Configuring Radio Calibration
Example for Configuring Radio Calibration
Radio Calibration Overview
Radio calibration can dynamically adjust channels and power of APs managed by the same AC to ensure that the APs work optimally. On a WLAN, the operating status of APs is affected by the radio environment. For example, signal interference occurs if adjacent APs managed by the same AC work on overlapping channels or an AP has high power. In this case, you can configure radio calibration on the AC.
- During AP deployment, configure radio calibration to enable APs to automatically select the optimal channels.
- When new APs are added to a network or the network environment changes, configure radio calibration so that APs can adjust channels and power at scheduled time to work optimally.
Configuration Notes
For details about common WLAN configuration notes, see General Precautions for WLAN. For more deployment and configuration suggestions, see Wireless Network Deployment and Configuration Suggestions.
- For details about radio configuration notes, see Radio Configuration Suggestion.
From V200R011C10, WLAN configurations are automatically delivered, without the need of running the commit all command.
In this example, the security policy is WPA2-PSK-AES. To ensure network security, choose an appropriate security policy according to your network configurations.
In tunnel forwarding mode, the management VLAN and service VLAN cannot be the same. If you set the forwarding mode to direct forwarding, you are not advised to configure the management VLAN and service VLAN to be the same.
In direct forwarding mode, configure port isolation on the interface directly connected to APs. If port isolation is not configured, many broadcast packets will be transmitted in the VLANs or WLAN users on different APs can directly communicate at Layer 2.
- Configure the management VLAN and service VLAN:
- In tunnel forwarding mode, service packets are encapsulated in a CAPWAP tunnel and forwarded to the AC. The AC then forwards the packets to the upper-layer network. Service packets and management packets can be forwarded normally only if the network between the AC and APs is added to the management VLAN and the network between the AC and upper-layer network is added to the service VLAN.
- In direct forwarding mode, service packets are not encapsulated into a CAPWAP tunnel, but are directly forwarded to the upper-layer network. Service packets and management packets can be forwarded normally only if the network between APs and upper-layer network is added to the service VLAN and the network between the AC and APs is added to the management VLAN.
- When configuring radio calibration, set the channel mode and power mode of an AP that needs radio calibration to auto.
- No ACK mechanism is provided for multicast packet transmission on air interfaces. In addition, wireless links are unstable. To ensure stable transmission of multicast packets, they are usually sent at low rates. If a large number of such multicast packets are sent from the network side, the air interfaces may be congested. You are advised to configure multicast packet suppression to reduce impact of a large number of low-rate multicast packets on the wireless network. Exercise caution when configuring the rate limit; otherwise, the multicast services may be affected.
- In direct forwarding mode, you are advised to configure multicast packet suppression on switch interfaces connected to APs.
- In tunnel forwarding mode, you are advised to configure multicast packet suppression in traffic profiles of the AC.
For applicable products and versions, see Quick Reference for WLAN AP Version Mapping and Models.
Networking Requirements
As shown in Figure 3-169, a large number of APs are deployed in an office building. The APs connect to the AC through Switch_A to provide wireless services for users.
Manually configuring radio parameters (such as the channel) for the APs one by one would be time-consuming. To simplify network deployment, the IT department requires that the AC automatically allocate channels to the APs based on radio environments.
The following uses an AC running V200R009C00 as an example. The key configurations vary in different versions. For details, see the Command Reference in the actual version.
Data Planning
Item |
Data |
---|---|
DHCP server |
The AC functions as a DHCP server to assign IP addresses to APs and STAs. |
IP address pool for the APs |
10.23.100.2-10.23.100.254/24 |
IP address pool for STAs |
10.23.101.2-10.23.101.254/24 |
IP address of the AC's source interface |
VLANIF 100: 10.23.100.1/24 |
AP group |
|
Regulatory domain profile |
|
SSID profile |
|
Security profile |
|
VAP profile |
|
5G radio profile |
|
2G radio profile |
|
RRM profile |
Name: wlan-net |
Air scan profile |
|
Configuration Roadmap
- Configure the APs, AC, and upper-layer devices to communicate with each other.
- Configure the AC as a DHCP server to assign IP addresses to APs and STAs.
- Configure a VLAN pool for service VLANs.
- Configure the APs to go online.
- Create an AP group to allow for the unified configuration of multiple APs.
- Configure AC system parameters, including the country code and source interface used by the AC to communicate with the APs.
- Configure the AP authentication mode and import the APs offline to allow the APs to go online.
- Configure WLAN service parameters for STAs to access the WLAN.
- Configure radio calibration so that the AC can automatically allocate the optimal working channels to the APs.
Procedure
- Set the NAC mode to unified mode on the AC (default setting). Configure SwitchA and the AC to allow the APs and AC to transmit CAPWAP packets.
# Add GE0/0/1, GE0/0/2, and GE0/0/3 on SwitchA to VLAN 100 (management VLAN).
<HUAWEI> system-view [HUAWEI] sysname SwitchA [SwitchA] vlan batch 100 [SwitchA] interface gigabitethernet 0/0/1 [SwitchA-GigabitEthernet0/0/1] port link-type trunk [SwitchA-GigabitEthernet0/0/1] port trunk pvid vlan 100 [SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 [SwitchA-GigabitEthernet0/0/1] undo port trunk allow-pass vlan 1 [SwitchA-GigabitEthernet0/0/1] stp edged-port enable [SwitchA-GigabitEthernet0/0/1] port-isolate enable [SwitchA-GigabitEthernet0/0/1] quit [SwitchA] interface gigabitethernet 0/0/2 [SwitchA-GigabitEthernet0/0/2] port link-type trunk [SwitchA-GigabitEthernet0/0/2] port trunk pvid vlan 100 [SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 [SwitchA-GigabitEthernet0/0/2] undo port trunk allow-pass vlan 1 [SwitchA-GigabitEthernet0/0/2] stp edged-port enable [SwitchA-GigabitEthernet0/0/3] port-isolate enable [SwitchA-GigabitEthernet0/0/2] quit [SwitchA] interface gigabitethernet 0/0/3 [SwitchA-GigabitEthernet0/0/3] port link-type trunk [SwitchA-GigabitEthernet0/0/3] port trunk pvid vlan 100 [SwitchA-GigabitEthernet0/0/3] port trunk allow-pass vlan 100 [SwitchA-GigabitEthernet0/0/3] undo port trunk allow-pass vlan 1 [SwitchA-GigabitEthernet0/0/3] stp edged-port enable [SwitchA-GigabitEthernet0/0/3] port-isolate enable [SwitchA-GigabitEthernet0/0/3] quit
# Add GE0/0/4 that connects the SwitchA to the AC to VLAN 100.
[SwitchA] interface gigabitethernet 0/0/4 [SwitchA-GigabitEthernet0/0/4] port link-type trunk [SwitchA-GigabitEthernet0/0/4] port trunk allow-pass vlan 100 [SwitchA-GigabitEthernet0/0/4] undo port trunk allow-pass vlan 1 [SwitchA-GigabitEthernet0/0/4] quit
# Add GE1/0/1 that connects the AC to SwitchA to VLAN 100.
[HUAWEI] sysname AC [AC] vlan batch 100 101 [AC] interface gigabitethernet 1/0/1 [AC-GigabitEthernet1/0/1] port link-type trunk [AC-GigabitEthernet1/0/1] port trunk allow-pass vlan 100 [AC-GigabitEthernet1/0/1] undo port trunk allow-pass vlan 1 [AC-GigabitEthernet1/0/1] quit
- Configure the AC to communicate with the upstream device.
Configure AC uplink interfaces to transparently transmit service VLAN packets as required and communicate with the upstream device.
# Add AC uplink interface GE1/0/2 to service VLAN 101.
[AC] interface gigabitethernet 1/0/2 [AC-GigabitEthernet1/0/2] port link-type trunk [AC-GigabitEthernet1/0/2] port trunk allow-pass vlan 101 [AC-GigabitEthernet1/0/2] undo port trunk allow-pass vlan 1 [AC-GigabitEthernet1/0/2] quit
- Configure the AC as a DHCP server to allocate IP addresses to STAs and the AP.
# Configure the AC as the DHCP server to allocate an IP address to the AP from the IP address pool on VLANIF 100, and allocate IP addresses to STAs from the IP address pool on VLANIF 101.
Configure the DNS server as required. The common methods are as follows:- In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8> command in the VLANIF interface view.
- In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP address pool view.
