11.1 WLAN Configuration
11.1.1 WLAN Configuration
Procedure
- Creating a common WLAN service
- Creating a WDS
- Creating a wireless mesh network
- Modifying a wireless network configuration
- Choose .
- In the WLAN List area, click
corresponding to a record. - In the Modify WLAN Configuration dialog box that is displayed, set parameters described in Table 11-1, Table 11-2, or Table 11-3.
- Click OK.
- Deleting a wireless network configuration
- Choose .
- In the WLAN List area, select a configuration record and click Delete. In the Informationdialog box that is displayed, click OK.
- Delivering a wireless network configuration.
- Choose .
- In the WLAN List area, select the configuration to be delivered and click Commit Configuration. In the dialog box that is displayed, click OK.
- Searching for a wireless network configuration.
- Choose .
- Set Search and the query criteria, and click Go. wireless network configurations matching the query criteria are displayed. You can view, modify, and delete the wireless network configurations.
11.2 Radio Profile
11.2.1 Radio Profile
Context
A radio profile is a set of commonly-used basic radio parameters, including radio type, rate, channel mode, power mode, calibration switch, and calibration interval. If a radio is bound to a radio profile, the radio has all parameters configured on the radio profile. Since one radio profile can be bound with multiple radios, the radio profile can simplify radio configuration.
Procedure
- Creating a radio profile
- Viewing radio profile details
- Choose to display the Radio Profile List page.
- On the Radio Profile List page, click details at the last column to view the radio profile details. For description of the parameters, see Table 11-4.
- Deleting a radio profile
- Choose to display the Radio Profile List page.
- On the Radio Profile List page, select the radio profile to be deleted and click Delete to delete the selected profile.
- Refreshing the radio profile list
- Choose to display the Radio Profile List page.
- On the Radio Profile List page, click Refresh to update the radio profiles to the latest information.
- Searching a radio profile
11.2.2 WMM Profile
Context
802.11 provides services of the same quality for all applications. Different applications, however, have different requirements for wireless networks. 802.11 cannot provide services of different qualities for different applications.
To provide services of different qualities for different applications, the Wi-Fi Alliance defines the Wi-Fi Multimedia (WMM) standard, which classifies data packets into four access categories (ACs) in descending order of priorities, that is, AC-voice (AC-VO), AC-video (AC-VI), AC-best effort (AC-BE), and AC-background (AC-BK). This standard ensures that high-priority packets preempt channels.
A WMM profile is created to implement the WMM protocol. After a WMM profile is created, packets with higher AP or STA priority preempt a wireless channel first, ensuring better quality for voice and video services on WLANs.
You can configure WMM profiles to provide different services on STAs or APs with different channel preemption capabilities and implement different QoS.
Procedure
- Creating a WMM profile
- Viewing WMM profile details
- Choose to display the WMM Profile List page.
- On the WMM Profile List page, click details at the last column to view the WMM profile details. For description of the parameters, see Table 11-5.
- Deleting a WMM profile
- Choose to display the WMM Profile List page.
- On the WMM Profile List page, select the WMM profile to be deleted and click Deleteto delete the selected profile.
- Refreshing the WMM profile list
- Choose to display the WMM Profile List page.
- On the WMM Profile List page, click Refresh to update the WMM profiles to the latest information.
- Searching a WMM profile
11.3 Service Set
11.3.1 Service Set
Context
You must deliver service parameters to APs so that STAs can associate with APs to access the network. A service set is a collection of service parameters. You can set the SSID, service VLAN, maximum number of access STAs, and association aging time of STAs, and determine whether to hide the SSID in a service set. Manually configure a service set and bind it to AP radios. All service parameters in the service set then apply to the VAPs, and the APs can provide differentiated WLAN services using these service parameters.
Procedure
- Creating a service set
- Modifying a service set
- Deleting a service set
- Choose . The Service Set tab page is displayed.
- In the Service Set List area, select a service set and click Delete. In the Informationdialog box that is displayed, click OK.
