No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

S1720GFR, S2700, S5700, and S6720 V200R010C00 Web-based Configuration Guide

This document describes the configuration and maintenance of device through the web network management system. The web network management system provides the functions of viewing device information and managing the entire system, interfaces, services, ACL, QoS, routes, security, and tools.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Wireless Service

Wireless Service

VAP Profile

Context

The administrator needs to deliver service parameters to an AP so that the AP can provide network access services for wireless users. A VAP profile is a set of service parameters. You can configure different VAP profiles and deliver configurations in the profiles to APs to provide differentiated WLAN services.

Procedure

  • Create a VAP profile.
    1. Choose Configuration > Wireless Services > Profile > Wireless Service > VAP Profile. The VAP Profile List page is displayed.
    2. Click Create. The Create VAP Profile page is displayed.
    3. Enter the name of the new VAP profile in Profile name.

      To copy all parameters from another profile to the new profile, select the name of the profile in Copy parameters from other profiles. If None is selected, parameters are not copied from another profile.

    4. Click OK. The parameter setting page of the new VAP profile is displayed.



    5. Set parameters for creating a VAP profile. Table 1-186 describes the parameters for creating a VAP profile.

      Table 1-186  Parameters for creating a VAP profile

      Parameter

      Description

      VAP Profile

      Name of the VAP profile, which cannot be modified.

      Status

      Whether to enable the service mode of a VAP.

      VAP type

      VAP type.

      • If the type of a VAP is set to service, STAs connected to the VAP can only access network resources but not APs. Service VAPs are used in regular WLAN deployment scenarios.
      • If the type of a VAP is set to ap-management, STAs connected to the VAP can only access APs but not network resources. AP management VAPs are used in STA access and AP management scenarios.

      Service VLAN

      Service VLAN of a VAP.

      • When a specific VLAN is configured as the service VLAN of a VAP, STAs connected to the VAP join the same VLAN.
      • When VLANs in a VLAN pool are configured as service VLANs of a VAP, STAs connected to the VAP join different VLANs.

      Service VLAN ID

      ID of the service VLAN.

      VLAN Pool

      VLAN pool used for service VLANs.

      To configure a VLAN pool, perform as follows:
      • Click to create a VLAN pool. For parameters for creating a VLAN pool, see Table 1-187.

      • Click to modify the selected VLAN pool.

      • Click to delete the selected VLAN pool.

      Forwarding mode

      Service forwarding mode.

      Band steering

      Whether to enable band steering.

      ARP probe

      Whether to enable dynamic ARP probing.

      IP binding check

      Whether to enable IP source guard on an AP.

      IP learning

      Whether to enable STA address learning.

      Strict IP learning

      Whether to enable strict STA IP address learning through DHCP.

      Dynamic blacklist of strict IP learning

      Whether to add STAs with bogus IP addresses to a dynamic blacklist.

      DHCP trusted interface

      Whether to enable the DHCP trusted port function on an AP.

      Appending Option 82

      Whether to enable an AP to insert the Option 82 field in DHCP packets sent from a STA.

      RID format

      Format of the remote-ID in the Option 82 field inserted in DHCP packets sent from a STA.

      CID format

      Format of the circuit-ID in the Option 82 field inserted in DHCP packets sent from a STA.

      Delimiter

      Format of the AP's MAC address in the Option 82 field.

      User-defined

      User-defined format in the Option 82 field.

      Effective after logout

      Whether to enable offline management VAP and antenna alignment VAP functions.

      Disable VAP periodically

      Whether to enable the scheduled VAP auto-off function.

      Disable VAP time setting at intervals

      Scheduled time during which a VAP is disabled.

      Table 1-187  Parameters for creating a VLAN pool

      Item

      Description

      VLAN pool name

      Name of a VLAN pool.

      VLAN assignment mode

      Assignment mode of VLANs in a VLAN pool.

      • When the VLAN assignment algorithm is set to even, service VLANs are assigned to STAs from the VLAN pool based on the order in which STAs go online. Address pools mapping the service VLANs evenly assign IP addresses to STAs. If a STA goes online many times, it obtains different IP addresses.

      • When the VLAN assignment algorithm is set to hash, VLANs are assigned to STAs from the VLAN pool based on the harsh result of their MAC addresses. As long as the VLANs in the VLAN pool do not change, the STAs obtain fixed service VLANs. A STA is preferentially assigned the same IP address when going online at different times.