[AC] dhcp enable //Enable the DHCP function. [AC] interface vlanif 100 [AC-Vlanif100] ip address 10.23.100.1 24 [AC-Vlanif100] dhcp select interface //Configure an interface-based address pool. [AC-Vlanif100] quit [AC] interface vlanif 101 [AC-Vlanif101] ip address 10.23.101.1 24 [AC-Vlanif101] dhcp select interface [AC-Vlanif101] quit
- Configure the APs to go online.
# Create an AP group.
[AC] wlan [AC-wlan-view] ap-group name ap-group1 [AC-wlan-ap-group-ap-group1] quit
# Create a regulatory domain profile, configure the AC country code in the profile, and apply the profile to the AP group.
[AC-wlan-view] regulatory-domain-profile name domain1 [AC-wlan-regulate-domain-domain1] country-code cn [AC-wlan-regulate-domain-domain1] quit [AC-wlan-view] ap-group name ap-group1 [AC-wlan-ap-group-ap-group1] regulatory-domain-profile domain1 Warning: This configuration change will clear the channel and power configurations of radios, and may restart APs. Continue?[Y/N]:y [AC-wlan-ap-group-ap-group1] quit [AC-wlan-view] quit
# Configure the AC's source interface.
[AC] capwap source interface vlanif 100
# Import APs offline on the WLAN AC and add APs area_1 and area_2 to AP group ap-group1. Configure a name for the AP based on the AP's deployment location, so that you can know where the AP is deployed from its name. For example, name the AP area_1 if it is deployed in area 1.The default AP authentication mode is MAC address authentication. If the default settings are retained, you do not need to run the ap auth-mode mac-auth command.
Each AP used in this example has two radios: radio 0 (2.4 GHz radio) and radio 1 (5 GHz radio).
[AC] wlan [AC-wlan-view] ap auth-mode mac-auth [AC-wlan-view] ap-id 0 ap-mac 00e0-fc76-e360 [AC-wlan-ap-0] ap-name area_1 [AC-wlan-ap-0] ap-group ap-group1 Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power and antenna gain configuration s of the radio, Whether to continue? [Y/N]:y [AC-wlan-ap-0] quit [AC-wlan-view] ap-id 1 ap-mac 00e0-fc74-9640 [AC-wlan-ap-1] ap-name area_2 [AC-wlan-ap-1] ap-group ap-group1 Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power and antenna gain configuration s of the radio, Whether to continue? [Y/N]:y [AC-wlan-ap-1] quit
# Power on the APs and run the display ap all command to check the AP state. If the State field is nor, the APs have gone online.
[AC-wlan-view] display ap all Total AP information: nor : normal [2] --------------------------------------------------------------------------------------- ID MAC Name Group IP Type State STA Uptime --------------------------------------------------------------------------------------- 0 00e0-fc76-e360 area_1 ap-group1 10.23.101.253 AP5030DN nor 0 5M:2S 1 00e0-fc74-9640 area_2 ap-group1 10.23.101.254 AP5030DN nor 0 5M:4S --------------------------------------------------------------------------------------- Total: 2
- Configure WLAN service parameters.# Create security profile wlan-security and set the security policy in the profile.
In this example, the security policy is set to WPA2+PSK+AES and password to YsHsjx_202206. In actual situations, the security policy must be configured according to service requirements.
[AC-wlan-view] security-profile name wlan-security [AC-wlan-sec-prof-wlan-security] security wpa2 psk pass-phrase YsHsjx_202206 aes //Configure security policy WPA2+PSK+AES. [AC-wlan-sec-prof-wlan-security] quit
# Create SSID profile wlan-ssid and set the SSID name to wlan-net.
[AC-wlan-view] ssid-profile name wlan-ssid [AC-wlan-ssid-prof-wlan-ssid] ssid wlan-net //Set the SSID to wlan-net. [AC-wlan-ssid-prof-wlan-ssid] quit
# Create VAP profile wlan-vap, set the data forwarding mode and service VLAN, and apply the security profile and SSID profile to the VAP profile.
[AC-wlan-view] vap-profile name wlan-vap [AC-wlan-vap-prof-wlan-vap] forward-mode tunnel //Set the service forwarding mode to tunnel. [AC-wlan-vap-prof-wlan-vap] service-vlan vlan-id 101 //Set the VLAN ID to 101. By default, the VLAN ID is 1. [AC-wlan-vap-prof-wlan-vap] security-profile wlan-security [AC-wlan-vap-prof-wlan-vap] ssid-profile wlan-ssid [AC-wlan-vap-prof-wlan-vap] quit
# Bind VAP profile wlan-vap to the AP group and apply the profile to radio 0 and radio 1 of the AP.
[AC-wlan-view] ap-group name ap-group1 [AC-wlan-ap-group-ap-group1] vap-profile wlan-vap wlan 1 radio 0 [AC-wlan-ap-group-ap-group1] vap-profile wlan-vap wlan 1 radio 1 [AC-wlan-ap-group-ap-group1] quit
- Configure radio calibration.
# Create the RRM profile wlan-net and enable automatic channel selection and automatic transmit power selection in the RRM profile. By default, automatic channel selection and automatic transmit power selection are enabled.
[AC-wlan-view] rrm-profile name wlan-net [AC-wlan-rrm-prof-wlan-net] undo calibrate auto-channel-select disable [AC-wlan-rrm-prof-wlan-net] undo calibrate auto-txpower-select disable [AC-wlan-rrm-prof-wlan-net] quit
In V200R012 and later versions, the commands for configuring the channel selection and transmit power selection modes are executed in the AP group radio view or AP radio view instead of in the RRM profile view. For example, run the following commands to set the channel and transmit power selection modes of radio 0 of APs in AP group 1 to automatic:
[AC-wlan-view] ap-group name ap-group1 [AC-wlan-ap-group-ap-group1] radio 0 [AC-wlan-group-radio-ap-group1/0] undo calibrate auto-channel-select disable [AC-wlan-group-radio-ap-group1/0] undo calibrate auto-txpower-select disable [AC-wlan-group-radio-ap-group1/0] quit
In V200R019C00 and later versions, the format of commands for configuring the channel and transmit power selection modes is changed as follows:
[AC-wlan-view] ap-group name ap-group1 [AC-wlan-ap-group-ap-group1] radio 0 [AC-wlan-group-radio-ap-group1/0] calibrate auto-channel-select enable [AC-wlan-group-radio-ap-group1/0] calibrate auto-txpower-select enable [AC-wlan-group-radio-ap-group1/0] quit
# Create the air scan profile wlan-airscan and configure the scan channel set, scan interval, and scan duration. By default, an air scan channel set contains all channels supported by the corresponding country code of an AP.
[AC-wlan-view] air-scan-profile name wlan-airscan [AC-wlan-air-scan-prof-wlan-airscan] scan-channel-set country-channel [AC-wlan-air-scan-prof-wlan-airscan] scan-period 80 [AC-wlan-air-scan-prof-wlan-airscan] scan-interval 80000 [AC-wlan-air-scan-prof-wlan-airscan] quit
# Create the 2G radio profile radio2g and bind the RRM profile wlan-net and air scan profile wlan-airscan to the 2G radio profile.
[AC-wlan-view] radio-2g-profile name radio2g [AC-wlan-radio-2g-prof-radio2g] rrm-profile wlan-net [AC-wlan-radio-2g-prof-radio2g] air-scan-profile wlan-airscan [AC-wlan-radio-2g-prof-radio2g] quit
# Create the 5G radio profile radio5g and bind the RRM profile wlan-net and air scan profile wlan-airscan to the 5G radio profile.
[AC-wlan-view] radio-5g-profile name radio5g [AC-wlan-radio-5g-prof-radio5g] rrm-profile wlan-net [AC-wlan-radio-5g-prof-radio5g] air-scan-profile wlan-airscan [AC-wlan-radio-5g-prof-radio5g] quit
# Bind the 5G radio profile radio5g and 2G radio profile radio2g to the AP group ap-group1.
[AC-wlan-view] ap-group name ap-group1 [AC-wlan-ap-group-ap-group1] radio-5g-profile radio5g // //In V200R010C00 and later versions, you need to specify the radio ID using the radio-5g-profile radio5g radio 1 command. [AC-wlan-ap-group-ap-group1] radio-2g-profile radio2g //In V200R010C00 and later versions, you need to specify the radio ID using the radio-2g-profile radio2g radio 0 command. [AC-wlan-ap-group-ap-group1] quit
# Set the radio calibration mode to schedule, configure the AC to start radio calibration at 3:00 a.m. every day.
[AC-wlan-view] calibrate enable schedule time 03:00:00
- Commit the configuration.
