Got it

Huawei Wireless Access Controllers V200R003C00 Web Platform Configuration Guide-WLAN Service

Latest reply: Mar 26, 2022 11:14:12 2154 3 0 0 0

11  WLAN Service

11.1  WLAN Configuration

11.1.1  WLAN Configuration

Context

On the web platform, you can create, modify, and query a WLAN.

Procedure

  • Creating a common WLAN service
    1. Choose WLAN Service > WLAN Configuration > WLAN Configuration.

      Figure 11-1  WLAN Configuration 
      cd55dfb8e5704ff1a56496c6ec1e9502

    2. In the WLAN List area, click Create, click Common WLAN Service.

      3e6e759df4604219949060deb8f34b95

    3. In the Selected AP List area, click Add. In the AP List dialog box, select an AP, and click OK.

      ed2b862c168941a39e710a7aeb454520

    4. Set parameters described in Table 11-1.

      Table 11-1  Parameters for creating a common WLAN service

      Parameter

      Description

      AP profile

      AP profile.

      Radio

      Radio specified for a WLAN.

      Radio profile

      Radio profile. The radio profile type depends on the radio type:
      • 2.4 GHz: 802.11b, 802.11b/g, 802.11b/g/n, 802.11g, 802.11n, and 802.11g/n radio profiles
      • 5 GHz: 802.11a, 802.11n, and 802.11a/n radio profiles
      Channel bandwidth

      Channel bandwidth of the specified radio on the AP. When multiple APs are selected, this parameter is configurable only when the APs are in the same AP region.

      Channel
      Channel of the specified radio on the AP.
      NOTE:

      After an AP region is configured, this parameter can be set to a channel supported by the AP region.

      To avoid signal interference, ensure that neighboring APs work on different channels.

      Power level

      Power level of a specified radio on the AP.

      By default, the power level of a radio is 0, indicating full power. The power level depends on the AP type. The power decreases 1 dBm each time when the power level value increases one.

      MCS value
      MCS value of a specified radio on the AP.
      NOTE:
      This parameter is available only when radio type is 802.11n, 802.11a/n, 802.11g/n, or 802.11b/g/n.
      Multicast MCS value
      Multicast MCS value of a specified radio on the AP.
      NOTE:
      This parameter is available only when radio type is 802.11n, 802.11a/n, 802.11g/n, or 802.11b/g/n.
      Multicast rate (Mbit/s)
      Multicast rate of a specified radio on the AP.
      NOTE:

      By default, the rate of wireless multicast packets is 11 Mbit/s for a 80211b, 80211bg, 80211bgn, or 80211n radio and 6 Mbit/s for radios of other types.

      If you configure the maximum rate for a radio but the radio does not support the configured maximum rate, the configuration fails.

      MCS value and rate of multicast packets cannot be configured simultaneously.

    5. In the Selected Service-Set List area, click Add. In the Service-Set List dialog box, select a service set, and click OK.

      ceaf0435700f4044afc1f13ad3784677

    6. Click OK. The common WLAN service is added to the WLAN list.
  • Creating a WDS
    1. Choose WLAN Service > WLAN Configuration > WLAN Configuration.
    2. In the WLAN List area, click Create, click Wireless Distribution System(WDS).

      cdfc5d1c2970469988908d1d78a43b52

      73cb06ad71a84dc0904076097f147c76 NOTE:

      The AP6310SN-GN does not support WDS.

    3. In the Selected AP List area, click Add. In the AP List dialog box, select an AP, and click OK.

      ed2b862c168941a39e710a7aeb454520

      73cb06ad71a84dc0904076097f147c76 NOTE:

      Middle and leaf APs must be added to the AC in offline mode. Otherwise, they cannot go online.

    4. Set parameters described in Table 11-2.

      Table 11-2  Parameters for creating a WDS

      Parameter

      Description

      AP profile

      For details, see Table 11-1.

      Radio

      For details, see Table 11-1.

      Radio profile

      For details, see Table 11-1.

      Bridge mode

      Working mode of the bridge.

      Bridge STP status

      Whether STP is enabled for the bridge.

      Bridge whitelist status

      Whether the bridge whitelist function is enabled for the bridge.
      NOTE:
      The bridge whitelist function can be configured only when the bridge works in root or middle mode.
      Channel bandwidth

      For details, see Table 11-1.

      Channel

      For details, see Table 11-1.

      Power level

      For details, see Table 11-1.

      MCS value

      For details, see Table 11-1.

      Multicast MCS value

      For details, see Table 11-1.

      Multicast rate (Mbit/s)

      For details, see Table 11-1.

      Bridge profile

      Bridge profile.

      Bridge whitelist

      Bridge whitelist.
      NOTE:
      A bridge whitelist can be configured only when the bridge whitelist function is enabled.

    5. Click OK. The WDS is added to the WLAN list.
  • Creating a wireless mesh network
    1. Choose WLAN Service > WLAN Configuration > WLAN Configuration.
    2. In the WLAN List area, click Create, click Wireless Mesh Network(Mesh).

      e89e2fae4cec4f03bd6fdd51eda9e8fc

    3. In the Selected AP List area, click Add. In the AP List dialog box, select an AP, and click OK.

      ed2b862c168941a39e710a7aeb454520

      73cb06ad71a84dc0904076097f147c76 NOTE:

      The AP6310SN-GN does not support mesh.

    4. Set parameters described in Table 11-3.

      Table 11-3  Parameters for creating a wireless mesh network

      Parameter

      Description

      AP profile

      For details, see Table 11-1.

      Radio

      For details, see Table 11-1.

      Radio profile

      For details, see Table 11-1.

      Mesh role

      Role of the AP radio on the mesh network.

      Mesh whitelist status

      Mesh whitelist function enabled or disabled.

      Channel bandwidth

      For details, see Table 11-1.

      Channel

      For details, see Table 11-1.

      Power level

      For details, see Table 11-1.

      MCS value

      For details, see Table 11-1.

      Multicast MCS value

      For details, see Table 11-1.

      Multicast rate (Mbit/s)

      For details, see Table 11-1.

      Mesh profile

      Name of a mesh profile.

      Mesh whitelist

      Name of a mesh whitelist.

      NOTE:
      A mesh whitelist can be configured only when the mesh whitelist function is enabled.

    5. Click OK. The wireless mesh network is added to the WLAN list.
  • Modifying a wireless network configuration
    1. Choose WLAN Service > WLAN Configuration > WLAN Configuration.
    2. In the WLAN List area, click 410fd34d23e84917841e98426251e540 corresponding to a record.
    3. In the Modify WLAN Configuration dialog box that is displayed, set parameters described in Table 11-1, Table 11-2, or Table 11-3.
    4. Click OK.
  • Deleting a wireless network configuration
    1. Choose WLAN Service > WLAN Configuration > WLAN Configuration.
    2. In the WLAN List area, select a configuration record and click Delete. In the Informationdialog box that is displayed, click OK.
  • Delivering a wireless network configuration.
    1. Choose WLAN Service > WLAN Configuration > WLAN Configuration.
    2. In the WLAN List area, select the configuration to be delivered and click Commit Configuration. In the dialog box that is displayed, click OK.
  • Searching for a wireless network configuration.
    1. Choose WLAN Service > WLAN Configuration > WLAN Configuration.
    2. Set Search and the query criteria, and click Go. wireless network configurations matching the query criteria are displayed. You can view, modify, and delete the wireless network configurations.

11.2  Radio Profile

11.2.1  Radio Profile

Context

A radio profile is a set of commonly-used basic radio parameters, including radio type, rate, channel mode, power mode, calibration switch, and calibration interval. If a radio is bound to a radio profile, the radio has all parameters configured on the radio profile. Since one radio profile can be bound with multiple radios, the radio profile can simplify radio configuration.

Procedure

  • Creating a radio profile
    1. Choose WLAN Service > Radio Profile to display the Radio Profile List page.

      cb4f0ddad6ca400a830163bc5110a632

    2. On the Radio Profile List page, click Create to display the Create Radio Profile page.

      f5cc565f78724dc099186fb240f1b8dc

    3. On the Create Radio Profile page, select or enter each parameter based on actual requirements. For description of the parameters, see Table 11-4.
    4. Click OK to save the parameter settings.

      Table 11-4  Description of radio profile configuration parameters

      Parameter

      Description

      Profile name

      Name of a radio profile.

      Radio type

      Type of a radio.

      Different radios have different radio types:
      • The radio type of a 2.4-GHz radio can be 802.11b, 802.11bg, 802.11bgn, 802.11g, 802.11n, or 802.11gn.
      • The radio type of a 5-GHz radio can be 802.11a, 802.11n or 802.11an.
      NOTE:

      When configuring a radio for a WDS bridge or mesh links, configure the radio type to 802.11an, 802.11gn, 802.11bgn, or 802.11n.

      Rate

      Maximum rate of a radio.

      NOTE:
      • When the STA access mode is 802.11a, 802.11b, or 802.11g, this parameter takes effect. The maximum rate is the rate configured using this parameter.
      • When the STA access mode is 802.11n, this parameter does not take effect. The maximum rate depends on the value of MCS value specified in the WLAN Configuration.

      Channel mode

      Channel mode of a radio.

      An AP supports the following channel modes:
      • Automatic mode: Allows an AP to select a channel for a radio based on the WLAN radio environment. In automatic mode, you do not need to specify channels for radios.
      • Fixed mode: Provides users with an alternative way when they want to specify channels by themselves or to avoid frequent channel adjustment (this may cause intermittent service interruption).

      Power mode

      Power mode of a radio.

      An AP supports the following power modes:
      • Automatic mode: The AP selects the transmit power for a radio based on the WLAN radio environment.
      • Fixed mode: The transmit power for a radio must be set by users.