      VLAN ID

      ID of a VLAN to be added to or deleted from a VLAN pool.

    6. Click Apply. In the Info dialog box that is displayed, click OK.
  • Modify a VAP profile.
    1. Choose Configuration > Wireless Services > Profile > Wireless Service > VAP Profile. The VAP Profile List page is displayed.
    2. Click the name of the VAP profile that you want to modify. The VAP Profile page is displayed.
    3. Set parameters for modifying the VAP profile. Table 1-186 describes the parameters for modifying a VAP profile.
    4. Click Apply. In the Info dialog box that is displayed, click OK.
  • Delete a VAP profile.
    1. Choose Configuration > Wireless Services > Profile > Wireless Service > VAP Profile. The VAP Profile List page is displayed.
    2. Select the profile that you want to delete and click Delete. In the Confirm dialog box that is displayed, click OK.
  • Display the profile reference relationship.
    1. Choose Configuration > Wireless Services > Profile > Wireless Service > VAP Profile. The VAP Profile List page is displayed.
    2. Select the profile of which you want to display the reference relationship and click Display Reference. The system displays the types and names of the objects that reference the profile.

      NOTE:

      Click Hide Reference Relationship. The system hides the displayed results.

  • Configure profiles referenced by a VAP profile.
    1. Choose Configuration > Wireless Services > Profile > Wireless Service > VAP. The VAP Profile List page is displayed. Click next to VAP Profile. The system displays names of the VAP profiles. Click next to a VAP profile name. The profiles referenced by the VAP profile are displayed in the menu navigation area.
    2. Click any profile referenced by the VAP profile. The configuration page of the referenced profile is displayed on the right. You can select another profile from the drop-down list and set the profile parameters. For descriptions of the profile parameters, see its configuration page.
    3. Click Apply. In the Info dialog box that is displayed, click OK.

SSID Profile

Context

An SSID profile is mainly used to configure STA association and access parameters based on SSIDs, including the SSID name, STA association timeout period, legacy terminal access, and QoS CAR.

Procedure

  • Create an SSID profile.
    1. Choose Configuration > Wireless Services > Profile > Wireless Service > SSID Profile. The SSID Profile List page is displayed.
    2. Click Create. The Create SSID Profile page is displayed.
    3. Enter the name of the new SSID profile in Profile name.

      To copy all parameters from another profile to the new profile, select the name of the profile in Copy parameters from other profiles. If None is selected, parameters are not copied from another profile.

    4. Click OK. The parameter setting page of the new SSID profile is displayed.



    5. Set parameters for creating an SSID profile. Table 1-188 describes the parameters for creating an SSID profile.

      Table 1-188  Parameters for creating an SSID profile

      Parameter

      Description

      SSID Profile

      Name of the SSID profile, which cannot be modified.

      SSID

      Name of the SSID.

      NOTE:

      When command lines are used to configure an SSID name containing non-English characters, the non-English characters can only be edited using the command editor of the UTF-8 encoding format.

      Association timeout

      STA association timeout period. If an AP receives no data packet from an STA in a continuous period of time, the STA goes offline after the association timeout period is reached.

      Maximum number of STAs

      Maximum number of access STAs on a single VAP.

      Hide SSID after the maximum number of STAs is reached

      Whether to hide SSIDs when the number of users on a VAP reaches the maximum.

      Disable non-HT terminal access

      Whether to disable non-HT terminal access.

      EDCA Parameters

      Area

      Preset EDCA parameters for different scenarios. Users can select the corresponding scenarios or adjust the preset EDCA parameters.

      • Default: EDCA parameters use default settings.
      • Voice: Voice packets preferentially use a channel.
      • Voice and video: Voice and video packets preferentially use a channel.

      Packet Type

      Packet type.
      • AC_VO: Voice
      • AC_VI: Video
      • AC_BE: Best Effort
      • AC_BK: Background

      AIFSN

      Arbitration inter frame spacing number (AIFSN), which determines the channel idle time. A larger AIFSN value indicates that the STA must wait for a longer time and has a lower priority.

      ECWmin

      Exponent form of the minimum contention window (ECWmin) and exponent form of the maximum contention window (ECWmax) together determine the average backoff time. Larger ECWmin and ECWmax values indicate that the average backoff time for the STA is longer and the STA priority is lower.

      ECWmax

      TXOPLimit

      Transmission opportunity limit (TXOPLimit), which determines the maximum duration in which an STA can occupy the channel. A larger TXOPLimit value indicates that the STA can occupy the channel for a longer time.