[AC-wlan-view] commit all Warning: Committing configuration may cause service interruption, continue?[Y/N]:y
- Verify the configuration.
Connect STAs to the WLAN with SSID wlan-net and enter the password YsHsjx_202206. Run the display station ssid wlan-net command on the AC. The command output shows that the STAs are connected to the WLAN wlan-net.
[AC-wlan-view] display station ssid wlan-net Rf/WLAN: Radio ID/WLAN ID Rx/Tx: link receive rate/link transmit rate(Mbps) ---------------------------------------------------------------------------------------- STA MAC AP ID Ap name Rf/WLAN Band Type Rx/Tx RSSI VLAN IP address ---------------------------------------------------------------------------------------- 00e0-fc00-0001 0 area_1 0/1 2.4G 11n 65/38 -29 101 10.23.101.253 00e0-fc00-0002 1 area_2 0/1 2.4G 11n 78/43 -33 101 10.23.101.254 ---------------------------------------------------------------------------------------- Total: 2 2.4G: 2 5G: 0
# Run the display radio all command on the AC to check radio calibration results.
[AC-wlan-view] display radio all CH/BW:Channel/Bandwidth CE:Current EIRP (dBm) ME:Max EIRP (dBm) CU:Channel utilization ST:Status ---------------------------------------------------------------------- AP ID Name RfID Band Type ST CH/BW CE/ME STA CU ---------------------------------------------------------------------- 1 area_2 0 2.4G bgn on 1/20M 28/28 1 10% 1 area_2 1 5G an on 149/20M 29/29 0 15% 0 area_1 0 2.4G bgn on 6/20M 28/28 1 15% 0 area_1 1 5G an on 153/20M 29/29 0 49% ---------------------------------------------------------------------- Total:4
- # Radio calibration is complete half an hour after the radio calibration is manually triggered. The following configuration steps are not provided in the configuration file. After that, you can perform either of the configurations:
(Recommended) Set the radio calibration mode to scheduled. Configure the APs to perform radio calibration in off-peak hours, for example, between 00:00 am and 06:00 am.
[AC-wlan-view] calibrate enable schedule time 03:00:00 [AC-wlan-view] commit all Warning: Committing configuration may cause service interruption, continue?[Y/N]:y
Manually fix the working channels of APs: disable automatic channel selection and automatic transmit power selection in the RRM profile. Manually trigger radio calibration when new APs are added to the network.
[AC-wlan-view] rrm-profile name wlan-net [AC-wlan-rrm-prof-wlan-net] calibrate auto-channel-select disable [AC-wlan-rrm-prof-wlan-net] calibrate auto-txpower-select disable [AC-wlan-rrm-prof-wlan-net] quit [AC-wlan-view] calibrate enable manual [AC-wlan-view] calibrate manual startup [AC-wlan-view] commit all Warning: Committing configuration may cause service interruption, continue?[Y/N]:y
In V200R012 and later versions, the commands for configuring the channel selection and transmit power selection modes are executed in the AP group radio view or AP radio view instead of in the RRM profile view. For example, run the following commands to set the channel and transmit power selection modes of radio 0 of APs in AP group 1 to fixed:
[AC-wlan-view] ap-group name ap-group1 [AC-wlan-ap-group-ap-group1] radio 0 [AC-wlan-group-radio-ap-group1/0] calibrate auto-channel-select disable [AC-wlan-group-radio-ap-group1/0] calibrate auto-txpower-select disable [AC-wlan-group-radio-ap-group1/0] quit
Configuration Files
SwitchA configuration file
# sysname SwitchA # vlan batch 100 # interface gigabitethernet0/0/1 port link-type trunk port trunk pvid vlan 100 undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 100 stp edged-port enable port-isolate enable group 1 # interface gigabitethernet0/0/2 port link-type trunk port trunk pvid vlan 100 undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 100 stp edged-port enable port-isolate enable group 1 # interface gigabitethernet0/0/3 port link-type trunk port trunk pvid vlan 100 undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 100 stp edged-port enable port-isolate enable group 1 # interface gigabitethernet0/0/4 port link-type trunk undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 100 # return
AC configuration file
# sysname AC # vlan batch 100 to 101 # dhcp enable # interface Vlanif100 ip address 10.23.100.1 255.255.255.0 dhcp select interface # interface Vlanif101 ip address 10.23.101.1 255.255.255.0 dhcp select interface # interface GigabitEthernet1/0/1 port link-type trunk port trunk allow-pass vlan 100 undo port trunk allow-pass vlan 1 # interface GigabitEthernet1/0/2 port link-type trunk undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 101 # capwap source interface vlanif100 # wlan calibrate enable schedule time 03:00:00 security-profile name wlan-security security wpa2 psk pass-phrase %^%#m"tz0f>~7.[`^6RWdzwCy16hJj/Mc!,}s`X*B]}A%^%# aes ssid-profile name wlan-ssid ssid wlan-net vap-profile name wlan-vap forward-mode tunnel service-vlan vlan-id 101 ssid-profile wlan-ssid security-profile wlan-security regulatory-domain-profile name domain1 air-scan-profile name wlan-airscan scan-period 80 scan-interval 80000 rrm-profile name wlan-net radio-2g-profile name radio2g rrm-profile wlan-net air-scan-profile wlan-airscan radio-5g-profile name radio5g rrm-profile wlan-net air-scan-profile wlan-airscan ap-group name ap-group1 regulatory-domain-profile domain1 radio 0 radio-2g-profile radio2g radio-5g-profile radio5g vap-profile wlan-vap wlan 1 radio 1 radio-5g-profile radio5g vap-profile wlan-vap wlan 1 ap-id 0 type-id 35 ap-mac 00e0-fc76-e360 ap-sn 210235554710CB000042 ap-name area_1 ap-group ap-group1 ap-id 1 type-id 35 ap-mac 00e0-fc74-9640 ap-sn 210235554710CB000078 ap-name area_2 ap-group ap-group1 # return
Example for Configuring Static Load Balancing
Static Load Balancing Overview
Load balancing can evenly distribute AP traffic loads to ensure sufficient bandwidth for each STA and to prevent a heavy load on a single AP. In static load balancing, APs are manually added to a load balancing group. When a STA wants to connect to an AP in this load balancing group, the AC uses a load balancing algorithm to determine whether to allow the STA to connect to the AP. If the connection is not allowed, the STA connects to a different AP with a lighter load.
Static load balancing can be used in scenarios such as conference rooms. For example, if two APs are deployed in a conference room, you can add the two APs to a load balancing group to prevent heavy load on a single AP.
Configuration Notes
For details about common WLAN configuration notes, see General Precautions for WLAN. For more deployment and configuration suggestions, see Wireless Network Deployment and Configuration Suggestions.
AP load balancing is not recommended.
After AP load balancing is configured, APs in the load balancing group forward received Probe packets to the AC. The AC then determines the APs from which STAs can access the WLAN. Too many Probe packets may degrade AC performance. Therefore, it is recommended that the AP load balancing function be disabled, unless otherwise required.
From V200R011C10, WLAN configurations are automatically delivered, without the need of running the commit all command.
In this example, the security policy is WPA2-PSK-AES. To ensure network security, choose an appropriate security policy according to your network configurations.
In tunnel forwarding mode, the management VLAN and service VLAN cannot be the same. If you set the forwarding mode to direct forwarding, you are not advised to configure the management VLAN and service VLAN to be the same.
In direct forwarding mode, configure port isolation on the interface directly connected to APs. If port isolation is not configured, many broadcast packets will be transmitted in the VLANs or WLAN users on different APs can directly communicate at Layer 2.
- Configure the management VLAN and service VLAN:
- In tunnel forwarding mode, service packets are encapsulated in a CAPWAP tunnel and forwarded to the AC. The AC then forwards the packets to the upper-layer network. Service packets and management packets can be forwarded normally only if the network between the AC and APs is added to the management VLAN and the network between the AC and upper-layer network is added to the service VLAN.
- In direct forwarding mode, service packets are not encapsulated into a CAPWAP tunnel, but are directly forwarded to the upper-layer network. Service packets and management packets can be forwarded normally only if the network between APs and upper-layer network is added to the service VLAN and the network between the AC and APs is added to the management VLAN.
- Each load balancing group supports a maximum of three APs.
- A load balancing group is a set of radios, and each radio can join only one load balancing group. If dual-band APs are used, traffic is load balanced among APs working on the same frequency band. That is, a dual-band AP can join two load balancing groups.
