for a specified AP. The variable start-id and end-id specify the AP ID range. For Fat APs: Run the sta-access-mode blacklist command in the WLAN view to set the access control mode to the STA blacklist. 3. Run the commit { all | ap ap-id } command in the WLAN view to deliver configurations to the APs (applicable only to the AC). The variable ap-id specifies the AP ID. - For V200R003 and V200R005, you can perform the following steps to configure a STA blacklist for specified VAPs on an AC or a Fat AP: 1. Run the sta-blacklist-profile { name list-name | id list-id } command in the WLAN view to create a STA blacklist profile and display the STA blacklist profile view. The variable list-name specifies the STA blacklist profile name, and list-id specifies the STA blacklist profile ID. 2. Run the sta-mac mac-address command in the STA blacklist profile view to add the MAC address of a STA to the STA blacklist profile. The variable mac-address specifies the MAC addresses in the STA blacklist. 3. Run the service-set { id profile-id | name profile-name } * command in the WLAN view to display the service set view. The variable profile-id specifies the service set ID, and profile-name specifies the service set name. 4. Run the sta-access-mode blacklist command in the service set view to set the access control mode for VAPs to the STA blacklist. 5. Run the set view sta-blacklist-profile { name list-name | id list-id } command in the service set view to bind a STA blacklist profile for the service set. The variable list-name specifies the STA blacklist profile name, and list-id specifies the STA blacklist profile ID. 6. Run the commit { all | ap ap-id } command in the WLAN view to deliver configurations to the APs (applicable only to the AC). The variable ap-id specifies the AP ID.

How can I view logs on a WLAN device
Logs generated on a WLAN device are saved in the log buffer. After the number of logs reaches the specified threshold, the logs are saved to the syslogfile or logfile folder in the device's flash memory. A device records user operations in logs, so you can also view the log file to check operations. To view the log buffer and log files on a WLAN device, perform the following operations: - To view the file logs in the logfile folder, run the following commands in the user view: cd logfile //Enter the root directory of the logfile folder. dir //Display all files in the root directory. Directory of flash:/logfile/ Idx Attr Size(Byte) Date Time(LMT) FileName 0 -ro- 861,301 Apr 15 2015 07:36:41 2015-04-15.07-36-36.dblg.zip 1 -ro- 883,298 Apr 27 2015 21:41:43 2015-04-27.21-41-38.dblg.zip 2 -ro- 1,071,688 Jun 11 2015 20:04:00 2015-06-11.20-03-54.dblg.zip 3 -ro- 826,422 Jun 24 2015 11:57:54 2015-06-24.11-57-49.log.zip 4 -ro- 630,868 Sep 12 2015 04:34:49 2015-09-12.04-34-45.log.zip 5 -rw- 1,392,179 Sep 14 2015 15:41:30 log.dblg 6 -rw- 5,108,562 Sep 14 2015 20:21:54 log.log The xx.dblg.zip file contains all archived logs, and you can open it after decompressing it. The log.dblg file can be displayed in the diagnostic view using the display diag-logfile command, and the log.log file can be displayed using the display logfile command. - To view detailed log information in a log file, run the display logfile logfile/xxxx command. xxxx specifies the log file name. - To view logs in the log buffer, run the display logbuffer command. - To view logs in the trap buffer, run the display trapbuffer command. For more information about logs, visit Huawei Enterprise Product & Service Support to download and view the Log Reference and Alarm Reference of the appropriate product.

What STA information can be displayed on a WLAN device
1. Number of STAs associated with an AP For V200R005, run the display station assoc-num command. For V200R006, run the display station ap-id xx command. 2. STA information For V200R005, run the display station assoc-info sta sta-mac command. For V200R006, run the display station sta-mac sta-mac command. The display contents vary depending on versions. The following uses V200R005C10 as an example: display station assoc-info sta d420-6df4-f37e Station mac-address : d420-6df4-f37e //STA mac Station ip-address : 0.0.0.0 //STA IP Station gateway : 0.0.0.0 Associated SSID : jsldoc //SSID Station online time(ddd:hh:mm:ss) : 000:00:04:20 //Online time The upstream SNR(dB) : 30.0 The upstream aggregate receive power(dBm) : -79.0 Station connect rate(Mbps) : 23 //Rate Station connect channel : 1 //Channel Station inactivity time(ddd:hh:mm:ss) : 000:00:00:00 ...... Station's RSSI(dBm) : -66 //Single strength Station's Noise(dBm) : -109 Station's radio mode : 11b //Network type Station's AP ID : 6 //AP ID (supported only by V200R005C00) Station's Radio ID : 0 //0 indicates 2.4G, and 1 indicates 5G (supported only by V200R005C00). Station's Authentication Method : OPEN Station's Cipher Type : NO CIPHER Station's User Name : d4206df4f37e Station's Vlan ID : 28 Station's Channel Band-width : 20MHz Station's asso BSSID : dcd2-fc9a-2110 Station's state : Asso with auth Station's Qos Mode : NULL Station's HT Mode : - Station's MCS value : 0 Station's NSS value : 0 Station's Short GI : support Station's roam state : No

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top