No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

eSight V300R009C00 Operation Guide 09

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Network Planning

Network Planning

Before deploying WLAN services using eSight, you need to perform network planning.

Importing Planned Regions and APs

You can plan regions using the WLAN Planner and then import the planning file exported from the WLAN Planner to eSight to finish region planning.

Context

You can only import region planning files for indoor scenarios generated by the WLAN Planner of V100R001C20SPC100, V100R001C20SPC200, V100R001C30, and V100R001C80 to eSight.

NOTE:
  • Ensure that each floor has a name in planning files. Otherwise, errors may occur during import of the files.
  • The MAC address in the imported plan file must be in uppercase. Otherwise, the corresponding AP cannot be found and will be created.

Only APs can be imported through planning files. Probe APs and Bluetooth Beacon devices can only be independently added to the topology.

Procedure
  1. Choose Resource > Network > WLAN Management > Region Monitor from the main menu.

  2. If is displayed on the right of the page, the page is in editing mode. Perform the next step. Otherwise, click on the topology toolbar to enter the editing mode.
  3. Click in the toolbar of Resource.
  4. Click to select the planning file exported from the WLAN Planner and click Import.

  5. After the file is imported, the APs and obstacles planned in the WLAN Planner are displayed in the region topology.

    NOTE:
    • If APs are not added to eSight, they are created as pre-deployed APs in the region topology.
    • Only obstacles supported by eSight are displayed in the topology.

Manually Planning Regions and Adding APs

You can create a virtual region structure by simulating live network environment and add devices to the region to construct a complete region topology.

Procedure and Precautions

Procedure

Precautions

1. Set SNMP and Telnet parameters on the AC to enable the first time authentication of the SSH client.

  • To add ACs to eSight, configure SNMP parameters.

    For details about how to configure the SNMP protocol on the device, see Configuring the SNMP Protocol on Devices.

  • To ensure that eSight can deliver commands to ACs, set Telnet parameters.

    For details about how to set Telnet parameters on the device, see Setting Telnet Parameters on Devices.

  • You need to enable the first time authentication function of the SSH client on the AC, ensuring that APs can be successfully synchronized to eSight. By default, the function is disabled.

2. Check the SFTP service status of eSight.

SFTP needs to be used to transfer files between eSight and ACs.

3. Add ACs to eSight.

When you add devices or after you add devices to eSight through SNMP, you also need to set Telnet parameters on eSight. The Telnet parameters on eSight must be the same as those on the devices to ensure normal information exchange between them.

For details about how to add devices to eSight, see Adding Devices to eSight.

4. Check whether APs are synchronized to eSight.

After ACs are added to eSight, APs are synchronized to eSight after synchronization.

5. Check whether rogue devices are synchronized to eSight.

To check whether rogue devices are synchronized to eSight, you need to enable the WIDS function on the device.

6. Create a region.

You can create a region topology or a customized topology on eSight.

  • Region Topology

    You can create a hierarchy of regions (such as country, city, campus, building, floor) based on the network environment. The system supports a hierarchy of up to nine layers.

    Devices and sub-regions cannot be deployed at the same layer of a region. A bottom-layer region supports a maximum of 200 APs.

  • Custom Topology

    A customized topology applies in a conference scenario to monitor only some key devices. The administrator can add existing APs in a region topology to a customized topology without affecting monitoring of the existing region topology.

    You can create only one customized topology without hierarchy each time.

7. Design the region topology.

After creating regions, you need to set the topology for the regions.

  • For non-bottom-layer regions, you only need to upload their background images.
  • For bottom-layer regions, you need to upload their background images, set the scale, and add obstacles. After completing all the topology settings, you can test performance of radio signals in the topology of bottom-layer regions, including the coverage area and strength of radio signals.

8. Add APs to the topology.

eSight provides two methods to add APs to the region topology.

  • Adding pre-deployed APs

    This method applies if you deploy a WLAN for the first time. After pre-deployed APs are added to the WLAN region topology, you can associate them with real APs to quickly display them in the region topology.

  • Directly adding APs

    In network expansion scenarios, new APs can be directly added to specific region topology views.

Enabling the First Time Authentication Function of the SSH Client on the AC

You need to enable the first time authentication function of the SSH client on the AC, ensuring that APs can be successfully synchronized to eSight. By default, the function is disabled.

<AC6605>system-view 
[AC6605]ssh client first-time enable
Checking the FTP Server Status
  • In the Windows scenario:
    1. Log in to the eSight server as the Administrator user.
    2. Check whether the value of enable corresponding to the SFTP protocol in the D:\eSight\AppBase\sysagent\etc\sysconf\svcbase\med_node_1_svc.xml file is true.
      NOTE:

      In the file name, D:\eSight must be changed to the actual installation directory.

      <config name="sftp">
      <param name="enable">true</param> 
      </config>
      • If the parameter value is true, the SFTP server is normal.
      • If the parameter value is false, follow instructions in the Configuring the System Files Service section in the Maintenance guide to configure the SFTP server.
  • In the Linux scenario:
    1. Log in to the eSight server as the root user.
    2. Check whether the value of enable corresponding to the SFTP protocol in the /opt/eSight/AppBase/sysagent/etc/sysconf/svcbase/med_node_1_svc.xml file is true.
      NOTE:

      In the file name, /opt/eSight must be changed to the actual installation directory.