- All APs in a load balancing group work on the same frequency band (2.4 GHz or 5 GHz). AP radios in a load balancing group must have different channels configured and work on different channels.
- No ACK mechanism is provided for multicast packet transmission on air interfaces. In addition, wireless links are unstable. To ensure stable transmission of multicast packets, they are usually sent at low rates. If a large number of such multicast packets are sent from the network side, the air interfaces may be congested. You are advised to configure multicast packet suppression to reduce impact of a large number of low-rate multicast packets on the wireless network. Exercise caution when configuring the rate limit; otherwise, the multicast services may be affected.
- In direct forwarding mode, you are advised to configure multicast packet suppression on switch interfaces connected to APs.
- In tunnel forwarding mode, you are advised to configure multicast packet suppression in traffic profiles of the AC.
For applicable products and versions, see Quick Reference for WLAN AP Version Mapping and Models.
Networking Requirements
As shown in Figure 3-170, the AC connects to the upper layer network and manages the APs through the access and aggregation switches.
AP area_1 and AP area_2 are deployed in the same conference room. Traffic must be balanced on AP radios to prevent one AP radio from being heavily loaded.
The following uses an AC running V200R009C00 as an example. The key configurations vary in different versions. For details, see the Command Reference in the actual version.
Data Planning
Item |
Data |
---|---|
DHCP server |
The AC functions as the DHCP server to assign IP addresses to the APs and STAs. |
IP address pool for the APs |
10.23.100.2-10.23.100.254/24 |
IP address pool for the STAs |
10.23.101.2-10.23.101.254/24 |
IP address of the AC's source interface |
VLANIF 100: 10.23.100.1/24 |
AP group |
|
Regulatory domain profile |
|
SSID profile |
|
Security profile |
|
VAP profile |
|
Static load balancing group |
|
Configuration Roadmap
- Configure the APs, AC, and upper-layer devices to communicate with each other.
- Configure the AC as a DHCP server to assign IP addresses to APs and STAs.
- Configure a VLAN pool for service VLANs.
- Configure the APs to go online.
- Create an AP group and add APs that require the same configuration to the group for unified configuration.
- Configure AC system parameters, including the country code and source interface used by the AC to communicate with the APs.
- Configure the AP authentication mode and import the APs offline to allow the APs to go online.
- Configure WLAN service parameters for STAs to access the WLAN.
- Configure static load balancing to prevent one AP from being heavily loaded.
During AP deployment, you can manually specify the working channels of the APs according to network planning or configure the radio calibration function to enable the APs to automatically select the optimal channels. This example configures the radio calibration function.
Procedure
- Set the NAC mode to unified mode on the AC (default setting). Configure SwitchA and the AC to allow the AP and AC to transmit CAPWAP packets.
# Add GE0/0/1 to GE0/0/3 on SwitchA to the management VLAN 100.
<HUAWEI> system-view [HUAWEI] sysname SwitchA [SwitchA] vlan batch 100 [SwitchA] interface gigabitethernet 0/0/1 [SwitchA-GigabitEthernet0/0/1] port link-type trunk [SwitchA-GigabitEthernet0/0/1] port trunk pvid vlan 100 [SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 [SwitchA-GigabitEthernet0/0/1] undo port trunk allow-pass vlan 1 [SwitchA-GigabitEthernet0/0/1] stp edged-port enable [SwitchA-GigabitEthernet0/0/1] port-isolate enable [SwitchA-GigabitEthernet0/0/1] quit [SwitchA] interface gigabitethernet 0/0/2 [SwitchA-GigabitEthernet0/0/2] port link-type trunk [SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 [SwitchA-GigabitEthernet0/0/2] undo port trunk allow-pass vlan 1 [SwitchA-GigabitEthernet0/0/2] quit [SwitchA] interface gigabitethernet 0/0/3 [SwitchA-gigabitethernet0/0/3] port link-type trunk [SwitchA-GigabitEthernet0/0/3] port trunk pvid vlan 100 [SwitchA-gigabitethernet0/0/3] port trunk allow-pass vlan 100 [SwitchA-GigabitEthernet0/0/3] undo port trunk allow-pass vlan 1 [SwitchA-GigabitEthernet0/0/3] stp edged-port enable [SwitchA-GigabitEthernet0/0/3] port-isolate enable [SwitchA-gigabitethernet0/0/3] quit
# Add GE1/0/1 that connects the AC to SwitchA to VLAN 100.
<HUAWEI> system-view [HUAWEI] sysname AC [AC] vlan batch 100 [AC] interface gigabitethernet 1/0/1 [AC-GigabitEthernet1/0/1] port link-type trunk [AC-GigabitEthernet1/0/1] port trunk allow-pass vlan 100 [AC-GigabitEthernet1/0/1] undo port trunk allow-pass vlan 1 [AC-GigabitEthernet1/0/1] quit
- Configure the AC to communicate with the upstream device.
# Configure VLANIF 101 (service VLAN) and VLANIF 102.
[AC] vlan batch 101 102 [AC] interface vlanif 101 [AC-Vlanif101] ip address 10.23.101.1 24 [AC-Vlanif101] quit [AC] interface vlanif 102 [AC-Vlanif102] ip address 10.23.102.2 24 [AC-Vlanif102] quit
# Configure a default route on the AC.
[AC] ip route-static 0.0.0.0 0.0.0.0 10.23.102.1 //Configure a default route destined for Router.
# Add GE1/0/2 that connects the AC to the Router to VLAN 102.
[AC] interface gigabitethernet 1/0/2 [AC-GigabitEthernet1/0/2] port link-type trunk [AC-GigabitEthernet1/0/2] port trunk allow-pass vlan 102 [AC-GigabitEthernet1/0/2] undo port trunk allow-pass vlan 1 [AC-GigabitEthernet1/0/2] quit
- Configure the AC to assign an IP address to the AP and configure the Router to assign IP addresses to STAs.
# Configure the AC to assign an IP address to the AP from an interface IP address pool.
[AC] dhcp enable [AC] interface vlanif 100 [AC-Vlanif100] ip address 10.23.100.1 24 [AC-Vlanif100] dhcp select interface //Configure an interface-based address pool. [AC-Vlanif100] quit
# Configure the AC as the DHCP relay agent and enable user entry detection on the AC.
[AC] interface vlanif 101 [AC-Vlanif101] dhcp select relay //Configure the DHCP relay function. [AC-Vlanif101] dhcp relay server-ip 10.23.102.1 //Set the DHCP server address for DHCP relay to 10.23.102.1, which resides on Router. [AC-Vlanif101] quit
# Configure the Router as a DHCP server to assign IP addresses to STAs.
Configure the DNS server as required. The common methods are as follows:- In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8> command in the VLANIF interface view.
- In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP address pool view.
<Huawei> system-view [Huawei] sysname Router [Router] dhcp enable [Router] ip pool sta //Configure the address pool to assign IP addresses to STAs. [Router-ip-pool-sta] gateway-list 10.23.101.1 [Router-ip-pool-sta] network 10.23.101.0 mask 24 [Router-ip-pool-sta] quit [Router] vlan batch 102 [Router] interface vlanif 102 [Router-Vlanif102] ip address 10.23.102.1 24 [Router-Vlanif102] dhcp select global //Configure a global address pool. [Router-Vlanif102] quit [Router] interface gigabitethernet 2/0/0 [Router-GigabitEthernet2/0/0] port link-type trunk [Router-GigabitEthernet2/0/0] port trunk allow-pass vlan 102 [Router-GigabitEthernet2/0/0] undo port trunk allow-pass vlan 1 [Router-GigabitEthernet2/0/0] quit [Router] ip route-static 10.23.101.0 24 10.23.102.2 //Configure a route on the Router destined for the network segment 10.23.101.0/24.
- Configure the APs to go online.
# Create an AP group.
[AC] wlan [AC-wlan-view] ap-group name ap-group1 [AC-wlan-ap-group-ap-group1] quit
# Create a regulatory domain profile, configure the AC country code in the profile, and apply the profile to the AP group.