      Calibration status

      Whether to enable radio calibration.

      A radio profile on which radio calibration is enabled can dynamically adjust the channels and power of an AP, enabling the AP radios bound to the radio profile to adjust automatically to ensure the AP works in its best state.

      Calibration interval

      Calibration interval of a radio.

      An AP checks the radio environment at the specified interval. If the radio environment deteriorates, the AP calibrates radio parameters.

      Probe interval

      Probe interval for radio calibration.

      WMM profile

      WMM profile to which the radio profile is bound.

      PER threshold

      Packet loss rate threshold for radio calibration.

      When the packet loss rate of a radio reaches the threshold, the AP considers that the radio environment deteriorates and it reports alarms to the AC. If radio calibration is enabled, the AP calibrates radio parameters.

      Conflict rate threshold

      Conflict rate threshold for radio calibration.

      When the conflict rate of a radio reaches the threshold, the AP considers that the radio environment deteriorates and it reports alarms to the AC. If radio calibration is enabled, the AP calibrates radio parameters.

      RTS/CTS mode

      Request To Send/Clear To Send (RTS/CTS) handshake protocol, that is, RTS/CTS mode.

      The RTS/CTS handshake protocol avoids data transmission failures caused by channel conflicts. However, if STAs perform RTS/CTS handshakes each time before sending data, there will be a large number of RTS frames that consume the channel bandwidth. Therefore, the cts-to-self mode is recommended.

      • cts-to-self: Sets the RTS-CTS operation mode to cts-to-self.
      • rts-cts: Sets the RTS-CTS operation mode to RTS-CTS.
      • disable: Disables RTS-CTS.

      RTS/CTS threshold

      RTS/CTS threshold.

      NOTE:
      If STAs perform RTS/CTS handshakes each time before sending data, there will be a large number of RTS frames that consume the channel bandwidth. To prevent this problem, set the RTS threshold and maximum number of retransmission attempts for frames. The RTS threshold specifies the length of data frames. When the length of data frames sent by a STA is smaller than the RTS threshold, no RST/CTS handshake is performed. The default RTS threshold is recommended.

      Fragmentation threshold

      Fragment threshold. If the length of a frame to be sent by the 802.11 MAC layer exceeds this threshold, the frame is fragmented before being sent.

      • When the packet fragmentation threshold is too small, packets are fragmented into smaller frames. These frames are transmitted at a high extra cost, resulting in low channel efficiency.
      • When the packet fragmentation threshold is too large, long packets are usually not fragmented, which increases the transmission time and error probability. If an error occurs, packets are retransmitted, resulting in a waste of channel bandwidth. A large threshold is recommended.

      Short frame retry count

      Maximum number of retransmission attempts for frames less than or equal to the RTS threshold.

      A short frame is a MAC-layer frame that is no longer than the RTS/CTS threshold. If no ACK message is received after the maximum number of retransmissions of a short frame exceeds the maximum value, the short frame is discarded.

      Long frame retry count

      Maximum number of retransmission attempts for frames exceeding the RTS threshold.

      A long frame is a MAC-layer frame that is longer than the RTS/CTS threshold. If no ACK message is received after the number of retransmissions of a long frame exceeds the maximum value, the long frame is discarded.

      Support short preamble

      Whether an AP supports short preamble.

      The preamble is a section of bits in the header of a data frame. It synchronizes signals transmitted between the sender and receiver and can be either a short preamble or a long one.

      • A short preamble ensures better synchronization performance and therefore is recommended.
      • A long preamble is usually used for compatibility with earlier network adapters of clients.

      DTIM interval

      Delivery traffic indication message (DTIM) interval in the radio profile.

      The DTIM interval specifies how many Beacon frames are sent by an AP before the Beacon frame that contains the DTIM. The Beacon frame carrying DTIM wakes an STA in power-saving mode, and transmits the broadcast and multicast frames saved on the AP to the STA.

      • A short DTIM interval helps transmit data in a timely manner, but the STA is waken frequently, causing high power consumption.
      • A long DTIM interval lengthens the dormancy time of an STA and saves power, but degrades the transmission capability of the STA.

      Beacon interval

      Interval at which an AP sends Beacon frames.

      A Beacon frame is a broadcast frame sent at intervals. An AP sends Beacon frames at intervals to notify STAs of an existing 802.11 network.

      Interference detect switch

      Whether to enable interference detection.

      WLAN wireless channels are often affected by the radio environment, and the service quality is therefore degraded. If interference detection is configured, an AP can know the radio environment in real time and report alarms to the AC.

      Threshold for co-channel interference

      Alarm threshold for co-channel interference.

      Two APs working in the same frequency band interfere with each other. For example, on a large-scale WLAN (for example, a university campus network), different APs often use the same channel. When there are overlapping areas among these APs, co-channel interference exists, degrading network performance. After interference detection is enabled, an AP can detect co-channel interference. When the co-channel interference detected exceeds the specified alarm threshold, the AP reports alarms to the AC.

      Threshold for adjacent-channel interference

      Alarm threshold for adjacent-channel interference.

      Adjacent-channel interference occurs when two APs with different center frequencies have overlapping areas. Therefore, if APs are placed too close to each other or they have strong signals, more noise will be produced, degrading network performance. After interference detection is enabled, an AP can detect adjacent-channel interference. When the adjacent-channel interference detected exceeds the specified alarm threshold, the AP reports alarms to the AC.

      Threshold for STA interference

      Alarm threshold for STAs not managed by the local AP.

      If there are too many STAs that are managed by other APs around the local AP, services of the STAs managed by the local AP may be affected. After interference detection is enabled, the AP can detect STAs managed by other APs. When the STAs detected exceeds the specified alarm threshold, the AP reports alarms to the AC.

      Radio device report duration

      Interval at which an AP reports information about radio devices to the AC.

      An AP keeps detecting information about radio devices. At the report interval, the AP reports the information detected to the AC, deletes the information that has been reported, and starts the next round of detection.

      Wifi-light mode

      Status of the Wireless LED on the AP.

      On a WDS network or a mesh network, you need to adjust AP locations and antenna directions to obtain optimal signal strength between WDS-capable or mesh-capable APs. The blinking frequency of the Wireless LED shows the signal strength, so that the installation personnel can know the current signal strength in real time.
      NOTE:

      This command takes effect only when the AP has the WDS or mesh function enabled. If the WDS and mesh functions are disabled on the AP, the Wireless LED always shows service traffic volume.

      Beamforming status

      Whether to enable the beamforming function.

      Beamforming can enhance signals at an angle (for target users), attenuate signals at another angle (for non-target users or obstacles), and extend the radio coverage area.
      NOTE:
      The AP6x10SN/DN series excluding the AP6310 support beamforming. AP5x10xN series and AP7x10xN series APs support beamforming. The AP3x10xN series APs do not support beamforming.

      802.11n guard interval mode

      Whether to enable the guard interval (GI) mode.

      There are two types of GI: short GI and normal GI. When configuring 802.11n, you can configure the normal GI in 802.11a/g or short GI in 802.11n. The short GI reduces the extra cost and improves the transmission rate.

      802.11n A-MPDU status

      Whether to enable the MAC Protocol Data Unit (MPDU) aggregation function.

      An 802.11 packet is sent as an MPDU, requiring channel competition and backoff and consuming channel resources. The 802.11n MPDU aggregation function aggregates multiple MPDUs into an aggregate MAC Protocol Data Unit (A-MPDU), so that N MPDUs can be transmitted through one channel competition and backoff. This function saves the channel resources to be consumed for sending N-1 MPDUs. The MPDU aggregation function improves channel efficiency and 802.11 network performance.

      802.11n A-MPDU length

      Maximum length of an A-MPDU.

      Channel switch announcement status

      Whether to enable channel switch announcement.

      When the AP works on a Depth First Select (DFS) channel, a radar detection is performed. The AP automatically switches to another channel because the DFS channel frequency may interfere with the radar frequency. After channel switch announcement is enabled, if an AP needs to switch the channel, the AP sends action frames to instruct the STA to switch its channel after several Beacon intervals, and the AP switches its channel after the same number of Beacon intervals. The AP and STAs switch channels at the same time to prevent STA reassociations and ensure rapid service recovery.

      Channel switch announcement mode

      Channel switch announcement mode.

      During channel switching, STA communication is interrupted. The administrator can stop an associated STA sending data on the current channel until channel switching is complete. Alternatively, data transmission from STAs can be continued on the current channel before channel switching is complete.

      • continue-transmitting: Continues data transmission on the current channel during channel switching.
      • stop-transmitting: Stops data transmission from STAs on the current channel during channel switching.

      Signal strength detection for incoming signals

      Whether to enable signal strength detection for incoming STA signals.

      On a WLAN, an AP may receive weak radio signals from some STAs. After associating with the AP, these STAs work at a low rate, affecting the network throughput. The function that restricts access of weak-signal STAs can prevent STAs, whose signal strength is lower than the specified value, from accessing the WLAN, reducing the impact of these STAs on others and improving WLAN performance.
      NOTE:
      In the case of good WLAN signal coverage, this function can be used to restrict WLAN access of weak-signal STAs at the edge of the coverage area.

      Signal strength threshold

      Signal strength threshold to restrict access of weak-signal STAs.

      In the case that signal strength detection for incoming STA signals is enabled, when an STA discovers an AP by scanning, the STA sends a Probe Request frame containing Received Signal Strength Indicator (RSSI) to an AP. After receiving the Probe Request frame, the AP obtains the RSSI value. If the RSSI value is less than the threshold, the AP does not respond to the request frame and the association attempt of the STA fails, which restricts WLAN access of weak-signal STAs.

