No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

eSight V300R010C00SPC200, 300, and 500 Operation Guide 09

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Network Monitoring

Network Monitoring

Configuring Monitoring Items

eSight can monitor WLAN networks and display related information in the region topology only after you complete the following settings.

Configuring Items to Be Displayed in the Region Topology

You can configure the region topology display items to set the contents to be displayed in the region topology.

  1. Choose Resource > Network > WLAN Management > Region Monitor from the main menu.

  2. Select a bottom-layer region, click Monitor, and click in the topology toolbar in the monitoring mode.

    Tab

    Description

    Radio Signal Coverage

    Set the types and frequency bands of radio signals to be displayed in the region topology.

    NOTE:
    • Before checking coverage of radio signals, ensure that the region planning has been completed and the background image and scale have been set in the region topology. For details, see Network Planning.
    • If the signal coverage scope is not displayed properly, check the operating power in the RF template.

    Rogue Device

    Set rogue devices, interferers, and obstacles to be displayed in the region topology.

    NOTE:

    Rogue fat APs cannot be displayed in the region topology because fat APs are not supported in security rules.

    KPI

    Set the values of KPIs to be displayed in the region topology.

    Coverage

    Set whether to display coverage areas and the popularity marker.

    NOTE:

    After Popularity marker is selected, the coverage area is displayed in the color defined in the legend based on the number of users.

    Link

    Set the link types to be displayed.

Enabling Region Monitoring

The region monitoring function enables you to monitor a WLAN network in the region topology.

  1. Choose Resource > Network > WLAN Management > Region Monitor from the main menu.

  2. Select Region Topology in the resource tree and click in the topology toolbar to enter the editing mode. Click and set monitoring items.

    After the parameters are set, click Monitor to enable region monitoring.

    • Threshold: If the indicator percentage meeting a specified condition is higher than the threshold, the indicator percentage is displayed in red, indicating that a problem exists and needs to be resolved.
      NOTE:

      For example, Receive Rate is set to 20Kbps, and Threshold is set to 60%.

      If 61 out of 100 users in area A have their receiving rates lower than 20 kbit/s, the indicator percentage meeting a specified condition is 61%, which is higher than the threshold 60%. The percentage of low-rate users in area A is displayed in red in the topology.

    • User experience indicators: Select the indicators that will be displayed at the lower left corner of the region topology view (area 2 in Introduction to the region topology page) and set the thresholds of these indicators.
      • The ratios of the selected user experience indicators will be displayed in the region topology.
      • The ratios of unselected user experience indicators will not be displayed in the region topology.
    • Region information indicators: Select the indicators that will be displayed in the region list below the region topology (area 5 in Introduction to the region topology page) and set the thresholds of these indicators.

Configuring WLAN Polling Parameters

After WLAN polling parameters are set, eSight periodically queries and obtains specified parameters to ensure information consistency with the managed devices.

  1. Choose System > System Settings > Southbound Devices from the main menu and choose Network Equipment Poll Setting from the navigation tree on the left.

  2. Set WLAN polling parameters on the Polling Settings page.

    The default polling interval of eSight is 15 minutes. That is, eSight synchronizes data from managed devices every 15 minutes.

Configuring the Log Function

You can view the historical access records of a user in the area object manager only after the log function is configured.

After the log function is configured for the WLAN service on an AC, the AC records logs about user access and sends the logs to the eSight server. eSight periodically parses the logs and saves user access information. You only need to configure the log function on the AC.

The configuration on an AC6605 is as follows:

<Huawei> system-view
[Huawei] info-center enable     ///1. Enable the information center function.
[Huawei] info-center channel 0 name channel0     ///2. Name the channel.
[Huawei] info-center source default channel channel0 log level notification     ///3. Configure the log output channel.
[Huawei] info-center loghost source MEth 0/0/1     ///4. Configure the source interface for sending logs.
[Huawei] info-center loghost 192.168.1.10 channel channel0 facility local0     ///5. Configure the log information to be exported to the eSight server.
[Huawei] wlan
[Huawei-wlan-view] report-sta-info enable     ///6. Enable the WLAN user log reporting function.
[Huawei] quit
NOTE:

After WLAN user log reporting is enabled, you can view user traffic and online duration information in logs, and eSight can receive roaming logs.