- Searching for service sets
- Choose . The Service Set tab page is displayed.
- In the Service Set List area, set Search and click Go. Service sets matching the search criteria are displayed. You can view, modify, and delete the service sets.
11.3.2 Traffic Profile
Context
- Priority mapping: If Wi-Fi Multimedia (WMM) is enabled on both a STA and an AP, the STA sends packets carrying a priority field. After receiving an 802.11 packet, the AP converts it to an 802.3 packet. If the packet needs to be sent to the AC, the AP encapsulates the 802.3 packet with a CAPWAP header. Priority mapping must be configured to retain priorities of packets during the entire transmission process, ensuring end-to-end QoS.
- After receiving an 802.11 packet from the STA, the AP maps the user priority to the 802.1p field.
- In tunnel forwarding mode, the 802.1p or Precedence field must be mapped to a tunnel priority.
- The AC forwards the 802.3 packets received from the Internet to the AP directly or through a tunnel. After receiving the 802.3 packets, the AP maps the 802.1p or Precedence field to the user priority.
- Traffic policing: To protect network resources, the AC needs to limit the rate of packets sent from STAs to a WLAN network.
Procedure
- Creating a traffic profile
- Modifying a traffic profile
- Deleting a traffic profile
- Choose . The Traffic Profile tab page is displayed.
- In the Traffic Profile List area, select a traffic profile and click Delete.
- In the Information dialog box that is displayed, click OK.
- Searching for traffic profiles
- Choose . The Traffic Profile tab page is displayed.
- In the Traffic Profile List area, set Search and click Go. Traffic profiles matching the search criteria are displayed. You can view, modify, and delete the traffic profiles.
11.3.3 Security Profile
Context
When configuring WLAN services, the administrator needs to bind the security profile to the service set. This ensures secure access of STAs. You can query, create, modify, and delete a security profile.
NOTE:If Authentication policy, Authentication mode, and Encryption mode are set to WEP, OPEN-SYSTEM, and NONE respectively, users can access the WLAN without authentication. The settings bring security risks, and therefore are not recommended. If the settings are required, configure the Portal security policy to enhance security.
Procedure
- Querying a security profile
- Creating a security profile
- Modifying a security profile
- Choose .
- In the Security Profile List area, click
corresponding to a security profile to be modified. - In the Modify Security Profile dialog box that is displayed, set parameters described in Table 11-8.
- Click OK.
- Deleting a security profile
11.3.4 ESS Interface
Context
A VAP is a functional entity on an AP. Multiple VAPs can be created on an AP to provide access services for different STAs. To differentiate VAPs that different STAs associate with, you must create a dynamic interface for each VAP. Additionally, to speed up the configuration, you need to use a profile to create multiple dynamic interfaces simultaneously. WLAN-DBSS interfaces and WLAN-ESS interfaces are developed to solve the preceding problems.
Each VAP maps a WLAN-DBSS interface on an AC. A WLAN-DBSS interface is a virtual Layer 2 interface and similar to a hybrid Layer 2 Ethernet interface. It has Layer 2 attributes and supports network access control (NAC). A WLAN-DBSS interface inherits the attributes of its WLAN-ESS interface. An AC dynamically creates a WLAN-DBSS interface on a WLAN-ESS interface for each VAP and deletes the WLAN-DBSS interface when the VAP becomes invalid.
- When a service set bound to a WLAN-ESS interface is bound to a radio, a WLAN-DBSS interface is automatically created and inherits the configuration of the WLAN-ESS interface.
- When the service set bound to a radio is deleted, the created WLAN-DBSS interface is also deleted.
You can create, modify, delete, and query extended service set (ESS) interfaces using the web platform.