      Background neighbor probing

      Background neighbor probing helps you learn status of all channels on the WLAN network.

      If background neighbor probing is enabled, an AP determines whether to switch to another channel for neighbor probing every 10s based on the service traffic volume and threshold of user quantity. If the channel switching condition is met (the number of users or traffic on the channel does not exceed the threshold), the AP switches to the new channel. The AP then listens on Beacon frames on the new channel and saves the probing result. After 60 ms, the AP switches back to the original channel.

      Service threshold for background neighbor probing

      Service threshold for background neighbor probing configured on an AP.

      After the background neighbor probing is enabled, an AP determines whether the current service traffic volume exceeds the threshold during the background neighbor probing. If the volume does not exceed the threshold, the AP automatically switches to a different channel; otherwise, it does not switch its channel. Service traffic volume = (Sum of bytes received and sent by an AP within a period)/(Theoretical sending and receiving rate of the AP within a period) x 100%

      User threshold for background neighbor probing

      User threshold for background neighbor probing configured on an AP.

      After the background neighbor probing is enabled, an AP determines whether the current user number exceeds the threshold during the background neighbor probing. If the number does not exceed the threshold, the AP automatically switches to a different channel; otherwise, it does not switch its channel.

      Radio device synchronization duration

      Interval at which an AP reports all the radio device information to an AC.

      An AP reports the radio device information to the AC in two modes:
      • The AP immediately sends information about added, deleted, or modified radio devices.
      • The AP periodically sends all the radio device information.

      To ensure that the detected device information saved on APs and the AC is the same, you can configure a radio device synchronization duration to periodically synchronize the detected radio device data saved on them.

      Rate limit status

      Whether to enable the function that restricts access of low-rate STAs.

      The function that restricts access of low-rate STAs can prevent STAs, whose access rate is lower than the specified value, from accessing the WLAN, reducing the impact of these STAs on others and improving WLAN performance.

      NOTE:
      In the case of good WLAN signal coverage, this function can be used to restrict WLAN access of low-rate STAs at the edge of the coverage area.

      Rate limit

      Access rate threshold to restrict access of low-rate STAs.

      When an STA discovers an AP by scanning, it sends a Probe Request frame containing RSSI to an AP. After receiving the Probe Request frame, the AP obtains the RSSI value. If the rate corresponding to the RSSI value is less than the threshold, the AP does not respond to the request frame and the association attempt of the STA fails, which restricts WLAN access of low-rate STAs.

      NOTICE:
      • The configured rate threshold must be smaller than the maximum rate supported by the current radio type.

  • Viewing radio profile details
    1. Choose WLAN Service > Radio Profile to display the Radio Profile List page.
    2. On the Radio Profile List page, click details at the last column to view the radio profile details. For description of the parameters, see Table 11-4.
  • Deleting a radio profile
    1. Choose WLAN Service > Radio Profile to display the Radio Profile List page.
    2. On the Radio Profile List page, select the radio profile to be deleted and click Delete to delete the selected profile.
  • Refreshing the radio profile list
    1. Choose WLAN Service > Radio Profile to display the Radio Profile List page.
    2. On the Radio Profile List page, click Refresh to update the radio profiles to the latest information.
  • Searching a radio profile
    1. Choose WLAN Service > Radio Profile to display the Radio Profile List page.
    2. On the Radio Profile List page, select a proper search item, enter the search keywords, and click Go to search for radio profiles that match the search item and keywords.

      73cb06ad71a84dc0904076097f147c76 NOTE:
      The radio profile search function supports fuzzy match based on keywords. For example, if Profile Name is selected as the search item and the search keyword is P, all profile names that contain the letter "P" can be found.

11.2.2  WMM Profile

Context

802.11 provides services of the same quality for all applications. Different applications, however, have different requirements for wireless networks. 802.11 cannot provide services of different qualities for different applications.

To provide services of different qualities for different applications, the Wi-Fi Alliance defines the Wi-Fi Multimedia (WMM) standard, which classifies data packets into four access categories (ACs) in descending order of priorities, that is, AC-voice (AC-VO), AC-video (AC-VI), AC-best effort (AC-BE), and AC-background (AC-BK). This standard ensures that high-priority packets preempt channels.

A WMM profile is created to implement the WMM protocol. After a WMM profile is created, packets with higher AP or STA priority preempt a wireless channel first, ensuring better quality for voice and video services on WLANs.

You can configure WMM profiles to provide different services on STAs or APs with different channel preemption capabilities and implement different QoS.

Procedure

  • Creating a WMM profile
    1. Choose WLAN Service > Radio Profile > WMM Profile to display the WMM Profile List page.

      07e213eb1a0a49bf868d34b5e51a7a8f

    2. On the WMM Profile List page, click Create to display the Create WMM Profile page.

      dd986e9b229c4ff2816ca9dfc3d5abf6

    3. On the Create WMM Profile page, select or enter each parameter based on actual requirements. For description of the parameters, see Table 11-5.
    4. Click OK to save the parameter settings.

      Table 11-5  Description of WMM profile configuration parameters

      Parameter

      Description

      Profile name

      WMM profile name.

      WMM status

      Whether to enable the WMM function.

      Mandatory control status

      If the WMM mandatory switch is enabled, STAs that do not support WMM cannot connect to a WMM-enabled AP.

      If the WMM mandatory switch is disabled, STAs that do not support WMM are allowed to connect to a WMM-enabled AP.

      NOTE:
      On a WLAN, wireless channels are open and all STAs have the same chance to occupy a channel. You can configure WMM to distinguish high-priority packets and enable the high-priority packets to preempt channels. You can also disable STAs that do not support WMM from connecting to a WMM-enabled AP, which prevents those STAs from preempting channels of WMM-capable STAs.

      Client EDCA parameters

      Client EDCA parameters.

      Enhanced distributed channel access (EDCA) is a prioritized carrier sense multiple access with collision avoidance (CSMA/CA) mechanism used by quality of service (QoS) STAs in a basic service set (BSS). This mechanism is also used by the QoS access point (AP) and operates concurrently with hybrid coordination function (HCF).

      AP EDCA parameters

      EDCA parameters of APs.

      AC_VO

      AC_VO packets.

      AC_VI

      AC_VI packets.

      AC_BE

      AC_BE packets.

      AC_BK

      AC_BK packets.

      AIFSN

      Arbitration inter frame spacing number (AIFSN). It determines the channel idle time.

      In the distributed coordination function (DCF) protocol, the DCF inter frame space (DIFS) has a fixed value. WMM provides different DIFS values for different ACs. A large AIFSN value means that the STA must wait for a long time and has a low priority.

      ECWmin

      Exponent form of the minimum contention window. ECWmin and ECWmax determine the average backoff time. A larger value indicates a longer average backoff time and a lower priority.

      ECWmax

      Exponent form of the maximum contention window. ECWmax and ECWmin determine the average backoff time. A larger value indicates a longer average backoff time and a lower priority.

      TXOPLimit

      Transmission opportunity limit (TXOPLimit). It determines the maximum duration in which an STA can occupy a channel. A larger value indicates a longer duration. If the TXOPLimit value is 0, the STA can send only one data frame every time it preempts a channel.

      Ack-Policy

      ACK policy. It includes:
      • NORMAL ACK: During the interaction of 802.11 packets, the receiver sends an ACK packet to confirm the receiving of a packet from the sender.
      • NO ACK: The receiver sends no ACK packet to confirm the receiving of a packet from the sender. It applies to scenarios where communication quality is good and interference is low.

  • Viewing WMM profile details
    1. Choose WLAN Service > Radio Profile > WMM Profile to display the WMM Profile List page.
    2. On the WMM Profile List page, click details at the last column to view the WMM profile details. For description of the parameters, see Table 11-5.
  • Deleting a WMM profile
    1. Choose WLAN Service > Radio Profile > WMM Profile to display the WMM Profile List page.
    2. On the WMM Profile List page, select the WMM profile to be deleted and click Deleteto delete the selected profile.
  • Refreshing the WMM profile list
    1. Choose WLAN Service > Radio Profile > WMM Profile to display the WMM Profile List page.
    2. On the WMM Profile List page, click Refresh to update the WMM profiles to the latest information.
  • Searching a WMM profile
    1. Choose WLAN Service > Radio Profile > WMM Profile to display the WMM Profile List page.
    2. On the WMM Profile List page, select a proper search item, enter the search keywords, and click Go to search for WMM profiles that match the search item and keywords.

      73cb06ad71a84dc0904076097f147c76 NOTE:
      The WMM profile search function supports fuzzy match based on keywords. For example, if Profile Nameis selected as the search item and the search keyword is P, all profile names that contain the letter "P" can be found.

11.3  Service Set

11.3.1  Service Set

Context

You must deliver service parameters to APs so that STAs can associate with APs to access the network. A service set is a collection of service parameters. You can set the SSID, service VLAN, maximum number of access STAs, and association aging time of STAs, and determine whether to hide the SSID in a service set. Manually configure a service set and bind it to AP radios. All service parameters in the service set then apply to the VAPs, and the APs can provide differentiated WLAN services using these service parameters.

Procedure

  • Creating a service set
    1. Choose WLAN Service > Service Set > Service Set. The Service Set tab page is displayed.

      Figure 11-2  Service Set 
      4fcfdd6cc5bb4e88ba879868c00b8668

    2. In the Service Set List area, click Create. In the Create Service Set dialog box that is displayed, set parameters described in Table 11-6.

      f550c17930934bf5990b57352cdbd791

    3. Click OK.

      Table 11-6  Parameters for creating a service set

      Parameter

      Description

      Service set nameName of a service set.
      Associated SSIDSSID of the service set.