[AC-wlan-view] regulatory-domain-profile name domain1 [AC-wlan-regulate-domain-domain1] country-code cn [AC-wlan-regulate-domain-domain1] quit [AC-wlan-view] ap-group name ap-group1 [AC-wlan-ap-group-ap-group1] regulatory-domain-profile domain1 Warning: This configuration change will clear the channel and power configurations of radios, and may restart APs. Continue?[Y/N]:y [AC-wlan-ap-group-ap-group1] quit [AC-wlan-view] quit
# Configure the AC's source interface.
[AC] capwap source interface vlanif 100
# Import APs offline on the WLAN AC and add APs area_1 and area_2 to AP group ap-group1. Configure a name for the AP based on the AP's deployment location, so that you can know where the AP is deployed from its name. For example, name the AP area_1 if it is deployed in area 1.The default AP authentication mode is MAC address authentication. If the default settings are retained, you do not need to run the ap auth-mode mac-auth command.
Each AP used in this example has two radios: radio 0 (2.4 GHz radio) and radio 1 (5 GHz radio).
[AC] wlan [AC-wlan-view] ap auth-mode mac-auth [AC-wlan-view] ap-id 0 ap-mac 00e0-fc76-e360 [AC-wlan-ap-0] ap-name area_1 [AC-wlan-ap-0] ap-group ap-group1 Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power and antenna gain configuration s of the radio, Whether to continue? [Y/N]:y [AC-wlan-ap-0] quit [AC-wlan-view] ap-id 1 ap-mac 00e0-fc74-9640 [AC-wlan-ap-1] ap-name area_2 [AC-wlan-ap-1] ap-group ap-group1 Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power and antenna gain configuration s of the radio, Whether to continue? [Y/N]:y [AC-wlan-ap-1] quit
# Power on the APs and run the display ap all command to check the AP state. If the State field is nor, the APs have gone online.
[AC-wlan-view] display ap all Total AP information: nor : normal [2] --------------------------------------------------------------------------------------- ID MAC Name Group IP Type State STA Uptime --------------------------------------------------------------------------------------- 0 00e0-fc76-e360 area_1 ap-group1 10.23.101.253 AP5030DN nor 0 5M:2S 1 00e0-fc74-9640 area_2 ap-group1 10.23.101.254 AP5030DN nor 0 5M:4S --------------------------------------------------------------------------------------- Total: 2
- Configure WLAN service parameters.# Create security profile wlan-security and set the security policy in the profile.
In this example, the security policy is set to WPA2+PSK+AES and password to YsHsjx_202206. In actual situations, the security policy must be configured according to service requirements.
[AC-wlan-view] security-profile name wlan-security [AC-wlan-sec-prof-wlan-security] security wpa2 psk pass-phrase YsHsjx_202206 aes //Configure security policy WPA2+PSK+AES. [AC-wlan-sec-prof-wlan-security] quit
# Create SSID profile wlan-ssid and set the SSID name to wlan-net.
[AC-wlan-view] ssid-profile name wlan-ssid [AC-wlan-ssid-prof-wlan-ssid] ssid wlan-net //Set the SSID to wlan-net. [AC-wlan-ssid-prof-wlan-ssid] quit
# Create VAP profile wlan-vap, set the data forwarding mode and service VLAN, and apply the security profile and SSID profile to the VAP profile.
[AC-wlan-view] vap-profile name wlan-vap [AC-wlan-vap-prof-wlan-vap] forward-mode tunnel //Set the service forwarding mode to tunnel. [AC-wlan-vap-prof-wlan-vap] service-vlan vlan-id 101 //Set the VLAN ID to 101. By default, the VLAN ID is 1. [AC-wlan-vap-prof-wlan-vap] security-profile wlan-security [AC-wlan-vap-prof-wlan-vap] ssid-profile wlan-ssid [AC-wlan-vap-prof-wlan-vap] quit
# Bind VAP profile wlan-vap to the AP group and apply the profile to radio 0 and radio 1 of the AP.
[AC-wlan-view] ap-group name ap-group1 [AC-wlan-ap-group-ap-group1] vap-profile wlan-vap wlan 1 radio 0 [AC-wlan-ap-group-ap-group1] vap-profile wlan-vap wlan 1 radio 1 [AC-wlan-ap-group-ap-group1] quit
- Configure static load balancing.
# Create the static load balancing group and set the start threshold for static load balancing to 15 and the load difference threshold to 25%.
[AC-wlan-view] sta-load-balance static-group name wlan-static //Create load balancing group wlan-static. [AC-wlan-sta-lb-static-wlan-static] start-threshold 15 //Set the start threshold for load balancing (based on the number of users) to 15. The default value is 10. [AC-wlan-sta-lb-static-wlan-static] gap-threshold 25 //Set the load difference threshold for load balancing (based on the number of users) to 25%. The default value is 20%.
From V200R011C00 to V200R019C00, the device supports static load balancing based on channel usage. Configure static load balancing based on the number of users as follows:
[AC-wlan-view] sta-load-balance static-group name wlan-static [AC-wlan-sta-lb-static-wlan-static] mode sta-number //Configure static load balancing based on the number of users. By default, static load balancing based on the number of users is used. [AC-wlan-sta-lb-static-wlan-static] sta-number start-threshold 15 [AC-wlan-sta-lb-static-wlan-static] sta-number gap-threshold 25 //In V200R011C10 and later versions, the format is changed to sta-number gap-threshold percentage 25.
In V200R019C10 and later versions, the device does not support static load balancing based on channel usage. Configure static load balancing based on the number of users as follows:
[AC-wlan-view] sta-load-balance static-group name wlan-static [AC-wlan-sta-lb-static-wlan-static] sta-number start-threshold 15 [AC-wlan-sta-lb-static-wlan-static] sta-number gap-threshold percentage 25
# Add AP area_1 and AP area_2 to the static load balancing group.
[AC-wlan-sta-lb-static-wlan-static] member ap-name area_1 //Add AP area_1 to load balancing group wlan-static. [AC-wlan-sta-lb-static-wlan-static] member ap-name area_2 [AC-wlan-sta-lb-static-wlan-static] quit
- Commit the configuration.
[AC-wlan-view] commit all Warning: Committing configuration may cause service interruption, continue?[Y/N]:y
- Verify the configuration.
Connect STAs to the WLAN with SSID wlan-net and enter the password YsHsjx_202206. Run the display station ssid wlan-net command on the AC. The command output shows that the STAs are connected to the WLAN wlan-net.
[AC-wlan-view] display station ssid wlan-net Rf/WLAN: Radio ID/WLAN ID Rx/Tx: link receive rate/link transmit rate(Mbps) ------------------------------------------------------------------------------------- STA MAC AP ID Ap name Rf/WLAN Band Type Rx/Tx RSSI VLAN IP address ------------------------------------------------------------------------------------- 00e0-fc00-0001 0 area_1 0/1 2.4G 11n 65/38 -29 101 10.23.101.253 00e0-fc00-0002 1 area_2 0/1 2.4G 11n 78/43 -33 101 10.23.101.254 ------------------------------------------------------------------------------------- Total: 2 2.4G: 2 5G: 0
Run the display sta-load-balance static-group name wlan-static command on the AC to check the static load balancing configuration.
[AC-wlan-view] display sta-load-balance static-group name wlan-static ------------------------------------------------------------ Group name : wlan-static Load-balance status : balance Start threshold : 15 Gap threshold(%) : 25 Deny threshold : 3 ------------------------------------------------------------ RfID: Radio ID CurEIRP: Current EIRP (dBm) Act CH: Actual channel, Cfg CH: Config channel ------------------------------------------------------------ AP ID AP Name RfID Act CH/Cfg CH CurEIRP/MaxEIRP Client ------------------------------------------------------------ 0 area_1 0 6/- 20/28 1 0 area_1 1 153/- 29/29 0 1 area_2 0 1/- 20/28 1 1 area_2 1 149/- 29/29 0 ------------------------------------------------------------ Total: 4
- When a new STA requests to connect to AP area_1, the AC uses a static load balancing algorithm to redirect the STA to a lightly loaded AP in the same load balancing group.