      Inbound CAR Parameters

      CIR

      Average rate of traffic that can pass through in the inbound direction.

      PIR

      Maximum rate of traffic that can pass through in the inbound direction.

      CBS

      Average volume of committed burst traffic that can pass through in the inbound direction.

      PBS

      Maximum volume of burst traffic that can pass through in the inbound direction.

      Admin Frame Expense Optimization

      Beacon frame rate on 2.4G radio

      Rate at which 2.4 GHz Beacon frames are sent.

      Beacon frame rate on 5G radio

      Rate at which 5 GHz Beacon frames are sent.

      Deny broadcast probe

      Whether to disable an AP from responding to broadcast Probe Request frames.

      Probe response retry

      Number of times Probe Response packets ate retransmitted.

      Others

      DTIM interval

      Number of Beacon frames sent before the Beacon frame that contains the DTIM.

      Hide SSID

      Whether to enable SSID hiding in Beacon frames.

      U-APSD power saving mode

      Whether to enable U-APSD.

    6. Click Apply. In the Info dialog box that is displayed, click OK.
  • Modify an SSID profile.
    1. Choose Configuration > Wireless Services > Profile > Wireless Service > SSID Profile. The SSID Profile List page is displayed.
    2. Click the name of the SSID profile that you want to modify. The SSID profile configuration page is displayed.
    3. Set parameters for modifying an SSID profile. Table 1-188 describes the parameters for modifying an SSID profile.
    4. Click Apply. In the Info dialog box that is displayed, click OK.
  • Delete an SSID profile.
    1. Choose Configuration > Wireless Services > Profile > Wireless Service > SSID Profile. The SSID Profile List page is displayed.
    2. Select the profile that you want to delete and click Delete. In the Confirm dialog box that is displayed, click OK.
  • Display the profile reference relationship.
    1. Choose Configuration > Wireless Services > Profile > Wireless Service > SSID Profile. The SSID Profile List page is displayed.
    2. Select the profile of which you want to display the reference relationship and click Display Reference Relationship. The system displays the types and names of the objects that reference the profile.

      NOTE:

      Click Hide Reference Relationship. The system hides the displayed results.

Security Profile

Procedure

  • Create a security profile.
    1. Choose Configuration > Wireless Services > Profile > Wireless Service > Security Profile. The Security Profile List page is displayed.
    2. Click Create. The Create Security Profile page is displayed.
    3. Enter the name of the new security profile in Profile name.

      To copy all parameters from another profile to the new profile, select the name of the profile in Copy parameters from other profiles. If None is selected, parameters are not copied from another profile.

    4. Click OK. The parameter setting page of the new security profile is displayed.



    5. Set parameters for creating a security profile. Table 1-189 describes the parameters for creating a security profile.

      Table 1-189  Parameters for creating a security profile

      Parameter

      Description

      Security Profile

      Name of the security profile, which cannot be modified.

      Security policy

      Security policy of the security profile.

      SHARE-KEY

      Whether to use the pre-shared key.

      Authentication policy

      Authentication mode of the security policy.

      Encryption mode

      Encryption mode of the security policy.

      Key type

      Key type, which is a hexadecimal number or a passphrase.

      Key No.

      Key number, which you can select from the drop-down list box.

      Key

      Key of the security profile.

      Confirm key

      Confirmation of the key.

      PTK update interval

      Whether to enable periodic PTK update during WPA/WPA2/WPA-WPA2 encryption.

      PTK update interval

      PTK update interval during WPA/WPA2/WPA-WPA2 encryption. A smaller update interval indicates more frequent PTK updates and more secure data encryption. However, if the PTK update interval is set too small, the STA and AP implement more PTK negotiations, affecting the throughput.

      Management frame protection

      Whether to enable management frame protection.

      Forcibly enable management frame protection

      Whether to forcibly enable management frame protection.

      Specify AC private key file/key

      Private key file and key of the AC certificate specified for the security profile when the security policy is set to WAPI.

      Specify AC certificate/key

      AC certificate and key specified for the security profile when the security policy is set to WAPI.

      NOTE:

      The certificates must be valid and correct.

      Specify issuer's certificate/key

      Issuer certificate and key specified for the security profile when the security policy is set to WAPI. The issuer certificate helps to check whether the AC certificate is modified.