(Optional) Configuring Security Rules

You can configure security rules to classify and filter rogue APs and trigger alarm sending accordingly. This enables network administrators to quickly locate and handle the problems to improve network security.

  1. Choose Resource > Network > Equipment > WLAN Resources from the main menu.

  2. Choose Security > Rule from the navigation tree on the left.
  3. Set the mask length of BSSIDs.

    After the mask length of BSSIDs is set, rogue APs with similar BSSIDs are associated to one physical device. A larger mask length makes it easier to associate rogue APs with similar BSSIDs to one physical device.

    For example, if this parameter is set to 4, eSight converts the last two digits of BSSIDs into binary bits and compares the last four bits of the BSSIDs. If some BSSIDs have identical last four bits, eSight associates the BSSIDs to one physical device.

  4. Create a rule.

    Click and set basic parameters and discovery filter for the rule.

    • Channel: Match rogue devices of Same Channel or Neighboring Channel.
    • SSID: Match rogue devices with similar SSIDs in regular or fuzzy mode.
    • Signal Strength: Set Strength(dBm) for matching rogue devices.
    • Detecting the number of AP: Set AP's Number for matching rogue devices.
    • Aggressive behavior: Specify this parameter for identifying rogue APs that make attacks.
    • Valid users association: Identify users that have connected to rogue APs.
  5. Prioritize the rules.

    Each rogue device can match only one rule. When multiple rules are configured, eSight checks for a rogue device starting from the rule of the highest priority.

    Click or in the Operation column to adjust the priority.

Viewing a Monitored Region Topology

You can view detailed information about the entire WLAN network and regions on the network on the Region Topology page.

Prerequisites

The region monitoring function has been configured. For details about the configuration, see Enabling Region Monitoring.

Context

After you configure the WLAN service and deliver service parameters to APs, you need to monitor the running status of the network and each region to ensure normal operations of the WLAN network.

The Region Topology page displays real-time and historical data of the WLAN network and wireless coverage in bottom-layer regions, helping you locate coverage holes and channel collisions.

Entry to the region topology page

Choose Resource > Network > WLAN Management > Region Monitor from the main menu.

Introduction to the region topology page

Figure 12-70 Region topology view

The following table describes areas on Region Topology and their functions.

Table 12-59 Areas and functions

No.

Function

Description

1

Resource

This area displays all regions in a tree structure. You can drag regions to modify the tree structure. My Favorites helps you query regions quickly.

2

Region topology

You can view user experience indicators in this area to know about status of a region. If an indicator is marked red, the indicator does not meet service requirements. You can click the indicator to display the fault location page.

NOTE:
  • You can select user experience indicators you want to monitor at the lower left corner in the topology. The available user experience indicators need to be selected when you enable the region monitoring function. For details, see User experience indicators.
  • On the fault location page, problems are displayed in descending order of severity. You can handle the most severe problem, and then solve other problems in the listed order, until the indicator color changes to green.
  • After an AC is added to eSight, APs are not automatically displayed in the region topology. You need to add the APs to the bottom-layer region manually.
  • Mesh APs can be added and displayed in the region topology. Links in a Mesh topology can also be displayed in the region topology.

3

Time axis

You can drag the mouse on the time axis to specify a time range. Then areas 2, 4, and 5 display data generated in the specified time range. You can set the time unit to 2 Hour, Day, Month, Year, and Custom when specifying the time range.

4

KPI portal

The Portal pages of the three key indicators in the area are displayed, including WLAN online user statistics, AP resource statistics, and AP rate statistics.

NOTE:
  • If you click an AP to display the link between the AP and the AC and then click the blank area, the portal pages of three KPIs are also displayed.
  • If no data is displayed on the three Portal pages on the right after you click an AP, check whether performance tasks have been created for the AP.

5

Region information list

  • You can click a sub-region or AP in this area to access the object manager or AP object manager.
  • The region information list also displays KPIs in the region. Abnormal indicators are marked red, and you can click an abnormal indicator to display the fault location page.

Viewing Regional Overview Information

The portal homepage displays important WLAN indicators and supports customization to help you better understand the overall WLAN status.