Configuration Files
SwitchA configuration file
# sysname SwitchA # vlan batch 100 # interface gigabitethernet0/0/1 port link-type trunk port trunk pvid vlan 100 undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 100 stp edged-port enable port-isolate enable group 1 # interface gigabitethernet0/0/2 port link-type trunk undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 100 # interface gigabitethernet0/0/3 port link-type trunk undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 100 stp edged-port enable port-isolate enable group 1 # return
Router configuration file
# sysname Router # vlan batch 102 # dhcp enable # ip pool sta gateway-list 10.23.101.1 network 10.23.101.0 mask 255.255.255.0 # interface Vlanif102 ip address 10.23.102.1 255.255.255.0 dhcp select global # interface GigabitEthernet2/0/0 port link-type trunk undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 102 # ip route-static 10.23.101.0 255.255.255.0 10.23.102.2 # return
AC configuration file
# sysname AC # vlan batch 100 to 102 # dhcp enable # interface Vlanif100 ip address 10.23.100.1 255.255.255.0 dhcp select interface # interface Vlanif101 ip address 10.23.101.1 255.255.255.0 dhcp select relay dhcp relay server-ip 10.23.102.1 # interface Vlanif102 ip address 10.23.102.2 255.255.255.0 # interface GigabitEthernet1/0/1 port link-type trunk undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 100 # interface GigabitEthernet1/0/2 port link-type trunk undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 102 # ip route-static 0.0.0.0 0.0.0.0 10.23.102.1 # capwap source interface vlanif100 # wlan security-profile name wlan-security security wpa2 psk pass-phrase %^%#m"tz0f>~7.[`^6RWdzwCy16hJj/Mc!,}s`X*B]}A%^%# aes ssid-profile name wlan-ssid ssid wlan-net vap-profile name wlan-vap forward-mode tunnel service-vlan vlan-id 101 ssid-profile wlan-ssid security-profile wlan-security sta-load-balance static-group name wlan-static gap-threshold 25 member ap-name area_1 radio 0 member ap-name area_1 radio 1 member ap-name area_2 radio 0 member ap-name area_2 radio 1 start-threshold 15 regulatory-domain-profile name domain1 ap-group name ap-group1 regulatory-domain-profile domain1 vap-profile wlan-vap wlan 1 radio 0 vap-profile wlan-vap wlan 1 radio 1 vap-profile wlan-vap wlan 1 ap-id 0 type-id 35 ap-mac 00e0-fc76-e360 ap-sn 210235554710CB000042 ap-name area_1 ap-group ap-group1 ap-id 1 type-id 35 ap-mac 00e0-fc74-9640 ap-sn 210235554710CB000078 ap-name area_2 ap-group ap-group1 # return
Example for Configuring Dynamic Load Balancing
Dynamic Load Balancing Overview
Load balancing can evenly distribute AP traffic loads to ensure sufficient bandwidth for each STA. When a STA joins the network, the AC adds the APs that report the STA to a load balancing group, and then uses a load balancing algorithm to determine whether to allow access from the STA.
Dynamic load balancing applies to high-density wireless environments, such as stadiums and stations.
Static load balancing supports a limited number of group members, and all members must be manually added to the group and work on the same frequency band. Dynamic load balancing overcomes these limitations and better ensures bandwidth for each STA.
Configuration Notes
For details about common WLAN configuration notes, see General Precautions for WLAN. For more deployment and configuration suggestions, see Wireless Network Deployment and Configuration Suggestions.
AP load balancing is not recommended.
After AP load balancing is configured, APs in the load balancing group forward received Probe packets to the AC. The AC then determines the APs from which STAs can access the WLAN. Too many Probe packets may degrade AC performance. Therefore, it is recommended that the AP load balancing function be disabled, unless otherwise required.
From V200R011C10, WLAN configurations are automatically delivered, without the need of running the commit all command.
In this example, the security policy is WPA2-PSK-AES. To ensure network security, choose an appropriate security policy according to your network configurations.
In tunnel forwarding mode, the management VLAN and service VLAN cannot be the same. If you set the forwarding mode to direct forwarding, you are not advised to configure the management VLAN and service VLAN to be the same.
In direct forwarding mode, configure port isolation on the interface directly connected to APs. If port isolation is not configured, many broadcast packets will be transmitted in the VLANs or WLAN users on different APs can directly communicate at Layer 2.
- Configure the management VLAN and service VLAN:
- In tunnel forwarding mode, service packets are encapsulated in a CAPWAP tunnel and forwarded to the AC. The AC then forwards the packets to the upper-layer network. Service packets and management packets can be forwarded normally only if the network between the AC and APs is added to the management VLAN and the network between the AC and upper-layer network is added to the service VLAN.
- In direct forwarding mode, service packets are not encapsulated into a CAPWAP tunnel, but are directly forwarded to the upper-layer network. Service packets and management packets can be forwarded normally only if the network between APs and upper-layer network is added to the service VLAN and the network between the AC and APs is added to the management VLAN.
- Radio traffic statistics packets are sent and received together with Echo packets. In this example, traffic-based dynamic load balancing is used. You are advised to set the CAPWAP heartbeat detection interval to between 30s and 60s so that the radio traffic statistics can be updated in a timely manner.
- No ACK mechanism is provided for multicast packet transmission on air interfaces. In addition, wireless links are unstable. To ensure stable transmission of multicast packets, they are usually sent at low rates. If a large number of such multicast packets are sent from the network side, the air interfaces may be congested. You are advised to configure multicast packet suppression to reduce impact of a large number of low-rate multicast packets on the wireless network. Exercise caution when configuring the rate limit; otherwise, the multicast services may be affected.
- In direct forwarding mode, you are advised to configure multicast packet suppression on switch interfaces connected to APs.
- In tunnel forwarding mode, you are advised to configure multicast packet suppression in traffic profiles of the AC.
For applicable products and versions, see Quick Reference for WLAN AP Version Mapping and Models.
Networking Requirements
As shown in Figure 3-171, the AC connects to the upper-layer network and manages the APs through the access and aggregation switches.
When a large number of STAs access the Internet through the same AP, the AP is heavily loaded, degrading user experience. The enterprise requires that data traffic be balanced on AP radios to prevent one AP radio from being heavily loaded.
Data Planning
Item |
Data |
---|---|
DHCP server |
The AC functions as a DHCP server to assign IP addresses to APs and STAs. |
IP address pool for the APs |
10.23.100.2-10.23.100.254/24 |
IP address pool for STAs |
10.23.101.2-10.23.101.254/24 |
IP address of the AC's source interface |
VLANIF 100: 10.23.100.1/24 |
AP group |
|
Regulatory domain profile |
|
SSID profile |
|
Security profile |
|
VAP profile |
|
5G radio profile |
|
2G radio profile |
|
RRM profile |
|
Configuration Roadmap
- Configure the APs, AC, and upper-layer devices to communicate with each other.
- Configure the AC as a DHCP server to assign IP addresses to the APs from an interface IP address pool, configure the AC as a DHCP relay agent, and configure the Router connected to the AC to assign IP addresses to STAs.
- Configure a VLAN pool for service VLANs.
- Configure the APs to go online.
- Create an AP group to allow for the unified configuration of multiple APs.
- Configure AC system parameters, including the country code and source interface used by the AC to communicate with the APs.
- Configure the AP authentication mode and import the APs offline to allow the APs to go online.
- Configure WLAN service parameters for STAs to access the WLAN.
- Configure dynamic load balancing to prevent one AP from being heavily loaded.
During AP deployment, you can manually specify the working channels of the APs according to network planning or configure the radio calibration function to enable the APs to automatically select the optimal channels. This example configures the radio calibration function.
Procedure
- Set the NAC mode to unified mode on the AC (default setting). Configure SwitchA and the AC to allow the AP and AC to transmit CAPWAP packets.
# Add GE0/0/1, GE0/0/2, and GE0/0/3 on SwitchA to VLAN 100 (management VLAN).
<HUAWEI> system-view [HUAWEI] sysname SwitchA [SwitchA] vlan batch 100 [SwitchA] interface gigabitethernet 0/0/1 [SwitchA-GigabitEthernet0/0/1] port link-type trunk [SwitchA-GigabitEthernet0/0/1] port trunk pvid vlan 100 [SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 [SwitchA-GigabitEthernet0/0/1] undo port trunk allow-pass vlan 1 [SwitchA-GigabitEthernet0/0/1] stp edged-port enable [SwitchA-GigabitEthernet0/0/1] port-isolate enable [SwitchA-GigabitEthernet0/0/1] quit [SwitchA] interface gigabitethernet 0/0/2 [SwitchA-GigabitEthernet0/0/2] port link-type trunk [SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 [SwitchA-GigabitEthernet0/0/2] undo port trunk allow-pass vlan 1 [SwitchA-GigabitEthernet0/0/2] quit [SwitchA] interface gigabitethernet 0/0/3 [SwitchA-gigabitethernet0/0/3] port link-type trunk [SwitchA-gigabitethernet0/0/3] port trunk allow-pass vlan 100 [SwitchA-GigabitEthernet0/0/3] undo port trunk allow-pass vlan 1 [SwitchA-GigabitEthernet0/0/3] stp edged-port enable [SwitchA-GigabitEthernet0/0/3] port-isolate enable [SwitchA-gigabitethernet0/0/3] quit
# Add GE1/0/1 that connects the AC to SwitchA to VLAN 100.
[HUAWEI] sysname AC [AC] vlan batch 100 [AC] interface gigabitethernet 1/0/1 [AC-GigabitEthernet1/0/1] port link-type trunk [AC-GigabitEthernet1/0/1] port trunk allow-pass vlan 100 [AC-GigabitEthernet1/0/1] undo port trunk allow-pass vlan 1 [AC-GigabitEthernet1/0/1] quit
- Configure the AC to communicate with the upstream device.