      An SSID identifies a wireless network. When you search for available wireless networks on a STA such as your laptop, SSIDs are displayed to identify the available wireless networks.

      Service VLANService VLAN bound to the service set.
      Traffic profileTraffic profile bound to the service set.
      Security profileSecurity profile bound to the service set.
      NOTE:
      Note the following when the radio type is set to 802.11n:
      • The authentication mode cannot be set to WEP in the security profile.
      • The encryption mode cannot be TKIP if the authentication mode is set to WPA or WPA2 in the security profile.
      ESS interfaceESS interface bound to the service set.
      Forwarding modeData forwarding mode. The default forwarding mode is the direct forwarding mode.

      This parameter cannot be set when AP-based forwarding is used.

      Tunnel forwarding protocolProtocol used for tunnel forwarding.
      User profileUser profile bound to the service set.
      DHCP detectionWhether to enable DHCP snooping.
      IPSGWhether to enable IPSG.
      SSID HidingWhether to hide the SSID.
      User isolationWhether to enable user isolation.
      Offline managementWhether to enable offline management.
      NOTE:
      Only 2.4GHz type of Radio support offline management service-set.
      Service set typeType of the service set. The default value is Service.
      Maximum user countMaximum number of access users.
      Connection time-out(min)Association aging time of STAs.
      STA blacklist/whitelist profileWhether to enable the STA blacklist or whitelist function.
      STA whitelist profileName of a STA whitelist profile.
      STA blacklist profileName of a STA blacklist profile.

  • Modifying a service set
    1. Choose WLAN Service > Service Set > Service Set. The Service Set tab page is displayed.
    2. In the Service Set List area, click 410fd34d23e84917841e98426251e540 of a service set.
    3. In the Modify Service Set dialog box that is displayed, modify parameters described in Table 11-6. Parameter Service Set Name cannot be modified.

      ec47308c59e74beebf6c842135596eb0

    4. Click OK.
  • Deleting a service set
    1. Choose WLAN Service > Service Set > Service Set. The Service Set tab page is displayed.
    2. In the Service Set List area, select a service set and click Delete. In the Informationdialog box that is displayed, click OK.
  • Searching for service sets
    1. Choose WLAN Service > Service Set > Service Set. The Service Set tab page is displayed.
    2. In the Service Set List area, set Search and click Go. Service sets matching the search criteria are displayed. You can view, modify, and delete the service sets.

11.3.2  Traffic Profile

Context

To apply priority mapping and traffic policing functions to a WLAN network, create a traffic profile.
  • Priority mapping: If Wi-Fi Multimedia (WMM) is enabled on both a STA and an AP, the STA sends packets carrying a priority field. After receiving an 802.11 packet, the AP converts it to an 802.3 packet. If the packet needs to be sent to the AC, the AP encapsulates the 802.3 packet with a CAPWAP header. Priority mapping must be configured to retain priorities of packets during the entire transmission process, ensuring end-to-end QoS.
    • After receiving an 802.11 packet from the STA, the AP maps the user priority to the 802.1p field.
    • In tunnel forwarding mode, the 802.1p or Precedence field must be mapped to a tunnel priority.
    • The AC forwards the 802.3 packets received from the Internet to the AP directly or through a tunnel. After receiving the 802.3 packets, the AP maps the 802.1p or Precedence field to the user priority.
  • Traffic policing: To protect network resources, the AC needs to limit the rate of packets sent from STAs to a WLAN network.

Procedure

  • Creating a traffic profile
    1. Choose WLAN Service > Service Set > Traffic Profile. The Traffic Profile tab page is displayed.

      Figure 11-3  Traffic Profile 
      70f089aa86804a76874cbeab06c86d8a

    2. In the Traffic Profile List area, click Create. In the Create Traffic Profile dialog box that is displayed, set parameters described in Table 11-7.

      57410818ed5b471a8c2b929a74272f78

    3. Click OK.

      Table 11-7  Parameters for creating a traffic profile

      Parameter

      Description

      Traffic profile name

      Name of a traffic profile.

      Upstream priority mode

      Mode in which user priorities of upstream packets are mapped to 802.1p priorities. The value can be Mapping Value or Specify Value.
      • When this parameter is set to Mapping Value, specify 802.1p priorities mapping to user priorities. By default, user priority 0 maps 802.1p priority 0, user priority 1 maps user 802.1p 1, and so on.
      • When this parameter is set to Specify Value, specify a 802.1p priority. All 802.3 packets have the same 802.1p priority.

      802.1p priority

      802.1p priorities of upstream packets mapping to user priorities. By default, user priority 0 maps 802.1p priority 0, user priority 1 maps user 802.1p 1, and so on.

      User priority

      User priorities of upstream packets.

      Downstream priority mapping mode

      Mode in which 802.1p priorities of downstream 802.3 packets are mapped to user priorities. The value can be 802.1p or ToS.

      802.1p priority

      802.1p priorities of downstream 802.3 packets mapping to user priorities. By default, 802.1p priority 0 maps user priority 0, 802.1p priority 1 maps user priority 1, and so on.

      Precedence priority

      Precedence field of downstream 802.3 packets mapping to user priorities. By default, precedence 0 maps user priority 0, precedence 1 maps user priority 1, and so on.

      User priority

      User priorities of downstream packets.

      Upstream tunnel priority mode

      Mode in which priorities of 802.3 packets are mapped to upstream tunnel priorities.
      • When Mapping Value is selected, the following four modes are supported:
        • ToS-802.1p: Maps ToS priorities of 802.3 packets to 802.1p priorities of the tunnel.
        • ToS-ToS: Maps ToS priorities of 802.3 packets to ToS priorities of the tunnel.
        • 802.1p-ToS: Maps 802.1p priorities of 802.3 packets to ToS priorities of the tunnel.
        • 802.1p-802.1p: Maps 802.1p priorities of 802.3 packets to 802.1p priorities of the tunnel.
      • When Specify Value is selected, specify a ToS or 802.1p priority for the tunnel.

      Upstream tunnel priority

      Priority of the upstream tunnel.

      802.1p priority

      802.1p priorities.

      Precedence priority

      Value of the Precedence field.

      STA upstream rate limit

      Upstream rate limit for a STA.

      STA downstream rate limit

      Downstream rate limit for a STA.

      VAP upstream rate limit

      Upstream rate limit for all terminals associating with a VAP. The value must be larger than the upstream rate limit for a STA.

      VAP downstream rate limit

      Downstream rate limit for all terminals associating with a VAP. The value must be larger than the downstream rate limit for a STA.

  • Modifying a traffic profile
    1. Choose WLAN Service > Service Set > Traffic Profile. The Traffic Profile tab page is displayed.
    2. In the Traffic Profile List area, click 410fd34d23e84917841e98426251e540 of a traffic profile.
    3. In the Modify Traffic Profile dialog box that is displayed, modify parameters described in Table 11-7.

      7a9467372de242008b87abd4f8ef822f

    4. Click OK.
  • Deleting a traffic profile
    1. Choose WLAN Service > Service Set > Traffic Profile. The Traffic Profile tab page is displayed.
    2. In the Traffic Profile List area, select a traffic profile and click Delete.
    3. In the Information dialog box that is displayed, click OK.
  • Searching for traffic profiles
    1. Choose WLAN Service > Service Set > Traffic Profile. The Traffic Profile tab page is displayed.
    2. In the Traffic Profile List area, set Search and click Go. Traffic profiles matching the search criteria are displayed. You can view, modify, and delete the traffic profiles.

11.3.3  Security Profile

Context

When configuring WLAN services, the administrator needs to bind the security profile to the service set. This ensures secure access of STAs. You can query, create, modify, and delete a security profile.

73cb06ad71a84dc0904076097f147c76 NOTE:

If Authentication policy, Authentication mode, and Encryption mode are set to WEP, OPEN-SYSTEM, and NONE respectively, users can access the WLAN without authentication. The settings bring security risks, and therefore are not recommended. If the settings are required, configure the Portal security policy to enhance security.

Procedure

  • Querying a security profile
    1. Choose WLAN Service > Service Set > Security Profile.

      Figure 11-4  Security Profile 
      4feea83b180844948cf19c0aaa03d07b

    2. In the Security Profile List area, view all existing security profiles. You can set Search, enter a keyword, and click Go to search for a security profile.
  • Creating a security profile
    1. Choose WLAN Service > Service Set > Security Profile.
    2. In the Security Profile List area, click Create. In the Create Security Profile dialog box that is displayed, set parameters described in Table 11-8.

      fc3eb546e255451ba1f0bfdf4c2c7d98

    3. Click OK.

      If the security profile is displayed in the security profile list, the profile is created.

      Table 11-8  Parameters for creating a security profile

      Parameter

      Description

      Security profile name

      Name of the security profile that needs to be created. This parameter is mandatory.

      This parameter cannot be modified when modifying a security profile.

      Authentication policy

      Authentication policy for the security profile that needs to be configured. This parameter is mandatory.

      Authentication mode

      Authentication mode for the security profile that needs to be configured. This parameter is mandatory.

      Encryption mode

      Encryption mode of the security profile that needs to be configured. This parameter is mandatory.

      Password type

      Password type of the security profile that needs to be configured.

      NOTE:

      The password type of the security profile is mandatory only when a password needs to be set.

      Password

      Password of the security profile that needs to be configured.

      NOTE:

      The password of the security profile is mandatory only when a password needs to be set.

      Confirm password

      The value must be the same as the value of Password.

      Index

      Select the password index of the security profile that needs to be configured.

      When selecting the WEP encryption mode, set parameters and click Add to List.