NOTE:You are not advised to add a WLAN-ESS interface to the VLAN of the management VRRP; otherwise, information backup during the VRRP HSB revertive switchover fails, causing service interruption. The reason is as follows: After a WLAN-ESS interface is applied to a radio, the WLAN-ESS interface remains in Up state. If this WLAN-ESS interface is added to the VLAN of the management VRRP, the corresponding VLANIF interface will be always in Up state. As a result, in VRRP HSB scenarios where an active/standby switchover is triggered by link disconnection between the active AC and AP, the active AC will remain in Master state but not change to Initialize state. When the revertive switchover occurs, information on the original backup AP cannot be backed up to the original active AC, causing information loss and service interruption.
Procedure
- Creating an ESS interface
- Modifying an ESS interface
- Deleting an ESS interface
- Choose . The ESS Interface tab page is displayed.
- In the ESS Interface List area, select an ESS interface and click Delete. In the Information dialog box that is displayed, click OK.
- Searching for ESS interfaces
- Choose . The ESS Interface tab page is displayed.
- In the ESS Interface List area, set Search and click Go. ESS interfaces matching the search criteria are displayed. You can view, modify, and delete the ESS interfaces.
11.3.5 User Profile
Context
You can bind a CAR profile to a user profile, configure the user priority policy, and bind a service set to the user profile so that the transmission rate for each user in the VAP bound to the service set is limited and the user priority is specified.
Procedure
- Creating a user profile
- Modifying a user profile
- Deleting a user profile
- Choose to display the User Profile page.
- On the User Profile List page, select the user profile to be deleted and click Delete.
- Click OK in the displayed dialog box. The user profile is deleted.
- Searching a user profile
- Choose to display the User Profile page.
- Enter the name of a user profile in the User Profile Name text box and click Search. After the user profile is found, you can view, modify, or delete it.
11.3.6 STA Blacklist/Whitelist Profile
Context
- A whitelist contains MAC addresses of STAs that are allowed to connect to a WLAN. After the whitelist function is enabled, only the STAs in the whitelist can connect to the WLAN, and access from other STAs is rejected.
- A blacklist contains MAC addresses of STAs that are not allowed to connect to a WLAN. After the blacklist function is enabled, STAs in the blacklist cannot connect to the WLAN, and other STAs can connect to the WLAN.
If the whitelist or blacklist is empty, all STAs can connect to the WLAN.
The configurations of STA blacklist and whitelist profiles are the same. The following describes the configuration of STA whitelist profile as an example.
Procedure
- Querying a STA whitelist profile
- Creating a STA whitelist profile
- Modifying a STA whitelist profile
- Choose .
- In the STA Whitelist Profile List area, click
corresponding to a STA whitelist profile to be modified. - In the Modify STA Whitelist Profile dialog box that is displayed, set parameters described in Table 11-11.
- Click OK.
- Deleting a STA whitelist profile
11.4 WDS Profile
WDS Introduction
A WDS connects two or more wired or wireless LANs wirelessly to establish a large network.
On a traditional WLAN, APs exchange data with STAs using wireless channels and connect to a wired network through uplinks. To expand the coverage area of a wireless network, APs need to be connected by switches. This deployment requires high costs and takes a long time. In some places, such as subways, tunnels, and docks, it is difficult to connect APs to the Internet through wired links. WDS technology can connect APs wirelessly in these places, which reduces network deployment costs, makes the network easy to expand, and allows flexible networking.
WDS Concepts
- Service VAP: On a traditional WLAN, an AP is a physical entity that provides WLAN services to STAs. A service virtual access point (VAP) is a logical entity that provides access service for users. Multiple VAPs can be created on an AP to provide access service for multiple user groups. As shown in Figure 11-8, VAP0 created on AP3 is a service VAP.
- Bridge VAP: On a WDS network, an AP is a physical entity that provides WDS service for neighboring devices. The bridge VAP is a logical entity that provides WDS service. Bridge VAPs include AP VAPs and STA VAPs. The ID of STA VAPs is fixed as 13, and that of AP VAPs is fixed at 12. AP VAPs provide connections for STA VAPs. As shown in Figure 11-8, VAP13 created on AP3 is a STA VAP, and VAP12 created on AP2 is an AP VAP.