# Configure VLANIF 101 (service VLAN) and VLANIF 102.
[AC] vlan batch 101 102 [AC] interface vlanif 101 [AC-Vlanif101] ip address 10.23.101.1 24 [AC-Vlanif101] quit [AC] interface vlanif 102 [AC-Vlanif102] ip address 10.23.102.2 24 [AC-Vlanif102] quit
# Configure a default route on the AC.
[AC] ip route-static 0.0.0.0 0.0.0.0 10.23.102.1 //Configure a default route destined for Router.
# Add GE1/0/2 that connects the AC to the Router to VLAN 102.
[AC] interface gigabitethernet 1/0/2 [AC-GigabitEthernet1/0/2] port link-type trunk [AC-GigabitEthernet1/0/2] port trunk allow-pass vlan 102 [AC-GigabitEthernet1/0/2] undo port trunk allow-pass vlan 1 [AC-GigabitEthernet1/0/2] quit
- Configure the AC to assign an IP address to the AP and configure the Router to assign IP addresses to STAs.
# Configure the AC to assign an IP address to the AP from an interface IP address pool.
[AC] dhcp enable [AC] interface vlanif 100 [AC-Vlanif100] ip address 10.23.100.1 24 [AC-Vlanif100] dhcp select interface //Configure an interface-based address pool. [AC-Vlanif100] quit
# Configure the AC as the DHCP relay agent and enable user entry detection on the AC.
[AC] interface vlanif 101 [AC-Vlanif101] dhcp select relay //Configure the DHCP relay function. [AC-Vlanif101] dhcp relay server-ip 10.23.102.1 //Set the DHCP server address for DHCP relay to 10.23.102.1, which resides on Router. [AC-Vlanif101] quit
# Configure the Router as a DHCP server to assign IP addresses to STAs.
Configure the DNS server as required. The common methods are as follows:- In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8> command in the VLANIF interface view.
- In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP address pool view.
<Huawei> system-view [Huawei] sysname Router [Router] dhcp enable [Router] ip pool sta //Configure the address pool to assign IP addresses to STAs. [Router-ip-pool-sta] gateway-list 10.23.101.1 [Router-ip-pool-sta] network 10.23.101.0 mask 24 [Router-ip-pool-sta] quit [Router] vlan batch 102 [Router] interface vlanif 102 [Router-Vlanif102] ip address 10.23.102.1 24 [Router-Vlanif102] dhcp select global //Configure a global address pool. [Router-Vlanif102] quit [Router] interface gigabitethernet 2/0/0 [Router-GigabitEthernet2/0/0] port link-type trunk [Router-GigabitEthernet2/0/0] port trunk allow-pass vlan 102 [Router-GigabitEthernet2/0/0] undo port trunk allow-pass vlan 1 [Router-GigabitEthernet2/0/0] quit [Router] ip route-static 10.23.101.0 24 10.23.102.2 //Configure a route on the Router destined for the network segment 10.23.101.0/24.
- Configure the APs to go online.
# Create an AP group.
[AC] wlan [AC-wlan-view] ap-group name ap-group1 [AC-wlan-ap-group-ap-group1] quit
# Create a regulatory domain profile, configure the AC country code in the profile, and apply the profile to the AP group.
[AC-wlan-view] regulatory-domain-profile name domain1 [AC-wlan-regulate-domain-domain1] country-code cn [AC-wlan-regulate-domain-domain1] quit [AC-wlan-view] ap-group name ap-group1 [AC-wlan-ap-group-ap-group1] regulatory-domain-profile domain1 Warning: This configuration change will clear the channel and power configurations of radios, and may restart APs. Continue?[Y/N]:y [AC-wlan-ap-group-ap-group1] quit [AC-wlan-view] quit
# Configure the AC's source interface.
[AC] capwap source interface vlanif 100
# Import APs offline on the WLAN AC and add APs area_1 and area_2 to AP group ap-group1. Configure a name for the AP based on the AP's deployment location, so that you can know where the AP is deployed from its name. For example, name the AP area_1 if it is deployed in area 1.The default AP authentication mode is MAC address authentication. If the default settings are retained, you do not need to run the ap auth-mode mac-auth command.
Each AP used in this example has two radios: radio 0 (2.4 GHz radio) and radio 1 (5 GHz radio).
[AC] wlan [AC-wlan-view] ap auth-mode mac-auth [AC-wlan-view] ap-id 0 ap-mac 00e0-fc76-e360 [AC-wlan-ap-0] ap-name area_1 [AC-wlan-ap-0] ap-group ap-group1 Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power and antenna gain configuration s of the radio, Whether to continue? [Y/N]:y [AC-wlan-ap-0] quit [AC-wlan-view] ap-id 1 ap-mac 00e0-fc74-9640 [AC-wlan-ap-1] ap-name area_2 [AC-wlan-ap-1] ap-group ap-group1 Warning: This operation may cause AP reset. If the country code changes, it will clear channel, power and antenna gain configuration s of the radio, Whether to continue? [Y/N]:y [AC-wlan-ap-1] quit
# Power on the APs and run the display ap all command to check the AP state. If the State field is nor, the APs have gone online.
[AC-wlan-view] display ap all Total AP information: nor : normal [2] --------------------------------------------------------------------------------------- ID MAC Name Group IP Type State STA Uptime --------------------------------------------------------------------------------------- 0 00e0-fc76-e360 area_1 ap-group1 10.23.101.253 AP5030DN nor 0 5M:2S 1 00e0-fc74-9640 area_2 ap-group1 10.23.101.254 AP5030DN nor 0 5M:4S --------------------------------------------------------------------------------------- Total: 2
- Configure WLAN service parameters.# Create security profile wlan-security and set the security policy in the profile.
In this example, the security policy is set to WPA2+PSK+AES and password to YsHsjx_202206. In actual situations, the security policy must be configured according to service requirements.
[AC-wlan-view] security-profile name wlan-security [AC-wlan-sec-prof-wlan-security] security wpa2 psk pass-phrase YsHsjx_202206 aes //Configure security policy WPA2+PSK+AES. [AC-wlan-sec-prof-wlan-security] quit
# Create SSID profile wlan-ssid and set the SSID name to wlan-net.
[AC-wlan-view] ssid-profile name wlan-ssid [AC-wlan-ssid-prof-wlan-ssid] ssid wlan-net //Set the SSID to wlan-net. [AC-wlan-ssid-prof-wlan-ssid] quit
# Create VAP profile wlan-vap, set the data forwarding mode and service VLAN, and apply the security profile and SSID profile to the VAP profile.
[AC-wlan-view] vap-profile name wlan-vap [AC-wlan-vap-prof-wlan-vap] forward-mode tunnel //Set the service forwarding mode to tunnel. [AC-wlan-vap-prof-wlan-vap] service-vlan vlan-id 101 //Set the VLAN ID to 101. By default, the VLAN ID is 1. [AC-wlan-vap-prof-wlan-vap] security-profile wlan-security [AC-wlan-vap-prof-wlan-vap] ssid-profile wlan-ssid [AC-wlan-vap-prof-wlan-vap] quit
# Bind VAP profile wlan-vap to the AP group and apply the profile to radio 0 and radio 1 of the AP.
[AC-wlan-view] ap-group name ap-group1 [AC-wlan-ap-group-ap-group1] vap-profile wlan-vap wlan 1 radio 0 [AC-wlan-ap-group-ap-group1] vap-profile wlan-vap wlan 1 radio 1 [AC-wlan-ap-group-ap-group1] quit
- Configure dynamic load balancing.
# Create the RRM profile loadbalance-dynamic and enable dynamic load balancing in the RRM profile loadbalance-dynamic and set the start threshold for dynamic load balancing to 15 and load difference threshold to 25%.
