10.1 AC Management
10.1.1 AC Configuration
Context
An AC manages APs, controls WLAN user access, and guarantees security. APs can communicate with the AC only after the basic AC attributes are configured.
Procedure
- Choose .
- On the AC Configuration tab page, set parameters described in Table 10-1.

- Click Apply.
NOTICE:When the country code is changed on an AC, information about APs connected to the AC is deleted and the APs are reset.Table 10-1 AC configuration parameterParameter
Description
ID
AC ID.
Country code
AC country code.
AP authentication mode
Authentication mode used to authenticate APs. By default, the AC authenticates APs using MAC address authentication.
NOTE:- MAC: The AP authentication mode can be set to MAC address authentication.
- SN: The AP authentication mode can be set to SN authentication.
- No authentication: The AP authentication mode can be set to non-authentication.
AC source interface
Source interface of the AC.- VLANIF: A VLANIF interface is used as the source interface.
- LoopBack: A loopback interface is used as the source interface.
- Virtual IP address: The virtual IP address of the VRRP group is used as the source interface.
NOTE:The selected source interface must have an IP address.To delete the AC's source interface, click
.AP data buffer
Whether to enable the AC to buffer AP data.
Buffer duration (min)
Period during which the AC buffers AP data.
Forwarding mode
Forwarding mode of the AC.
10.2 AP Management
10.2.1 AP Information
Context
NOTICE:- If the status of an AP is fault, the AP cannot be restarted.
- During the restart, you are disconnected from the AP.
Procedure
- Available APs
- Adding an AP
- Modifying an AP
- Replacing an AP
- Deleting an AP
- Choose .
- In the Available APs area, select an AP and click Delete. In the Information dialog box that is displayed, click OK.
- Restarting an AP
- Choose .
- In the Available APs area, select an AP to be restarted and click Restart. In the Information dialog box that is displayed, click OK.
- Restarting all APs
- Choose .
- In the Available APs area, click Restart All APs. In the Information dialog box that is displayed, click OK.
- Adding an AP to a specified AP region
- Choose .
- In the Available APs area, select an AP and click Add to Region. In the AP Region listdialog box that is displayed, select a region and click OK.
- Delivering configurations to an AP
- Choose .
- In the Available APs area, select an AP and click Commit Configuration. In the Information dialog box that is displayed, click OK.
- Searching for an AP
- Choose .
- Set Search and the query criteria, and click Go. You can view, modify, delete, restart, and deliver configurations to an AP, and add an AP to a region.
- Unauthorized APs
- Allowing an unauthorized AP to go online on an AC
- Choose .
- In the Unauthorized APs area, select an AP and click Confirm. In the Information dialog box that is displayed, click OK.
- Allowing all unauthorized APs to go online on an AC
- Choose .
- In the Unauthorized APs area, click Confirm All. In the Information dialog box that is displayed, click OK.
- Adding unauthorized APs to the MAC address whitelist and SN whitelist.
10.2.2 AP Region
Context
Adjusting the radio channel and power of an AP may lead to adjustment of another AP. To quicken adjustment, minimize the impact, and reduce the workload, all the APs accessing the same AC can be divided into several regions. The impact of adjustment on an AP is limited within the local region. An AP region can also be used for batch AP upgrade. You can upgrade APs of the same type in the same region in batches.
Procedure
- Creating an AP region
- Modifying an AP region
- Deleting an AP region
- Configuring the default AP region
- Choose .
- In AP Region, click
corresponding to an AP region to configure the region as the default region.
- Configuring a calibration channel set in the AP region
- Searching for an AP region
- Choose .
- Set Search and the query criteria, and click Go. AP regions matching the query criteria are displayed. You can view, modify, and delete the AP regions.
10.2.3 AP Profile
Procedure
- Creating an AP profile
- Modifying an AP profile
- Deleting an AP profile
- Configuring the default AP profile
- Choose .
- In AP Profile List area, click
corresponding to an AP profile to configure the profile as the default profile.
- Searching for an AP profile
- Choose .
- Set Profile name, and click Search. AP profiles matching the query criteria are displayed. You can view, modify, and delete the AP profiles.
10.2.4 AP Whitelist
Procedure
- Adding an AP MAC address to the AP whitelist
- Adding AP MAC addresses to the AP whitelist in batches
- Deleting an AP MAC address from the AP whitelist
- Choose .
- In the MAC Whitelist area, select an AP MAC address and click Delete. In the Information dialog box that is displayed, click OK.
- Deleting AP MAC addresses from the AP whitelist in batches
- Choose .
- In the MAC Whitelist area, click Batch Delete. In the Batch Delete MAC Whitelist dialog box that is displayed, set parameters described in Table 10-8.
- Click OK. The AP MAC addresses are deleted from the AP whitelist.
- Searching for an AP MAC address in the AP whitelist
- Choose .
- Set MAC address and click Search. You can delete the found AP MAC address from the AP whitelist.
- Operations on the SN whitelist are similar to those on the AP whitelist.
NOTE:- When adding SNs to the whitelist in batches, ensure that the end SN is larger than or equal to the start SN and the two SNs are of the same length.
- AC6605: A maximum of 512 SNs can be deleted in batches.
- AC6005: A maximum of 256 SNs can be deleted in batches.