- Wireless virtual link: a connection set up between a STA VAP and an AP VAP on neighboring APs. As shown in Figure 11-8, connections set up between AP1, AP2, and AP3 are wireless virtual links. Wireless virtual links include service wireless virtual links and management wireless virtual links.
- Service wireless virtual link: a wireless virtual link that forwards user data on a WDS network.
- Management wireless virtual link: a wireless virtual link that forwards management and control packets on a WDS network. A management wireless virtual link is used to control link setup and deliver configuration parameters.
AP working mode: Depending on its location on a WDS network, an AP can work in root, middle, or leaf mode, as shown in Figure 11-8.
- Root: The AP directly connects to an AC through a wired link and uses an AP VAP to set up wireless virtual links with a STA VAP.
- Middle: The AP uses a STA VAP to connect to an AP VAP on an upstream AP and uses an AP VAP to connect to a STA VAP on a downstream AP.
- Leaf: The AP uses a STA VAP to connect to an AP VAP on an upstream AP.
- Working mode of an AP's wired interface: On a WDS network, an AP's wired interface can connect to either an upstream wired network or a downstream user host or LAN. Depending on an AP's location, a wired interface works in root or endpoint mode.
- Root: The wired interface connects to an upstream wired network.
- endpoint: The wired interface connects to a downstream user host or LAN.
NOTE:On a WDS network, one wired interface must work in root mode to connect to the wired network.
WDS Network Architecture
Point-to-point deployment
As shown in Figure 11-9, AP1 sets up wireless virtual links with AP2 to provide wireless access service for users.
Point-to-multipoint deployment
As shown in Figure 11-10, AP1, AP2, and AP3 set up wireless virtual links with AP4. Data from all STAs associating with AP1, AP2, and AP3 is forwarded by AP4.
WDS Configuration Process
Figure 11-11 shows the WDS configuration process.
11.4.1 Bridge Profile
Context
A bridge profile contains parameters of wireless virtual links (WVLs) between APs and their neighbors. After a bridge profile is bound to a radio, the radio has all attributes of the bridge profile and a bridge VAP is automatically created. The radio uses different VAP parameters to set up and maintain WVLs between APs.
A bridge profile in the WDS has the same function as a service set in traditional WLAN services. A bridge profile is bound to a specified AP radio to create a bridge VAP. Bridge VAPs include AP VAPs and STA VAPs.
- Root APs: When a bridge VAP is created, AP VAPs 12 and 14 are generated.
- Middle APs: When a bridge VAP is created, AP VAPs 12 and 14 and STA VAPs 13 and 15 are generated.
- Leaf APs: When a bridge VAP is created, STA VAPs 13 and 15 are generated.
11.4.2 Bridge Whitelist
Context
A bridge whitelist contains MAC addresses of neighboring APs that can connect to a bridge. If the whitelist is used, only neighboring APs with MAC addresses in the whitelist can connect to the bridge. On WDS networks, the whitelist can be configured only on root APs or middle APs.
NOTE:- WVLs can be established only when neighboring APs with MAC addresses in the whitelist succeed in authentication.
- If the bridge uses no whitelist, all the neighboring APs can connect to the bridge.
11.5 Mesh Profile
11.5.1 Mesh Profile
Context
On a traditional WLAN, APs exchange data with STAs using wireless channels and connect to a wired network through uplinks. If no wired network is available for WLAN construction, a wired network must be constructed first, which is both time- and money- consuming. If the positions of some APs on a WLAN need to be adjusted, the wired network must be adjusted accordingly, increasing the difficulty in network adjustment. With Mesh technology, APs can connect each other wirelessly, which allows flexible networking and quick network deployment and facilitates dynamic expansion of network coverage.
As shown in Figure 11-16, APs on a Mesh network can be sorted into the following types based on functions:
- Mesh Point (MP): It is a mesh-capable node that uses IEEE 802.11 MAC and physical layer protocols for wireless communication. This node supports automatic topology discovery, automatic route discovery, and data packet forwarding. MPs can provide both mesh service and user access service.