[AC-wlan-view] rrm-profile name loadbalance-dynamic [AC-wlan-rrm-prof-loadbalance-dynamic] sta-load-balance dynamic enable [AC-wlan-rrm-prof-loadbalance-dynamic] sta-load-balance dynamic start-threshold 15 [AC-wlan-rrm-prof-loadbalance-dynamic] sta-load-balance dynamic gap-threshold 25 [AC-wlan-rrm-prof-loadbalance-dynamic] quit
From V200R011C00 to V200R019C00, the device supports dynamic load balancing based on channel utilization. Configure dynamic load balancing based on the number of STAs as follows:
[AC-wlan-view] rrm-profile name loadbalance-dynamic [AC-wlan-rrm-prof-loadbalance-dynamic] sta-load-balance dynamic enable //In V200R013C00 and later versions, the format is changed to undo sta-load-balance dynamic disable. [AC-wlan-rrm-prof-loadbalance-dynamic] sta-load-balance mode sta-number //Configure dynamic load balancing based on the number of STAs. [AC-wlan-rrm-prof-loadbalance-dynamic] sta-load-balance dynamic sta-number start-threshold 15 [AC-wlan-rrm-prof-loadbalance-dynamic] sta-load-balance dynamic sta-number gap-threshold 25 //The command changes to sta-load-balance dynamic sta-number gap-threshold percentage 25 in V200R011C10 and later versions. [AC-wlan-rrm-prof-loadbalance-dynamic] quit
In V200R019C10 and later versions, the device does not support dynamic load balancing based on channel utilization. Configure dynamic load balancing based on the number of STAs as follows:
[AC-wlan-view] rrm-profile name loadbalance-dynamic [AC-wlan-rrm-prof-loadbalance-dynamic] undo sta-load-balance dynamic disable [AC-wlan-rrm-prof-loadbalance-dynamic] sta-load-balance dynamic sta-number start-threshold 15 [AC-wlan-rrm-prof-loadbalance-dynamic] sta-load-balance dynamic sta-number gap-threshold percentage 25 [AC-wlan-rrm-prof-loadbalance-dynamic] quit
# Create the 2G radio profile radio2g and bind the RRM profile loadbalance-dynamic to the 2G radio profile.
[AC-wlan-view] radio-2g-profile name radio2g [AC-wlan-radio-2g-prof-radio2g] rrm-profile loadbalance-dynamic [AC-wlan-radio-2g-prof-radio2g] quit
# Create the 5G radio profile radio5g and bind the RRM profile loadbalance-dynamic to the 5G radio profile.
[AC-wlan-view] radio-5g-profile name radio5g [AC-wlan-radio-5g-prof-radio5g] rrm-profile loadbalance-dynamic [AC-wlan-radio-5g-prof-radio5g] quit
# Bind the 5G radio profile radio5g and 2G radio profile radio2g to the AP group ap-group1.
[AC-wlan-view] ap-group name ap-group1 [AC-wlan-ap-group-ap-group1] radio-5g-profile radio5g [AC-wlan-ap-group-ap-group1] radio-2g-profile radio2g [AC-wlan-ap-group-ap-group1] quit
- Commit the configuration.
[AC-wlan-view] commit all Warning: Committing configuration may cause service interruption, continue?[Y/N]:y
- Verify the configuration.
Connect STAs to the WLAN with SSID wlan-net and enter the password YsHsjx_202206. Run the display station ssid wlan-net command on the AC. The command output shows that the STAs are connected to the WLAN wlan-net.
[AC-wlan-view] display station ssid wlan-net Rf/WLAN: Radio ID/WLAN ID Rx/Tx: link receive rate/link transmit rate(Mbps) ------------------------------------------------------------------------------------- STA MAC AP ID Ap name Rf/WLAN Band Type Rx/Tx RSSI VLAN IP address ------------------------------------------------------------------------------------- 00e0-fc00-0001 0 area_1 0/1 2.4G 11n 65/38 -29 101 10.23.101.253 00e0-fc00-0002 1 area_2 0/1 2.4G 11n 78/43 -33 101 10.23.101.254 ------------------------------------------------------------------------------------- Total: 2 2.4G: 2 5G: 0
Run the display rrm-profile name loadbalance-dynamic command on the AC to check the dynamic load balancing configuration.
[AC-wlan-view] display rrm-profile name loadbalance-dynamic ------------------------------------------------------------ ... Station load balance : enable Station load balance start threshold : 15 Station load balance gap threshold(%) : 25 ... ------------------------------------------------------------
(Applicable to versions V200R009 to V200R012) Run the display station load-balance sta-mac 00e0-fc00-0001 command on the AC to check AP radios participating in dynamic load balancing.
[AC-wlan-view] display station load-balance sta-mac 00e0-fc00-0001 Station load balance status: balance ------------------------------------------------------------------------------ AP name Radio ID ------------------------------------------------------------------------------ area_1 1 area_1 0 area_2 1 area_2 0 ------------------------------------------------------------------------------ Total: 4
(Applicable to V200R013 and later versions) Run the display station neighbor sta-mac 00e0-fc00-0001 command on the AC to check AP radios participating in dynamic load balancing.
[AC-wlan-view] display station neighbor sta-mac 00e0-fcc7-1e08 -------------------------------------------------------------------------------------------------------------------------------- Device MAC Device ID Device Name Radio ID Probe info(RSSI/HH:MM:SS) 11k info[RCPI/RSNI/HH:MM:SS] -------------------------------------------------------------------------------------------------------------------------------- 00e0-fc74-9640 1 area_2 0 -48/16:28:24 205/45/16:28:24 -------------------------------------------------------------------------------------------------------------------------------- Total neighbors: 1, total records: 1
- When a new STA requests to connect to AP area_1, the AC uses a dynamic load balancing algorithm to redirect the STA to a lightly loaded AP in the same load balancing group.
Configuration Files
SwitchA configuration file
# sysname SwitchA # vlan batch 100 # interface gigabitethernet0/0/1 port link-type trunk port trunk pvid vlan 100 undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 100 stp edged-port enable port-isolate enable group 1 # interface gigabitethernet0/0/2 port link-type trunk undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 100 # interface gigabitethernet0/0/3 port link-type trunk port trunk pvid vlan 100 undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 100 stp edged-port enable port-isolate enable group 1 # return
Router configuration file
# sysname Router # vlan batch 102 # dhcp enable # ip pool sta gateway-list 10.23.101.1 network 10.23.101.0 mask 255.255.255.0 # interface Vlanif102 ip address 10.23.102.1 255.255.255.0 dhcp select global # interface GigabitEthernet2/0/0 port link-type trunk undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 102 # ip route-static 10.23.101.0 255.255.255.0 10.23.102.2 # return
AC configuration file
# sysname AC # vlan batch 100 to 102 # dhcp enable # interface Vlanif100 ip address 10.23.100.1 255.255.255.0 dhcp select interface # interface Vlanif101 ip address 10.23.101.1 255.255.255.0 dhcp select relay dhcp relay server-ip 10.23.102.1 # interface Vlanif102 ip address 10.23.102.2 255.255.255.0 # interface GigabitEthernet1/0/1 port link-type trunk undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 100 # interface GigabitEthernet1/0/2 port link-type trunk undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 102 # ip route-static 0.0.0.0 0.0.0.0 10.23.102.1 # capwap source interface vlanif100 # wlan security-profile name wlan-security security wpa2 psk pass-phrase %^%#m"tz0f>~7.[`^6RWdzwCy16hJj/Mc!,}s`X*B]}A%^%# aes ssid-profile name wlan-ssid ssid wlan-net vap-profile name wlan-vap forward-mode tunnel service-vlan vlan-id 101 ssid-profile wlan-ssid security-profile wlan-security regulatory-domain-profile name domain1 rrm-profile name loadbalance-dynamic sta-load-balance dynamic enable sta-load-balance dynamic start-threshold 15 sta-load-balance dynamic gap-threshold 25 radio-2g-profile name radio2g rrm-profile loadbalance-dynamic radio-5g-profile name radio5g rrm-profile loadbalance-dynamic ap-group name ap-group1 regulatory-domain-profile domain1 radio 0 radio-2g-profile radio2g radio-5g-profile radio5g vap-profile wlan-vap wlan 1 radio 1 radio-5g-profile radio5g vap-profile wlan-vap wlan 1 ap-id 0 type-id 35 ap-mac 00e0-fc76-e360 ap-sn 210235554710CB000042 ap-name area_1 ap-group ap-group1 ap-id 1 type-id 35 ap-mac 00e0-fc74-9640 ap-sn 210235554710CB000078 ap-name area_2 ap-group ap-group1 # return