      Specify ASU certificate/key

      ASU certificate and key specified for the security profile when the security policy is set to WAPI.

      NOTE:

      If the authentication system uses only two certificates, the issuer certificate is the same as the ASU certificate, with the same file name. If the authentication system uses three certificates, the issuer certificate and ASU certificate are different from each other and both must be imported.

      The certificates must be valid and correct.

      ASU IP

      IP address of the ASU server when the security policy is set to WAPI.

      NOTE:

      The parameter determines to which ASU server WAPI packets are sent. Users must ensure the correctness of both ASU certificates and ASU servers; otherwise, users may fail the authentication.

      Retransmission count of certificate authentication packets

      Number of certificate authentication packet retransmissions specified for the security profile when the security policy is set to WAPI.

      Association timeout interval

      Timeout period of a security association (SA).

      BK lifetime percentage

      BK lifetime percentage.

      BK update interval

      BK update interval.

      Key update

      Key update function. You can select Unicast Key Update, Multicast Key Update, or both.

      Unicast Key Update/Multicast Key Update

      Update interval

      Key update interval. When the key update mode is set to time-based key update, the key update interval needs to be configured.

      Retransmission count of negotiation packets

      Number of key negotiation packet retransmissions.

    6. Click Apply. In the Info dialog box that is displayed, click OK.
  • Modify a security profile.
    1. Choose Configuration > Wireless Services > Profile > Wireless Service > Security Profile. The Security Profile List page is displayed.
    2. Click the name of the security profile that you want to modify. The security profile configuration page is displayed.
    3. Set parameters for modifying a security profile. Table 1-189 describes the parameters for modifying a security profile.
    4. Click Apply. In the Info dialog box that is displayed, click OK.
  • Delete a security profile.
    1. Choose Configuration > Wireless Services > Profile > Wireless Service > Security Profile. The Security Profile List page is displayed.
    2. Select the profile that you want to delete and click Delete. In the Confirm dialog box that is displayed, click OK.
  • Display the profile reference relationship.
    1. Choose Configuration > Wireless Services > Profile > Wireless Service > Security Profile. The Security Profile List page is displayed.
    2. Select the profile of which you want to display the reference relationship and click Display Reference Relationship. The system displays the types and names of the objects that reference the profile.

      NOTE:

      Click Hide Reference Relationship. The system hides the displayed results.

Traffic Profile

Procedure

  • Create a traffic profile.
    1. Choose Configuration > Wireless Services > Profile > Wireless Service > Traffic Profile. The Traffic Profile List page is displayed.
    2. Click Create. The Create Traffic Profile page is displayed.
    3. Enter the name of the new traffic profile in Profile name.

      To copy all parameters from another profile to the new profile, select the name of the profile in Copy parameters from other profiles. If None is selected, parameters are not copied from another profile.

    4. Click OK. The parameter setting page of the new traffic profile is displayed.



    5. Set parameters for creating a traffic profile. Table 1-190 describes the parameters for creating a traffic profile.

      Table 1-190  Parameters for creating a traffic profile

      Parameter

      Description

      Traffic Profile

      Name of the traffic profile, which cannot be modified.

      User isolation mode

      User isolation mode.

      Multicast-to-unicast

      Whether to enable the function of converting multicast packets to unicast packets.

      You can enable the function of converting multicast packets to unicast packets in scenarios that have high requirements on multicast stream transmission, such as a high-definition video on-demand scenario. After the function is enabled, an AP listens on Report and Leave packets to maintain multicast-to-unicast entries. When sending multicast packets to the client, the AP converts the multicast packets to unicast packets based on the multicast-to-unicast entries to improve multicast stream transmission efficiency.

      IGMP-Snooping

      Whether to enable IGMP snooping.

      Multicast Report/Leave Suppression

      Whether to enable suppression of multicast Report/Leave packets.

      Broadcast packet rate limit

      Rate limit for broadcast packets. Broadcast packets are discarded if their rates exceed the rate limit.

      Multicast packet rate limit

      Rate limit for multicast packets. Multicast packets are discarded if their rates exceed the rate limit.

      Unknown unicast packet rate limit

      Rate limit for unknown unicast packets. Unknown unicast packets are discarded if their rates exceed the rate limit.

      Packet filtering

      The following parameters are available only after IPv4 packet filtering is selected.

      Inbound ACL

      ACL used to filter incoming packets.

      Outbound ACL

      ACL used to filter outgoing packets.