- Mesh Portal Point (MPP): It is an MP that connects the Mesh network to networks of other types. This node has the portal function and can help mesh nodes communicate with external networks.
A Mesh profile contains the attributes of Mesh links set up between MPs. After a Mesh profile is bound to a radio, the radio has all attributes of the Mesh profile and automatically creates a Mesh VAP. The radio uses different VAP parameters to set up and maintain the Mesh links between MPs.
A Mesh profile has the similar function with the service set in the traditional WLAN service. It can be bound to the specified AP radio to create a Mesh VAP.
Procedure
- Creating a Mesh profile
- Modifying a Mesh profile
- Deleting a Mesh profile
- Choose to display the Mesh Profile page.
- On the Mesh Profile List page, select the Mesh profile and click Delete.
- Click OK in the displayed dialog box to delete the selected Mesh profile.
- Searching a Mesh profile
- Choose to display the Mesh Profile page.
- Select Profile name, Mesh ID, or Security profile in Search, enter the corresponding keywords, and click Go to search for the Mesh profile. After the Mesh profile is found, you can view, modify, or delete it.
11.5.2 Mesh WhiteList
Context
NOTE:If the Mesh whitelist contains no entry, no neighboring MPs can connect to the MP.
Procedure
- Creating a Mesh whitelist
- Modifying a Mesh whitelist
- Deleting a Mesh whitelist
- Choose to display the Mesh WhiteListpage.
- On the Mesh WhiteList List page, select the Mesh whitelist to be deleted and click Delete.
- Click OK in the displayed dialog box to delete the selected Mesh whitelist.
- Searching a Mesh whitelist
- Choose to display the Mesh WhiteListpage.
- Enter the name of the Mesh whitelist to be searched in WhiteList name and click Searchto search for the Mesh whitelist. After the Mesh whitelist is found, you can view, modify, or delete it.
11.6 Load Balancing Group
11.6.1 Static Load Balancing Group
Context
- A radio can join only one load balancing group.
- AP radios in a load balancing group work in different channels.
- Member radios in a load balancing group must be of the same type.
- Each load balancing group supports a maximum of three APs.
Procedure
- Creating a static load balancing group
- Modifying a static load balancing group
- Log in to the web platform, and choose .
- In the Load Balancing Group area, select a static load balancing group and click
. - In the Modify Load Balancing Group dialog box that is displayed, set parameters described in Table 11-18.
- Click OK.
- Deleting a static load balancing group
- Log in to the web platform, and choose .
- In the Load Balancing Group area, select a static load balancing group and click Delete.
- In the dialog box that is displayed, click OK.
- Updating static load balancing groups
- Log in to the web platform, and choose .
- In Load Balancing Group, click Refresh. Information about static load balancing groups is updated.
- Searching for static load balancing groups
- Log in to the web platform, and choose .
- In the Load Balancing Group area, set Search and click Go. Static load balancing groups matching the search criteria are displayed. You can view, modify, and delete the static load balancing groups.
11.6.2 Dynamic Load Balancing Group
Context
Static load balancing limits the maximum number of AP radios to 3 and allows only radios in the same frequency band to join a load balancing group. Additionally, a load balancing group needs to be manually specified. Dynamic load balancing is used to overcome the limitations of static load balancing.
In dynamic load balancing mode, the AP determines whether a STA can be associated based on the load of the dynamic load balancing group. Dynamic load balancing: A STA sends a broadcast Probe Request frame to scan available APs. The APs that receive the Probe Request frame report STA information to the AC. The AC adds these APs to a load balancing group, and then uses a load balancing algorithm to determine whether to allow access from the STA.



























.






. If the VLAN ID is removed from the text box below the

















