No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


S5720HI V200R010C00 Configuration Guide - WLAN-AC

This document describes native AC (hereinafter referred to as WLAN AC) configuration procedures and provides configuration examples.

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Security Configuration Suggestion

Security Configuration Suggestion

Network Security Suggestion

To protect network devices' CPU against attacks and ensure that users can use network resources properly, user control traffic and data traffic need to be limited. It is recommended that the traffic be limited on network edges, that is, on APs.

  • Control traffic limiting: ARP, ND, and IGMP flood attack detection is enabled on an AP by default. The rate thresholds for ARP, ND, and IGMP flood attack detection are 5 pps, 16 pps, and 4 pps, respectively. You are not advised to change the default values. When service traffic is heavy on a network, the values can be increased properly. However, it is recommended that the values be increased by no more than 100%.

    # Set the rate threshold for ARP flood attack detection to 10 pps. (This function is supported only by V200R010.)
    <HUAWEI> system-view
    [HUAWEI] wlan
    [HUAWEI-wlan-view] vap-profile name profile1
    [HUAWEI-wlan-vap-prof-profile1] anti-attack arp-flood sta-rate-threshold 10
  • Data traffic limiting: The rate limit of upstream and downstream packets for each STA or all STAs associated with a VAP is configured in a traffic profile on an AP.

    # Set the rate limit of upstream packets to 1 Mbit/s for each STA associated with the VAP that has the traffic profile p1.
    <HUAWEI> system-view
    [HUAWEI] wlan
    [HUAWEI-wlan-view] traffic-profile name p1
    [HUAWEI-wlan-traffic-prof-p1] rate-limit client up 1024
Different suggestions are provided for X series cards and non-X series cards of ACs.
  • The user-level rate limiting function is recommended for X series cards and is enabled by default. Supported packet types include ARP Request, ARP Reply, ND, DHCP Request, DHCPv6 Request, and 802.1X. By default, the user-level rate limit is 10 pps. You can adjust the rate limit for a specified STA.

    # Set the rate limit threshold for the STA with MAC address 000a-000b-000c to 20 pps.
    <HUAWEI> system-view
    [HUAWEI] cpu-defend host-car mac-address 000a-000b-000c pps 20
  • The attack source tracing function is recommended for non-X series cards and is enabled by default. If the number of protocol packets of normal services exceeds the specified checking threshold and an attack source punishment action is configured, the attack source tracing function may affect these normal services. You can attempt to disable the attack source tracing function or disable this function for corresponding protocols to restore the services.

    # Configure the device to discard packets from the identified source every 10 seconds.
    <HUAWEI> system-view
    [HUAWEI] cpu-defend policy test
    [HUAWEI-cpu-defend-policy-test] auto-defend enable
    [HUAWEI-cpu-defend-policy-test] auto-defend action deny timer 10
    # Delete IGMP and TTL-expired packets from the list of traced packets.
    <HUAWEI> system-view
    [HUAWEI] cpu-defend policy test
    [HUAWEI-cpu-defend-policy-test] auto-defend enable
    [HUAWEI-cpu-defend-policy-test] undo auto-defend protocol igmp ttl-expired

ICMP Fast Reply Is Recommended

Ping is a common method for checking network connectivity. However, a large number of ICMP packets affect device performance, reducing the number of wireless users supported by the AC. The ICMP fast reply function is enabled on a switch by default. Keep this function enabled, unless otherwise required.

CAPWAP Tunnel Encryption Is Not Recommended

The parent and an AS transmit management packets through a Control and Provisioning of Wireless Access Points (CAPWAP) tunnel. To ensure tunnel confidentiality and security, you can use Datagram Transport Layer Security (DTLS) to encrypt packets transmitted in the CAPWAP tunnel. DTLS encryption, however, degrades AC performance. It is recommended that DTLS encryption be disabled in scenarios without high security requirements or special customer requirements.

Updated: 2019-12-28

Document ID: EDOC1000141952

Views: 201109

Downloads: 522

Average rating:
This Document Applies to these Products

Related Version

Related Documents

Previous Next