  • Modifying a security profile
    1. Choose WLAN Service > Service Set > Security Profile.
    2. In the Security Profile List area, click 410fd34d23e84917841e98426251e540 corresponding to a security profile to be modified.
    3. In the Modify Security Profile dialog box that is displayed, set parameters described in Table 11-8.
    4. Click OK.
  • Deleting a security profile
    1. Choose WLAN Service > Service Set > Security Profile.
    2. In the Security Profile List area, select a security profile, and click Delete.

      If the security profile is removed from the security profile list, the profile is deleted.

11.3.4  ESS Interface

Context

A VAP is a functional entity on an AP. Multiple VAPs can be created on an AP to provide access services for different STAs. To differentiate VAPs that different STAs associate with, you must create a dynamic interface for each VAP. Additionally, to speed up the configuration, you need to use a profile to create multiple dynamic interfaces simultaneously. WLAN-DBSS interfaces and WLAN-ESS interfaces are developed to solve the preceding problems.

Each VAP maps a WLAN-DBSS interface on an AC. A WLAN-DBSS interface is a virtual Layer 2 interface and similar to a hybrid Layer 2 Ethernet interface. It has Layer 2 attributes and supports network access control (NAC). A WLAN-DBSS interface inherits the attributes of its WLAN-ESS interface. An AC dynamically creates a WLAN-DBSS interface on a WLAN-ESS interface for each VAP and deletes the WLAN-DBSS interface when the VAP becomes invalid.

A WLAN-ESS interface is a profile used to configure attributes for WLAN-DBSS interfaces. All the WLAN-DBSS interfaces belonging to the same WLAN-ESS interface have the same attributes.
  • When a service set bound to a WLAN-ESS interface is bound to a radio, a WLAN-DBSS interface is automatically created and inherits the configuration of the WLAN-ESS interface.
  • When the service set bound to a radio is deleted, the created WLAN-DBSS interface is also deleted.

You can create, modify, delete, and query extended service set (ESS) interfaces using the web platform.

73cb06ad71a84dc0904076097f147c76 NOTE:

You are not advised to add a WLAN-ESS interface to the VLAN of the management VRRP; otherwise, information backup during the VRRP HSB revertive switchover fails, causing service interruption. The reason is as follows: After a WLAN-ESS interface is applied to a radio, the WLAN-ESS interface remains in Up state. If this WLAN-ESS interface is added to the VLAN of the management VRRP, the corresponding VLANIF interface will be always in Up state. As a result, in VRRP HSB scenarios where an active/standby switchover is triggered by link disconnection between the active AC and AP, the active AC will remain in Master state but not change to Initialize state. When the revertive switchover occurs, information on the original backup AP cannot be backed up to the original active AC, causing information loss and service interruption.

Procedure

  • Creating an ESS interface
    1. Choose WLAN Service > Service Set > ESS Interface. The ESS Interface tab page is displayed.

      Figure 11-5  ESS Interface 
      f7703c401b8b4eb59d6f6d9f79489e01

    2. In the ESS Interface List area, click Create. In the Create WLAN ESS Interface dialog box that is displayed, set parameters described in Table 11-9.

      bf85f950627a49db85dc23c5478f8bcc

    3. Click OK.

      Table 11-9  Parameters for creating an ESS interface

      Parameter

      Description

      ESS interface ID

      Number of an ESS interface.

      PVID

      Default VLAN ID.

      Authentication mode

      Authentication method on the interface.

      User name format

      Format of the user name for MAC address authentication.

      Guest VLAN

      Guest VLAN ID.

      Restrict VLAN

      Restricted VLAN ID.

      Reauthentication time (s)

      Re-authentication interval.

      MAC address type

      When User name format is set to MAC address for MAC address authentication, the MAC address can be with or without hyphens (-), for example, 0005-e01c-02e3 or 0005e01c02e3.

      User name

      Fixed user name used for MAC address authentication.

      Password

      Password used for MAC address authentication.

      Confirm password

      Confirm password used for MAC address authentication.

      Port isolation

      Whether to enable port isolation.

      Forcible domain

      Name of a forcible authentication domain for WLAN users.

      Permit domain

      Name of a permitted domain for WLAN users.

      Untagged VLAN

      Untagged VLAN to which hybrid interfaces are added.

      Description

      Interface description.

      Inbound CAR Parameters

      Sets traffic policing parameters for incoming traffic.

      CIR (kbit/s)

      Specifies the committed information rate (CIR), which is the average rate of traffic that can pass through.

      PIR (kbit/s)

      Specifies the peak information rate (PIR), which is the maximum rate of traffic that can pass through.

      The PIR cannot be smaller than the CIR.

      CBS (bytes)

      Specifies the committed burst size (CBS), which is the average volume of burst traffic that can pass through.

      The CBS cannot be smaller than the CIR.

      PBS (bytes)

      Specifies the peak burst size (PBS), which is the maximum volume of burst traffic that can pass through.

      The PBS cannot be smaller than the CIR.

      Outbound CAR Parameters

      Sets traffic policing parameters for outgoing traffic.

      CIR (kbit/s)

      Specifies the committed information rate (CIR), which is the average rate of traffic that can pass through.

      PIR (kbit/s)

      Specifies the peak information rate (PIR), which is the maximum rate of traffic that can pass through.

      The PIR cannot be smaller than the CIR.

      CBS (bytes)

      Specifies the committed burst size (CBS), which is the average volume of burst traffic that can pass through.

      The CBS cannot be smaller than the CIR.

      PBS (bytes)

      Specifies the peak burst size (PBS), which is the maximum volume of burst traffic that can pass through.

      The PBS cannot be smaller than the CIR.

  • Modifying an ESS interface
    1. Choose WLAN Service > Service Set > ESS Interface. The ESS Interface tab page is displayed.
    2. In the ESS Interface List area, click 410fd34d23e84917841e98426251e540 of an ESS interface.
    3. In the Modify WLAN ESS Interface dialog box that is displayed, modify parameters described in Table 11-9. Parameter ESS Interface ID cannot be modified.

      8b8c02e0e5bf429db13775e8e316af80

    4. Click OK.
  • Deleting an ESS interface
    1. Choose WLAN Service > Service Set > ESS Interface. The ESS Interface tab page is displayed.
    2. In the ESS Interface List area, select an ESS interface and click Delete. In the Information dialog box that is displayed, click OK.
  • Searching for ESS interfaces
    1. Choose WLAN Service > Service Set > ESS Interface. The ESS Interface tab page is displayed.
    2. In the ESS Interface List area, set Search and click Go. ESS interfaces matching the search criteria are displayed. You can view, modify, and delete the ESS interfaces.

11.3.5  User Profile

Context

You can bind a CAR profile to a user profile, configure the user priority policy, and bind a service set to the user profile so that the transmission rate for each user in the VAP bound to the service set is limited and the user priority is specified.

Procedure

  • Creating a user profile
    1. Choose WLAN Service > Service Set > User Profile to display the User Profile page.

      Figure 11-6  User Profile 
      0d5967a9665344cf97c2f84c84c26cdc

    2. Click Create on the User Profile List page. Set the parameters on the Create User Profile page that is displayed. For description of the parameters, see Table 11-10.

      c73030f2f23041c7a3188b41b992e934

    3. Click OK to complete the configuration.

      Table 11-10  Description of the parameters for creating a user profile

      Parameter

      Description

      User profile name

      Specifies the name of a user profile.

      Upstream user priority

      Specifies the upstream user priority.

      Downstream user priority

      Specifies the downstream user priority.

      Inbound CAR profile

      Specifies the QoS CAR profile bound to the inbound interface.

      Outbound CAR profile

      Specifies the QoS CAR profile bound to the outbound interface.

  • Modifying a user profile
    1. Choose WLAN Service > Service Set > User Profile to display the User Profile page.
    2. On the User Profile List page, click 410fd34d23e84917841e98426251e540 corresponding to the user profile details.
    3. On the Modify User Profile page, re-enter or reselect the parameters. For description of the parameters, see Table 11-10.

      3884db1d09de4d2cad99d6b1db704947

    4. Click OK to save the parameter settings.
  • Deleting a user profile
    1. Choose WLAN Service > Service Set > User Profile to display the User Profile page.
    2. On the User Profile List page, select the user profile to be deleted and click Delete.
    3. Click OK in the displayed dialog box. The user profile is deleted.
  • Searching a user profile
    1. Choose WLAN Service > Service Set > User Profile to display the User Profile page.
    2. Enter the name of a user profile in the User Profile Name text box and click Search. After the user profile is found, you can view, modify, or delete it.

11.3.6  STA Blacklist/Whitelist Profile

Context

STA blacklist and whitelist functions allow authorized STAs to connect to the WLAN and reject access from unauthorized STAs.
  • A whitelist contains MAC addresses of STAs that are allowed to connect to a WLAN. After the whitelist function is enabled, only the STAs in the whitelist can connect to the WLAN, and access from other STAs is rejected.
  • A blacklist contains MAC addresses of STAs that are not allowed to connect to a WLAN. After the blacklist function is enabled, STAs in the blacklist cannot connect to the WLAN, and other STAs can connect to the WLAN.
When the blacklist or whitelist function is configured on a VAP, you must bind the STA blacklist or whitelist profile to the service set after you configure the blacklist or whitelist in the profile. The device supports the configuration of STA blacklist or whitelist function for an AP or a VAP. If an AP and a VAP are configured with the blacklist or whitelist function, a STA can connect to the WLAN only when it is permitted by both the configuration on the AP and VAP. To configure a blacklist or whitelist based on an AP, see 16.1.5 STA Blacklist/Whitelist.

If the whitelist or blacklist is empty, all STAs can connect to the WLAN.

The configurations of STA blacklist and whitelist profiles are the same. The following describes the configuration of STA whitelist profile as an example.