      Uplink Priority Mapping on Air Interface

      Mapping from the 802.11e user priority to DSCP priority in the CAPWAP header when packets are sent from an AP to an AC.

      Trust mode

      Trusted priority on the air interface, which is the 802.11e or DSCP priority.

      802.11e

      802.11e user priority.

      DSCP

      DSCP priority of 802.11 packets.

      Tunnel DSCP

      DSCP priority in the CAPWAP header.

      Downlink Priority Mapping on Air Interface

      Mapping from the 802.1p or DSCP priority of 802.3 packets to the 802.11e user priority when packets are sent to an AP from upper-layer devices.

      Trust mode

      Trusted priority on the air interface, which is the 802.1p or DSCP priority.

      802.1p

      802.1p priority of 802.3 packets.

      Tunnel DSCP

      DSCP priority in the CAPWAP header.

      802.11e

      802.11e user priority.

      Rate Limit

      STA uplink rate limit

      Uplink rate limit for a STA.

      STA downlink rate limit

      Downlink rate limit for a STA.

      VAP uplink rate limit

      Uplink rate limit for all STAs on a VAP. The value of this parameter must be greater than the uplink rate limit set for a STA.

      VAP downlink rate limit

      Downlink rate limit for all STAs on a VAP. The value of this parameter must be greater than the downlink rate limit set for a STA.

    6. Click Apply. In the Info dialog box that is displayed, click OK.
  • Modify a traffic profile.
    1. Choose Configuration > Wireless Services > Profile > Wireless Service > Traffic Profile. The Traffic Profile List page is displayed.
    2. Click the name of the traffic profile that you want to modify. The traffic profile configuration page is displayed.
    3. Set parameters for modifying a traffic profile. Table 1-190 describes the parameters for modifying a traffic profile.
    4. Click Apply. In the Info dialog box that is displayed, click OK.
  • Delete a traffic profile.
    1. Choose Configuration > Wireless Services > Profile > Wireless Service > Traffic Profile. The Traffic Profile List page is displayed.
    2. Select the profile that you want to delete and click Delete. In the Confirm dialog box that is displayed, click OK.
  • Display the profile reference relationship.
    1. Choose Configuration > Wireless Services > Profile > Wireless Service > Traffic Profile. The Traffic Profile List page is displayed.
    2. Select the profile of which you want to display the reference relationship and click Display Reference Relationship. The system displays the types and names of the objects that reference the profile.

      NOTE:

      Click Hide Reference Relationship. The system hides the displayed results.

STA Blacklist Profile

Context

STA blacklist and whitelist functions allow authorized STAs to connect to the WLAN and reject access from unauthorized STAs.
  • A whitelist contains MAC addresses of STAs that are allowed to connect to a WLAN. After the whitelist function is enabled, only the STAs in the whitelist can connect to the WLAN, and access from other STAs is rejected.
  • A blacklist contains MAC addresses of STAs that are not allowed to connect to a WLAN. After the blacklist function is enabled, STAs in the blacklist cannot connect to the WLAN, and other STAs can connect to the WLAN.

If the whitelist or blacklist is empty, all STAs can connect to the WLAN.

Procedure

  • Create a STA blacklist profile.
    1. Choose Configuration > Wireless Services > Profile > Wireless Service > STA Blacklist Profile. The STA Blacklist Profile List page is displayed.
    2. Click Create. The Create STA Blacklist Profile page is displayed.
    3. Enter the name of the new STA blacklist profile in Profile name.

      To copy all parameters from another profile to the new profile, select the name of the profile in Copy parameters from other profiles. If None is selected, parameters are not copied from another profile.

    4. Click OK. The parameter setting page of the new STA blacklist profile is displayed.



    5. Maintain MAC addresses in the STA blacklist.

      • Adding MAC addresses one by one

        # Click Add. The Add MAC Address page is displayed.

        # Enter a MAC address and click . Multiple MAC addresses can be added. Click to delete the selected MAC address.

        # Click OK

      • Adding MAC addresses in batches

        # Click Batch Import. The Import MAC Address page is displayed.

        # Click and select the MAC file containing MAC addresses that you want to import, and click Import.
        NOTE:
        You can click to download the MAC template.

        # Click Apply. In the Info dialog box that is displayed, click OK.

      • Deleting MAC addresses

        # Select the MAC address that you want to delete and click Delete. In the Confirm dialog box that is displayed, click OK.