10.2.5 AP Blacklist
Procedure
- Adding an AP MAC address to the AP blacklist
- Adding AP MAC addresses to the AP blacklist in batches
- Deleting an AP MAC address from the AP blacklist
- Choose .
- In the MAC Blacklist area, select an AP MAC address and click Delete. In the Information dialog box that is displayed, click OK.
- Deleting AP MAC addresses from the AP blacklist in batches
- Choose .
- In the MAC Blacklist area, click Batch Delete. In the Batch Delete MAC Blacklist dialog box that is displayed, set parameters described in Table 10-10.
- Click OK. The AP MAC addresses are deleted from the AP blacklist.
- Searching for an AP MAC address in the AP blacklist
- Choose .
- Set MAC address and click Search. You can delete the found AP MAC address from the AP blacklist.
10.4 Backup Configuration
10.4.1 Backup Configuration
Context
Dual-Link Cold Backup
As shown in Figure 10-7, an active AC and a standby AC are deployed on the WLAN. The AP establishes CAPWAP tunnels with the two ACs, and periodically exchanges CAPWAP packets with the ACs to monitor link status. The active AC controls access of STAs. If the AP detects a fault on the link between the AP and active AC, the AP requests the standby AC to trigger an active/standby switchover, that is, the standby AC becomes the active AC to control access of STAs. This mechanism improves WLAN reliability. After the original active AC is restored, the AP requests the active and standby ACs to perform revertive switchover. The restored AC becomes the active AC again.
Dual-Link Hot Backup
An AP establishes CAPWAP tunnels with the active AC and standby AC. The two ACs synchronize control information and implement the heartbeat mechanism through the hot standby (HSB) function. When a fault occurs on the active AC, the standby AC can immediately detect it and fast switch the standby CAPWAP tunnel as the new active CAPWAP tunnel to prevent user services from being interrupted.
VRRP Hot Backup
An AP can only obtain the IP address of one AC, which is the virtual IP address of the active and standby ACs in the VRRP group. The active and standby ACs are elected among the ACs in the VRRP group based on their priorities. The active AC manages and controls all APs and users, and periodically sends the standby AC the status information and information that needs to be backed up, including AP entries, CAPWAP link information, and user information. When a fault occurs on the active AC, the standby AC can immediately detect it using VRRP and fast switch the standby AC as the new active AC to prevent user services from being interrupted.
10.4.2 VRRP
Context
The Virtual Router Redundancy Protocol (VRRP) integrates multiple routing devices to a virtual router and uses a certain mechanism to switch traffic to a standby router when the next hop router of the host fails, ensuring continuous and reliable communication.
Procedure
- Creating a VRRP
- Modifying the VRRP group
- Deleting the VRRP group
- Log in to the web platform and choose . The VRRP configuration page is displayed, as shown in Figure 10-14.
- On the VRRP page, select the check box next to the VRRP to be deleted and click Delete.
- In the dialog box that is displayed, click OK. The VRRP is deleted.
- Searching for VRRP groups
- Log in to the web platform and choose . The VRRP configuration page is displayed, as shown in Figure 10-14.
- In the VRRP area, set the search criteria and click Search. All VRRP groups matching the set conditions are displayed.
10.4.3 HSB
Context
In hot-standby backup mode, there are two devices, one acting as a master device and the other a backup one. The master device forwards services and the backup device monitors the forwarding. The master device periodically sends the backup device the status information and information that needs to be backed up.
To reduce impact of single-point failures on a wireless access network, a traditional backup solution deploys two devices on an access node for backup. Access devices on a wireless network usually run Dynamic Host Configuration Protocol (DHCP), network admission control (NAC), and wireless local area network (WLAN) services, which require real-time information backup from the master device to the backup device. For example, the master DHCP device must synchronize user status information to the backup DHCP device in real time. Otherwise, services will be interrupted after link switching.
Hot Standby (HSB) can implement redundancy between access devices while ensuring uninterrupted service transmission. The HSB service supports batch backup and real-time backup between the two access devices. Before link switching, the backup device synchronizes information from the master device. When the master device fails, service traffic is immediately switched to the backup device without interrupting services. This improves connection availability.
Procedure
- HSB Channel List
Creating an HSB channel
Modifying an HSB channel
Deleting an HSB channel
- Log in to the web platform and choose . The HSB configuration page is displayed, as shown in Figure 10-15.
- On the Channel List page, select the check box next to the HSB channel to be deleted and click Delete.
- In the dialog box that is displayed, click OK. The HSB channel is deleted.
Searching for HSB channels
- Log in to the web platform and choose . The HSB configuration page is displayed, as shown in Figure 10-15.
- In the Channel List area, set the search criteria and click Search. All HSB channels matching the set conditions are displayed.
- HSB Group
Creating an HSB group
Modifying an HSB group
Deleting an HSB group
- Log in to the web platform and choose . The HSB configuration page is displayed, as shown in Figure 10-15.
- On the Group List page, select the check box next to the HSB channel to be deleted and click Delete.
- In the dialog box that is displayed, click OK. The HSB group is deleted.
Searching for HSB groups
- Log in to the web platform and choose . The HSB configuration page is displayed, as shown in Figure 10-15.
- In the Group List area, set the search criteria and click Search. All HSB groups matching the set conditions are displayed.












