Procedure

  • Querying a STA whitelist profile
    1. Choose WLAN Service > Service Set > STA Blacklist/Whitelist Profile.

      Figure 11-7  STA Blacklist/Whitelist Profile 
      ba318690e5634ac1b7089591249dd2c0

    2. In the STA Whitelist Profile List area, view all existing STA whitelist profiles. You can set Search, enter a keyword, and click Go to search for a STA whitelist profile.
  • Creating a STA whitelist profile
    1. Choose WLAN Service > Service Set > STA Blacklist/Whitelist Profile.
    2. In the STA Whitelist Profile List area, click Create. In the Create STA Whitelist Profiledialog box that is displayed, set parameters described in Table 11-11.

      4d8f6323d62b44a7bce9f2d0c01ef984

    3. Click OK.

      If the STA whitelist profile is displayed in the STA whitelist profile list, the profile is created.

      Table 11-11  Parameters for creating a STA whitelist profile

      Parameter

      Description

      Profile name

      Name of a STA whitelist profile, which is mandatory.

      This parameter cannot be modified.

      MAC address

      MAC address of the STA for which a whitelist needs to be created. To add a MAC address, enter a MAC address and click 36a1c8ef4a804f66ad96a526438768a9.

      A maximum of 512 MAC addresses can be added to a STA whitelist profile.

  • Modifying a STA whitelist profile
    1. Choose WLAN Service > Service Set > STA Blacklist/Whitelist Profile.
    2. In the STA Whitelist Profile List area, click 410fd34d23e84917841e98426251e540 corresponding to a STA whitelist profile to be modified.
    3. In the Modify STA Whitelist Profile dialog box that is displayed, set parameters described in Table 11-11.
    4. Click OK.
  • Deleting a STA whitelist profile
    1. Choose WLAN Service > Service Set > STA Blacklist/Whitelist Profile.
    2. In the STA Whitelist Profile List area, select a STA whitelist profile, and click Delete.

      If the STA whitelist profile is removed from the STA whitelist profile list, the profile is deleted.

11.4  WDS Profile

WDS Introduction

A WDS connects two or more wired or wireless LANs wirelessly to establish a large network.

On a traditional WLAN, APs exchange data with STAs using wireless channels and connect to a wired network through uplinks. To expand the coverage area of a wireless network, APs need to be connected by switches. This deployment requires high costs and takes a long time. In some places, such as subways, tunnels, and docks, it is difficult to connect APs to the Internet through wired links. WDS technology can connect APs wirelessly in these places, which reduces network deployment costs, makes the network easy to expand, and allows flexible networking.

WDS Concepts

Figure 11-8  WDS networking 
558b31fcf29048f799086fc6c1363d8d
  • Service VAP: On a traditional WLAN, an AP is a physical entity that provides WLAN services to STAs. A service virtual access point (VAP) is a logical entity that provides access service for users. Multiple VAPs can be created on an AP to provide access service for multiple user groups. As shown in Figure 11-8, VAP0 created on AP3 is a service VAP.
  • Bridge VAP: On a WDS network, an AP is a physical entity that provides WDS service for neighboring devices. The bridge VAP is a logical entity that provides WDS service. Bridge VAPs include AP VAPs and STA VAPs. The ID of STA VAPs is fixed as 13, and that of AP VAPs is fixed at 12. AP VAPs provide connections for STA VAPs. As shown in Figure 11-8, VAP13 created on AP3 is a STA VAP, and VAP12 created on AP2 is an AP VAP.
  • Wireless virtual link: a connection set up between a STA VAP and an AP VAP on neighboring APs. As shown in Figure 11-8, connections set up between AP1, AP2, and AP3 are wireless virtual links. Wireless virtual links include service wireless virtual links and management wireless virtual links.
    • Service wireless virtual link: a wireless virtual link that forwards user data on a WDS network.
    • Management wireless virtual link: a wireless virtual link that forwards management and control packets on a WDS network. A management wireless virtual link is used to control link setup and deliver configuration parameters.
  • AP working mode: Depending on its location on a WDS network, an AP can work in root, middle, or leaf mode, as shown in Figure 11-8.

    • Root: The AP directly connects to an AC through a wired link and uses an AP VAP to set up wireless virtual links with a STA VAP.
    • Middle: The AP uses a STA VAP to connect to an AP VAP on an upstream AP and uses an AP VAP to connect to a STA VAP on a downstream AP.
    • Leaf: The AP uses a STA VAP to connect to an AP VAP on an upstream AP.
  • Working mode of an AP's wired interface: On a WDS network, an AP's wired interface can connect to either an upstream wired network or a downstream user host or LAN. Depending on an AP's location, a wired interface works in root or endpoint mode.
    • Root: The wired interface connects to an upstream wired network.
    • endpoint: The wired interface connects to a downstream user host or LAN.
    73cb06ad71a84dc0904076097f147c76 NOTE:

    On a WDS network, one wired interface must work in root mode to connect to the wired network.

WDS Network Architecture

A WDS network can be deployed in point-to-point or point-to-multipoint mode.
  • Point-to-point deployment

    As shown in Figure 11-9, AP1 sets up wireless virtual links with AP2 to provide wireless access service for users.

    Figure 11-9  Point-to-point WDS deployment 
    02bda00f55ac4edc91cb317d2f306ebb
  • Point-to-multipoint deployment

    As shown in Figure 11-10, AP1, AP2, and AP3 set up wireless virtual links with AP4. Data from all STAs associating with AP1, AP2, and AP3 is forwarded by AP4.

    Figure 11-10  Point-to-multipoint WDS deployment 
    b10a6bb5b7764a8195bd54b6d7a88e4e

WDS Configuration Process

Figure 11-11 shows the WDS configuration process.

Figure 11-11  WDS configuration process 
6b11b4854e9b472a8cba6e483bf6ff53

11.4.1  Bridge Profile

Context

A bridge profile contains parameters of wireless virtual links (WVLs) between APs and their neighbors. After a bridge profile is bound to a radio, the radio has all attributes of the bridge profile and a bridge VAP is automatically created. The radio uses different VAP parameters to set up and maintain WVLs between APs.

A bridge profile in the WDS has the same function as a service set in traditional WLAN services. A bridge profile is bound to a specified AP radio to create a bridge VAP. Bridge VAPs include AP VAPs and STA VAPs.

As shown in Figure 11-12, when a bridge VAP is created, VAPs 12, 13, 14, and 15 are generated. VAPs 12 and 14 are AP VAPs and VAPs 13 and 15 are STA VAPs. VAPs 12 and 13 are used for service WVLs, and VAPs 14 and 15 are used for management WVLs. APs in different modes generate different bridge VAPs on a WDS network.
  • Root APs: When a bridge VAP is created, AP VAPs 12 and 14 are generated.
  • Middle APs: When a bridge VAP is created, AP VAPs 12 and 14 and STA VAPs 13 and 15 are generated.
  • Leaf APs: When a bridge VAP is created, STA VAPs 13 and 15 are generated.
Figure 11-12  WDS network on the 2.4 GHz radio 
1cce0e812c6841b2985567095090ba6a

Procedure

  • Creating a WDS profile
    1. Choose WLAN Service > WDS Profile > Bridge Profile.

      Figure 11-13  WDS Profile List 
      d54da54dbf664d4990063ccb40b43016

    2. In the WDS Profile List area, click Create.

      a92b87fb70c14899ad4bd19d108370c3

    3. In the Create Bridge Profile dialog box that is displayed, set parameters described in Table 11-12.
    4. Click OK.

      Table 11-12  Parameters for creating a bridge profile

      Parameter

      Description

      Bridge profile name

      Name of a bridge profile.

      Bridge name

      Name of a bridge. On a WDS network, connections between bridges are established using the bridge name.

      Security profile

      Security profile that a bridge profile is bound to.

      NOTE:
      The security profile bound to a bridge profile must be WPA2+PSK+CCMP.

      Tagged VLAN

      A bridge is added to a VLAN or a group of VLANs in tagged mode.

      To add a bridge to a VLAN, enter a VLAN ID in the Tagged VLAN text box, and click 36a1c8ef4a804f66ad96a526438768a9. If the VLAN ID is displayed in the text box below the Tagged VLANtext box, the bridge is added to the VLAN.

      To delete a VLAN, enter a VLAN ID in the Tagged VLAN text box, and click cb6c0a74359840a5bc2945d81b4a403b. If the VLAN ID is removed from the text box below the Tagged VLAN text box, the VLAN is deleted.

      NOTE:
      In the example, 1-3,5,7,9 indicates VLANs 1, 2, 3, 5, 7, and 9. 1-3 indicates VLANs 1 to 3.

  • Modifying a bridge profile
    1. Choose WLAN Service > WDS Profile > Bridge Profile.
    2. In the WDS Profile List area, click 410fd34d23e84917841e98426251e540 corresponding to a bridge profile.

      d456e81587214af2957b48cd1298198c

    3. In the Modify Bridge Profile dialog box that is displayed, set parameters described in Table 11-12.
    4. Click OK.
  • Deleting a bridge profile
    1. Choose WLAN Service > WDS Profile > Bridge Profile.
    2. In the WDS Profile List area, select a bridge profile, and click Delete.
  • Refreshing bridge profile information
    1. Choose WLAN Service > WDS Profile > Bridge Profile.
    2. In the WDS Profile List area, click Refresh.
  • Searching for a bridge profile
    1. Choose WLAN Service > WDS Profile > Bridge Profile.
    2. In the WDS Profile List area, set Search, enter a keyword, and click Go.

      73cb06ad71a84dc0904076097f147c76 NOTE:
      Fuzzy match is supported. Assume that you enter the keyword P, all profile names with the keyword P are displayed.