    6. Click Apply. In the Info dialog box that is displayed, click OK.
  • Modify a STA blacklist profile.
    1. Choose Configuration > Wireless Services > Profile > Wireless Service > STA Blacklist Profile. The STA Blacklist Profile List page is displayed.
    2. Click the name of the STA blacklist profile that you want to modify. The STA blacklist profile configuration page is displayed.
    3. Set parameters for modifying a STA blacklist profile. For details, see 5.
    4. Click Apply. In the Info dialog box that is displayed, click OK.
  • Delete a STA blacklist profile.
    1. Choose Configuration > Wireless Services > Profile > Wireless Service > STA Blacklist Profile. The STA Blacklist Profile List page is displayed.
    2. Select the profile that you want to delete and click Delete. In the Confirm dialog box that is displayed, click OK.
  • Display the profile reference relationship.
    1. Choose Configuration > Wireless Services > Profile > Wireless Service > STA Blacklist Profile. The STA Blacklist Profile List page is displayed.
    2. Select the profile of which you want to display the reference relationship and click Display Reference Relationship. The system displays the types and names of the objects that reference the profile.

      NOTE:

      Click Hide Reference Relationship. The system hides the displayed results.

STA Whitelist Profile

Context

STA blacklist and whitelist functions allow authorized STAs to connect to the WLAN and reject access from unauthorized STAs.
  • A whitelist contains MAC addresses of STAs that are allowed to connect to a WLAN. After the whitelist function is enabled, only the STAs in the whitelist can connect to the WLAN, and access from other STAs is rejected.
  • A blacklist contains MAC addresses of STAs that are not allowed to connect to a WLAN. After the blacklist function is enabled, STAs in the blacklist cannot connect to the WLAN, and other STAs can connect to the WLAN.

If the whitelist or blacklist is empty, all STAs can connect to the WLAN.

Procedure

  • Create a STA whitelist profile.
    1. Choose Configuration > Wireless Services > Profile > Wireless Service > STA Whitelist Profile. The STA Whitelist Profile List page is displayed.
    2. Click Create. The Create STA Whitelist Profile page is displayed.
    3. Enter the name of the new STA whitelist profile in Profile name.

      To copy all parameters from another profile to the new profile, select the name of the profile in Copy parameters from other profiles. If None is selected, parameters are not copied from another profile.

    4. Click OK. The parameter setting page of the new STA whitelist profile is displayed.



    5. Maintain MAC addresses in the STA whitelist.

      • Adding MAC addresses one by one

        # Click Add. The Add MAC Address page is displayed.

        # Enter a MAC address and click . Multiple MAC addresses can be added. Click to delete the selected MAC address.

        # Click OK

      • Adding MAC addresses in batches

        # Click Batch Import. The Import MAC Address page is displayed.

        # Click and select the MAC file containing MAC addresses that you want to import, and click Import.
        NOTE:
        You can click to download the MAC file profile.

        # Click Apply. In the Info dialog box that is displayed, click OK.

      • Deleting MAC addresses

        # Select the MAC address that you want to delete and click Delete. In the Confirm dialog box that is displayed, click OK.

    6. Click Apply. In the Info dialog box that is displayed, click OK.
  • Modify a STA whitelist profile.
    1. Choose Configuration > Wireless Services > Profile > Wireless Service > STA Whitelist Profile. The STA Whitelist Profile List page is displayed.
    2. Click the name of the STA whitelist profile that you want to modify. The STA whitelist profile configuration page is displayed.
    3. Set parameters for modifying a STA whitelist profile. For details, see 5.
    4. Click Apply. In the Info dialog box that is displayed, click OK.
  • Delete a STA whitelist profile.
    1. Choose Configuration > Wireless Services > Profile > Wireless Service > STA Whitelist Profile. The STA Whitelist Profile List page is displayed.
    2. Select the profile that you want to delete and click Delete. In the Confirm dialog box that is displayed, click OK.
  • Display the profile reference relationship.
    1. Choose Configuration > Wireless Services > Profile > Wireless Service > STA Whitelist Profile. The STA Whitelist Profile List page is displayed.
    2. Select the profile of which you want to display the reference relationship and click Display Reference Relationship. The system displays the types and names of the objects that reference the profile.

      NOTE:

      Click Hide Reference Relationship. The system hides the displayed results.

Translation
Download
Updated: 2019-08-21

Document ID: EDOC1000114003

Views: 50595

Downloads: 1059

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next