      <config name="sftp">  
      <param name="enable">true</param> 
      </config>
      • If the parameter value is true, the SFTP server is normal.
      • If the parameter value is false, follow instructions in the Configuring the System Files Service section in the Maintenance guide to configure the SFTP server.
Checking Whether APs Are Synchronized to eSight

After ACs are added to eSight, APs are synchronized to eSight after synchronization.

  1. Choose System > System Settings > Southbound Devices from the main menu and choose Network Equipment Poll Setting from the navigation tree on the left.

  2. Set AP Info Rolling interval and click Apply. eSight starts AP information polling and synchronizes APs.

  3. Choose System > System Management > Log Management from the main menu.

  4. Choose System Logs from the navigation tree on the left and check whether AP information polling is successful.

    If AP information polling is successful, APs are added to eSight. Otherwise, rectify the fault according to After an AC Is Added to eSight, eSight Fails to Discover Associated APs. Why?.

Checking Whether Rogue Devices Are Synchronized to eSight

To check whether rogue devices are synchronized to eSight, you need to enable the WIDS function on the device.

  1. Choose Resource > Network > Equipment > WLAN Resources from the main menu.

  2. Choose Security > Rogue Device from the navigation tree on the left. In the list that is displayed, view rogue devices that have been synchronized to eSight.

    Choose Security > Interferer from the navigation tree on the left. In the list that is displayed, view interferers that have been synchronized to eSight.

Creating a Region

You can create a region topology or a customized topology on eSight.

  1. Choose Resource > Network > WLAN Management > Region Monitor from the main menu.

  2. If is displayed on the right of the page, the page is in editing mode. Perform the next step. Otherwise, click on the topology toolbar to enter the editing mode.
  3. Use any of the following methods to create regions.

    Method

    Procedure

    Precautions

    Importing multiple regions in batches

    Click to expand the menu on the left and click on the toolbar above Resource to import regions in batches.

    This method applies in WLAN planning and deployment for the first time.

    You can enter information about planned regions and devices to a plan sheet and import the sheet to eSight.

    Creating a single region

    Click to expand the menu on the left, select the node where you want to create a region in Resource, and click to create a region.

    This method applies if you want to add a region during network expansion.

Designing the Region Topology

After creating regions, you need to set the topology for the regions.

  1. Choose Resource > Network > WLAN Management > Region Monitor from the main menu.

  2. Double-click a region name in Resource to access the topology view of the region, and click in the topology toolbar to enter the editing mode.
  3. Set important information for the topology view.

    Item

    Procedure

    Precautions

    Background image

    • Overall view

      Right-click in the region topology, choose Set Background Image for Subnet, and click Set Background Images.

    • GIS map

      Right-click in the region topology, choose Set Background Image for Subnet, and click Set GIS Map.

    Only floor plans and GIS maps can be used as background images.

    • Floor plans are usually images of physical network environment and can be applied to all regions. The file formats GIF, JPG, JPEG, and PNG are supported. The image resolution (width x height x bit depth/8/1024/1024) is no more than 100M, and the image size is no more than 6 MB.
    • GIS maps can only be applied to non-bottom-layer regions.

      The central position is the location in the center of the topology but not the map. For example, if the central position is Nanjing, Nanjing is located in the center of the topology.

    Scale

    Right-click in the region topology and choose Set scale from the shortcut menu.

    If the configured scale does not take effect, access the region topology again or clear the browser cache and access the region topology again.

    Obstacle

    Right-click in the region topology and choose Add Obstacle from the shortcut menu.

    The obstacle depth to display in the region topology is calculated based on the scale and actual obstacle depth. When the obstacle depth to display exceeds 50 pixel, it will be displayed as 50 pixel.

    You can customize obstacle types if the preset obstacle types do not meet the requirements. To customize obstacle types, right-click the region topology, choose Set Obstacle Type from the shortcut menu, and set obstacle type parameters based on the site requirements.

    Coverage

    Click in the topology toolbar to add and edit coverage areas.

    Coverage areas are sub-regions divided from a region, facilitating refined management.

    If you want to control the number of users in a coverage area, set Region Sta Num Alarm Threshold to specify the alarm threshold. If the number of users in a coverage area exceeds the specified value, eSight generates an alarm.

Adding Devices to the Topology

eSight provides two methods to add APs to the region topology.

  1. Choose Resource > Network > WLAN Management > Region Monitor from the main menu.

  2. Double-click a bottom-layer region in Resource where devices are to be added to access the topology view of the bottom-layer region. Click in the topology toolbar to enter the editing mode.
  3. Add devices to the topology in a proper way.

    Method

    Procedure

    Precautions

    Adding pre-deployed APs

    1. To add pre-deployed APs:

      Right-click in the region topology and choose Add Pre-deployed APs from the shortcut menu to set information about pre-deployed APs.

    2. To associate pre-deployed APs with real APs:

      Right-click a pre-deployed AP and choose Associate with APs from the shortcut menu to select a real AP to which the pre-deployed AP is to be associated.

    The pre-deployed AP will be displayed as a real AP if the AP with the specified SN or MAC address exists on eSight. If the AP does not exist, the association is saved. When the AP is loaded on eSight, the pre-deployed AP will be displayed as a real AP.

    Directly adding APs

    • To directly add APs:

      Right-click in the blank area in the region topology and choose Add AP from the shortcut menu.

    • APs can be added in pre-deployment mode.
Download
Updated: 2019-05-17

Document ID: EDOC1100011877

Views: 285616

Downloads: 550

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next