11.4.2  Bridge Whitelist

Context

A bridge whitelist contains MAC addresses of neighboring APs that can connect to a bridge. If the whitelist is used, only neighboring APs with MAC addresses in the whitelist can connect to the bridge. On WDS networks, the whitelist can be configured only on root APs or middle APs.

73cb06ad71a84dc0904076097f147c76 NOTE:
  • WVLs can be established only when neighboring APs with MAC addresses in the whitelist succeed in authentication.
  • If the bridge uses no whitelist, all the neighboring APs can connect to the bridge.

Procedure

  • Creating a bridge whitelist
    1. Choose WLAN Service > WDS Profile > Bridge WhiteList.

      Figure 11-14  Bridge Whitelist List 
      61a0f4a9463843fba26b43afd239a4f9

    2. In the Bridge Whitelist List area, click Create.

      3e68ef4e46834712b8676ab157ccb498

    3. In the Create Bridge Whitelist dialog box that is displayed, set parameters described in Table 11-13.
    4. Click OK.

      Table 11-13  Parameters for creating a bridge whitelist

      Parameter

      Description

      Whitelist name

      Name of a bridge whitelist.

      MAC address

      MAC addresses of the neighboring APs that are allowed to access the bridge.

      To add a MAC address to the bridge whitelist, enter a MAC address in the MAC Address text box, and click 36a1c8ef4a804f66ad96a526438768a9. If the MAC address is displayed in the text box below the MAC Address text box, the MAC address is added to the bridge whitelist.

      To delete a MAC address from the bridge whitelist, enter a MAC address in the MAC Address text box, and click cb6c0a74359840a5bc2945d81b4a403b. If the MAC address is removed from the text box below the MAC Address text box, the MAC address is deleted from the bridge whitelist.

  • Modifying a bridge whitelist
    1. Choose WLAN Service > WDS Profile > Bridge WhiteList.
    2. In the Bridge Whitelist List area, click 410fd34d23e84917841e98426251e540 corresponding to a bridge whitelist.

      ea106024d2b14a3d9fee4c23d1db558f

    3. In the Modify Bridge Whitelist dialog box that is displayed, set parameters described in Table 11-13.
    4. Click OK.
  • Deleting a bridge whitelist
    1. Choose WLAN Service > WDS Profile > Bridge WhiteList.
    2. In the Bridge Whitelist List area, select a bridge profile, and click Delete.
  • Refreshing a bridge whitelist
    1. Choose WLAN Service > WDS Profile > Bridge WhiteList.
    2. In the Bridge Whitelist List area, click Refresh.
  • Searching for a bridge whitelist
    1. Choose WLAN Service > WDS Profile > Bridge WhiteList.
    2. In the Bridge Whitelist List area, set Search, enter a keyword, and click Go.

      73cb06ad71a84dc0904076097f147c76 NOTE:
      Fuzzy match is supported. Assume that you enter the keyword P, all whitelist names with the keyword Pare displayed.

11.4.3  WVL Information

Context

After configuring the WDS, choose Configuration > AP Management > AP Info and restart the root AP. Root AP restarting takes about 10 minutes. After the root AP restarts, you can view wireless virtual link (WVL) information.

Procedure

  • Searching for WVL information
    1. Choose WLAN Service > WDS Profile > WVL Information.

      Figure 11-15  WVL Information 
      9cf5ab6e56ca43a493197bb56a21fc3d

    2. In the Wireless Virtual Link List area, set Search, enter a keyword, and click Go. Table 11-14 describes WVL parameters.

      73cb06ad71a84dc0904076097f147c76 NOTE:
      Fuzzy match is supported. Assume that you enter the keyword P, all AP IDs with the keyword P are displayed.
      Table 11-14  WVL parameters

      Parameter

      Description

      AP ID

      ID of the bridge AP on the WDS network.

      AP Name

      Name of the bridge AP on the WDS network.

      Local MAC

      MAC address of the local bridge AP.

      Radio

      Radio frequency of the WVL.

      Bridge-link ID

      Bridge ID of the WVL.

      WLAN ID

      VAP ID of the WVL.

      Peer MAC

      MAC address of the AP that connects to the local bridge AP through a WVL.

  • Refreshing WVL information
    1. Choose WLAN Service > WDS Profile > WVL Information.
    2. In the Wireless Virtual Link List area, click Refresh.

11.5  Mesh Profile

11.5.1  Mesh Profile

Context

On a traditional WLAN, APs exchange data with STAs using wireless channels and connect to a wired network through uplinks. If no wired network is available for WLAN construction, a wired network must be constructed first, which is both time- and money- consuming. If the positions of some APs on a WLAN need to be adjusted, the wired network must be adjusted accordingly, increasing the difficulty in network adjustment. With Mesh technology, APs can connect each other wirelessly, which allows flexible networking and quick network deployment and facilitates dynamic expansion of network coverage.

As shown in Figure 11-16, APs on a Mesh network can be sorted into the following types based on functions:

  • Mesh Point (MP): It is a mesh-capable node that uses IEEE 802.11 MAC and physical layer protocols for wireless communication. This node supports automatic topology discovery, automatic route discovery, and data packet forwarding. MPs can provide both mesh service and user access service.
  • Mesh Portal Point (MPP): It is an MP that connects the Mesh network to networks of other types. This node has the portal function and can help mesh nodes communicate with external networks.
Figure 11-16  Networking diagram 
e49564635622493584e903a7ce67c5d7

A Mesh profile contains the attributes of Mesh links set up between MPs. After a Mesh profile is bound to a radio, the radio has all attributes of the Mesh profile and automatically creates a Mesh VAP. The radio uses different VAP parameters to set up and maintain the Mesh links between MPs.

A Mesh profile has the similar function with the service set in the traditional WLAN service. It can be bound to the specified AP radio to create a Mesh VAP.

Procedure

  • Creating a Mesh profile
    1. Choose WLAN Service > Mesh Profile > Mesh Profile to display the Mesh Profile page.

      Figure 11-17  Mesh Profile 
      c8bd304dd2db47afac15dfb3bb81cad3

    2. On the Mesh Profile List page, click Create. On the Create Mesh Profile page that is displayed, set the parameters. For description of the parameters, see Table 11-15.

      b5093edf1d194fc091e5875429b92789

    3. Click OK to complete the configuration.

      Table 11-15  Parameters for creating a Mesh profile

      Parameter

      Description

      Profile name

      Specifies the name of a Mesh profile.

      Mesh ID

      Specifies the ID of a Mesh profile. By default, the Mesh ID is configured as huaweimesh.

      Security profile

      Binds a security profile to the specified Mesh profile.
      NOTE:
      Currently, the security profile bound to a mesh profile must be configured as WPA2+PSK+CCMP.

      Maximum connection count

      Specifies the maximum number of links allowed by an MP.

      RSSI threshold (dBm)

      Specifies the threshold of signal strength received by a Mesh link.

      Link report interval (s)

      Sets the interval at which an MP reports the Mesh link information to the AC.

  • Modifying a Mesh profile
    1. Choose WLAN Service > Mesh Profile > Mesh Profile to display the Mesh Profile page.
    2. Click the icon 410fd34d23e84917841e98426251e540 next to the Mesh profile details on the Mesh Profile List page.
    3. On the Modify Mesh Profile page, re-enter or reselect the parameters. For description of the parameters, see Table 11-15.

      a4eeee096c594559beb3073d20ccabe3

    4. Click OK to save the parameter settings.
  • Deleting a Mesh profile
    1. Choose WLAN Service > Mesh Profile > Mesh Profile to display the Mesh Profile page.
    2. On the Mesh Profile List page, select the Mesh profile and click Delete.
    3. Click OK in the displayed dialog box to delete the selected Mesh profile.
  • Searching a Mesh profile
    1. Choose WLAN Service > Mesh Profile > Mesh Profile to display the Mesh Profile page.
    2. Select Profile name, Mesh ID, or Security profile in Search, enter the corresponding keywords, and click Go to search for the Mesh profile. After the Mesh profile is found, you can view, modify, or delete it.

11.5.2  Mesh WhiteList

Context

A Mesh whitelist contains MAC addresses of neighboring MPs that are allowed to connect to an MP. After a Mesh whitelist is bound to an MP radio, only neighboring MPs with the MAC addresses in the whitelist can connect to the MP.
73cb06ad71a84dc0904076097f147c76 NOTE:

If the Mesh whitelist contains no entry, no neighboring MPs can connect to the MP.

Procedure

  • Creating a Mesh whitelist
    1. Choose WLAN Service > Mesh Profile > Mesh WhiteList to display the Mesh WhiteListpage.

      Figure 11-18  Mesh WhiteList 
      200d917e089a43f2a9f152f22565e035

    2. On the Mesh WhiteList List page, click Create. On the Create Mesh WhiteList page that is displayed, set the parameters. For description of the parameters, see Table 11-16.

      5bce288ca89d46be9af52e7fee7d0c35

    3. Click OK to complete the configuration.

      Table 11-16  Parameters for creating a Mesh whitelist

      Parameter

      Description

      Whitelist name

      Specifies the name of a Mesh whitelist.

      Mac address

      Specifies the MAC addresses of neighboring MPs to be added to the Mesh whitelist.

  • Modifying a Mesh whitelist
    1. Choose WLAN Service > Mesh Profile > Mesh WhiteList to display the Mesh WhiteListpage.
    2. Click the icon 410fd34d23e84917841e98426251e540 next to the Mesh profile details in Mesh WhiteList List.
    3. On the Modify Mesh WhiteList page, re-enter or reselect the parameters. For description of the parameters, see Table 11-16.

      12e71c0e91704e90baae0ebf810e3a7f

    4. Click OK to save the parameter settings.
  • Deleting a Mesh whitelist
    1. Choose WLAN Service > Mesh Profile > Mesh WhiteList to display the Mesh WhiteListpage.
    2. On the Mesh WhiteList List page, select the Mesh whitelist to be deleted and click Delete.
    3. Click OK in the displayed dialog box to delete the selected Mesh whitelist.
  • Searching a Mesh whitelist
    1. Choose WLAN Service > Mesh Profile > Mesh WhiteList to display the Mesh WhiteListpage.
    2. Enter the name of the Mesh whitelist to be searched in WhiteList name and click Searchto search for the Mesh whitelist. After the Mesh whitelist is found, you can view, modify, or delete it.

11.5.3  WVL Information

Context

You can query wireless virtual link (WVL) information easily.

Procedure

  • Viewing WVL information
    1. Choose WLAN Service > Mesh Profile > WVL Information to display the WVL Information page.

      Figure 11-19  WVL Information 
      61ed3467fbd44332b2f21f9629705805

    2. Select AP ID, AP name, or MAC address in Search, enter the search keywords, and click Go to search for the WVL information matching the selected search item and entered keywords. For description of the parameters, see Table 11-17.

      73cb06ad71a84dc0904076097f147c76 NOTE:
      The WVL information search function supports fuzzy match based on keywords. For example, if AP name is selected as the search item and the search keyword is P, all AP names that contain the letter "P" can be found.

      Table 11-17  Description of WVL parameters

      Parameter

      Description

      AP ID

      ID of an AP on a Mesh network.

      AP Name

      Name of an AP on a Mesh network.

      Local MAC

      MAC address of a bridge AP at the local end.

      Radio

      Radio frequency of the WVL.

      Mesh-Link ID

      ID of a WVL bridge.

      WLAN ID

      ID of a WVL VAP.

      Peer MAC

      MAC addresses of neighboring MPs that establish WVLs with bridge APs at the local end.

11.6  Load Balancing Group

11.6.1  Static Load Balancing Group

Context

The capabilities of an AP are limited. If a large number of STAs exist in a hotspot area, the carrier deploys multiple APs in this area to meet requirements of the STAs. To prevent uneven loads on APs, add these APs to a load balancing group. Pay attention to the following information:
  • A radio can join only one load balancing group.
  • AP radios in a load balancing group work in different channels.
  • Member radios in a load balancing group must be of the same type.
  • Each load balancing group supports a maximum of three APs.

Procedure

  • Creating a static load balancing group
    1. Log in to the web platform, and choose WLAN Service > Load Balancing Group > Static Load Balancing Group.


      363ca04491664ddeb39844c986c8b213

    2. In the Load Balancing Group area, click Create. In the Create Load Balancing Groupdialog box that is displayed, set parameters described in Table 11-18.


      5d1314cef4ed4f8bb0553489b0ce17ac

    3. Click OK.

      Table 11-18  Parameters for creating a load balancing group

      Parameter

      Description

      Group name

      Name of a static load balancing group, which is a string of 1 to 31 characters.

      Load balancing mode

      Load balancing mode. The value can be Session mode and Traffic mode.
      • Session mode: The load of the radio is determined by the number of STAs associated with the radio.
      • Traffic mode: The load of a radio is determined by the traffic on the radio including the upstream and downstream Ethernet packets. The AP reports the traffic on the radio at a specified interval, for example, 30 seconds.

      Gap threshold(%)

      Gap threshold that is compared with the load value calculated using the load balancing algorithm. The load is determined using the following algorithms:
      • Traffic-based load balancing algorithms: Calculate the load values of all members to get the maximum and minimum values: (Current traffic volume of the radio/Current maximum rate of the radio) x 100%. Calculate the difference between the maximum and minimum values: Maximum value - Minimum value. Compare the difference with the threshold. If the difference between the maximum and minimum values is smaller than or equal to the threshold, load balancing is enabled. If the difference between the maximum and minimum values is larger than the threshold, load balancing is disabled.
      • Session-based load balancing algorithms: Calculate the load values of all members to get the maximum and minimum values: (Current traffic volume of the radio/Current maximum rate of the radio) x 100%. Calculate the difference between the maximum and minimum values: Maximum value - Minimum value. Compare the difference with the threshold. If the difference between the maximum and minimum values is smaller than or equal to the threshold, load balancing is enabled. If the difference between the maximum and minimum values is larger than the threshold, load balancing is disabled.

      Maximum number of association requests

      Maximum number of associations of the load balancing group, which ranges from 1 to 30. The default value is 6.

      When the load is unbalanced in a load balancing group, the AC rejects the APs with heavier STA association loads. However, when the number of STA associations exceeds the maximum value, the AP can connect to the AC.

      Radio

      Radio on which load balancing is performed.

      AP region

      AP region in which load balancing is performed.

      APs in the load balancing group must be in the same AP region.

      Select AP

      Adds APs to or removes APs from a load balancing group. The procedures are as follows:
      • Adding APs to the load balancing group: Select APs in the available AP list, and click 523f06136b9c43d79aff06005f498a3b to add the APs to the selected AP list.
      • Removing APs from the load balancing group: Select APs in the selected AP list, and click 64ff40692ea646f2a5b5390ff1d81e48 to remove the APs back to the available AP list.

  • Modifying a static load balancing group
    1. Log in to the web platform, and choose WLAN Service > Load Balancing Group > Static Load Balancing Group.
    2. In the Load Balancing Group area, select a static load balancing group and click 410fd34d23e84917841e98426251e540.
    3. In the Modify Load Balancing Group dialog box that is displayed, set parameters described in Table 11-18.
    4. Click OK.
  • Deleting a static load balancing group
    1. Log in to the web platform, and choose WLAN Service > Load Balancing Group > Static Load Balancing Group.
    2. In the Load Balancing Group area, select a static load balancing group and click Delete.
    3. In the dialog box that is displayed, click OK.
  • Updating static load balancing groups
    1. Log in to the web platform, and choose WLAN Service > Load Balancing Group > Static Load Balancing Group.
    2. In Load Balancing Group, click Refresh. Information about static load balancing groups is updated.
  • Searching for static load balancing groups
    1. Log in to the web platform, and choose WLAN Service > Load Balancing Group > Static Load Balancing Group.
    2. In the Load Balancing Group area, set Search and click Go. Static load balancing groups matching the search criteria are displayed. You can view, modify, and delete the static load balancing groups.

11.6.2  Dynamic Load Balancing Group

Context

Static load balancing limits the maximum number of AP radios to 3 and allows only radios in the same frequency band to join a load balancing group. Additionally, a load balancing group needs to be manually specified. Dynamic load balancing is used to overcome the limitations of static load balancing.

In dynamic load balancing mode, the AP determines whether a STA can be associated based on the load of the dynamic load balancing group. Dynamic load balancing: A STA sends a broadcast Probe Request frame to scan available APs. The APs that receive the Probe Request frame report STA information to the AC. The AC adds these APs to a load balancing group, and then uses a load balancing algorithm to determine whether to allow access from the STA.

Procedure

  • Configuring dynamic load balancing
    1. Log in to the web platform, and choose WLAN Service > Load Balancing Group > Dynamic Load Balancing Group.


      a3febfef0f3943b3aed870712d7190b6

    2. On the Dynamic Load Balancing Group area, set parameters described in Table 11-19.
    3. Click Apply.

      Table 11-19  Parameters for configuring dynamic load balancing

      Parameter

      Description

      Dynamic load balancing group function

      Whether dynamic load balancing is enabled. This function is enabled when this parameter is set to Enable.

      Load balancing mode

      Load balancing mode. The value can be Session mode and Traffic mode.
      • Session mode: The load of the radio is determined by the number of STAs associated with the radio.
      • Traffic mode: The load of a radio is determined by the traffic on the radio including the upstream and downstream Ethernet packets. The AP reports the traffic on the radio at a specified interval, for example, 30 seconds.

      User count threshold(%)

      Threshold that is compared with the load value calculated using the load balancing algorithm in session mode. The load is determined using the following algorithms:
      • Calculate the load values of all members to get the maximum and minimum values: (Current traffic volume of the radio/Current maximum rate of the radio) x 100%. Calculate the difference between the maximum and minimum values: Maximum value - Minimum value. Compare the difference with the threshold. If the difference between the maximum and minimum values is smaller than or equal to the threshold, load balancing is enabled. If the difference between the maximum and minimum values is larger than the threshold, load balancing is disabled.

      Traffic threshold(%)

      Threshold that is compared with the load value calculated using the load balancing algorithm in traffic mode. The load is determined using the following algorithms:
      • (Current traffic volume of the radio/Current maximum rate of the radio) x 100%. Calculate the difference between the maximum and minimum values: Maximum value - Minimum value. Compare the difference with the threshold. If the difference between the maximum and minimum values is smaller than or equal to the threshold, load balancing is enabled. If the difference between the maximum and minimum values is larger than the threshold, load balancing is disabled.

      Maximum number of association requests

      Maximum number of associations of the load balancing group, which ranges from 1 to 30. The default value is 6.

      When the load is unbalanced in a load balancing group, the AC rejects the APs with heavier STA association loads. However, when the number of STA associations exceeds the maximum value, the AP can connect to the AC.

From group: WLAN

Huawei Wireless Access Controllers V200R003C00 Web Platform Configuration Guide-WLAN Service
View more
  • x
  • convention:

SamB
Moderator Created Feb 28, 2022 18:54:03

Good, Thanks for sharing
View more
  • x
  • convention:

SamB
Moderator Created Mar 26, 2022 11:14:12

Wireless Access Controllers V200R003C00 Web Platform Configuration Guide is very detailed and very useful
View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.