Prerequisites

You have entered the area object manager or have accessed the WLAN resource management page. (Choose Resource > Network > Equipment > WLAN Resources from the main menu)

Procedure

  1. In the navigation tree on the left, choose Overview from the navigation tree.
  2. View WLAN indicators.

    The Overview page displays the following indicators:

    • User:
      • WLAN User Statistics: Display the chart of WLAN online Users in a specified period.
      • Client Statistics: Display user distribution by the protocol used to access the wireless network and authentication mode.
      • Client Statistics By SSID: Display distribution of SSID users.
      • Client Statistics By Frequency: Display distribution of 2.4G and 5G users.
      • Top N Client with Low SNR: Display Top N users with low SNRs.
      • Top N Client with Low Speed: Display Top N users with low rates.
      • Top N Client with Low RSSI: Display Top N users with low RSSIs.
      • Client Distribution Based On Device Type: Display distribution of network access users based on device types.
      • Client Distribution Based On Device OS: Display distribution of network access users based on device OSs.
      • Client Distribution Based On Roles: Display distribution of network access users based on roles.
      • Client Distribution Based On Vendor: Display distribution of network access users based on vendors.
    NOTE:

    After eSight connects to the Agile Controller-Campus V100R002C10SPC410, the Client Distribution Based On Device Type, Client Distribution Based On Device OS, Client Distribution Based On Roles, and Client Distribution Based On Vendor Portal pages can be displayed. For details about the connection method, contact Huawei engineers.

    • AP:
      • Top N AP Upstream Traffic and Channel Usage: Display Top N AP traffic and channel usage information.
      • Top N AP User Association Failure Rate: Display the association failure rate of top AP users.
      • Top N AP Interface Traffic Utilization Trend: Display Top N AP Interface Traffic Utilization Trend.
      • Traffic Statistics By Area: Display regional traffic distribution information.
    • Radio:
      • User Statistics of Client Radio Types: Display user statistics of WLAN client radio types, including number of users for 2.4 GHz and 5 GHz WLANs.
      • Channel Utilization Trend: Display the trend chart of WLAN channel utilization in a specified period.
    • WIDS:
      • Rogue Devices And Rogue Clients Statistics: Display WLAN rogue devices and rogue clients statistics.
      • Interferers Statistics: Display WLAN Interferer statistics.
      • Security Statistics By Type: Display statistics on rogue devices, unauthorized devices, interference sources, and attacks.
    • Other:
      • Wireless Resource Statistics on the Network: Display wireless resource distribution on the region, including the total number of ACs, number of online ACs, the total number of APs, and the number of online APs on the WLAN.
      • Top N WLAN Average CPU Usage: Display Top N AC and AP average CPU usage in last hour, the last 24 hours, or the last 7 days.
      • Top N WLAN Average Memory Usage: Display Top N AC and AP average memory usage in last hour, the last 24 hours, or the last 7 days.
      • Top N SSID User Statistics: Display Top N SSID user statistics.
      • Top N Region Statistics: Display Top N region statistics, including number of total APs, number of online AP users, and number of clients.
      • Traffic Statistics By SSID: Display SSID traffic distribution information.

    NOTE:

    On the Overview page, standby AP information is displayed only on the Top N Region Statistics portal.

  3. Optional: Customize the Overview page.

    • All the portals support Export Data, Setting, Min, Max, Close, and Refresh functions. You can click on the upper right corner of any portal to display the six functions.

    • Some portals also support the Chat Graph Change function. You can click on the upper right corner of these portals to display this function.

      Only the following portals support the Chat Graph Change function: WLAN User Statistics, Top N AP User Association Failure Rate, Channel Utilization Trend, User Statistics of Client Radio Types, Rogue Devices And Rogue Clients Statistics, Interferers Statistics, Top N SSID User Statistics, and Wireless Resource Statistics on the Network.

    • The Setting function varies on different portals and is used to set parameters such as Refresh interval, Top N items, and Time range.
    NOTE:
    • The default refresh frequency for indicators on the overview page is No refresh. To set scheduled refresh, specify different time segments for indicators to avoid data refresh of all indicators at the same time.
    • The Time range parameter can be set to any time segment within the recent one year.

Viewing Regional Detailed Information

eSight allows users to view resource details including the AC, AP, user, and SSID information in each region in real time.

Prerequisites

You have logged in to the Region Object Manager.

Choose Resource > Network > Equipment > WLAN Resources from the main menu.

Operation Description and Main Procedures

Table 12-60 Main procedures for viewing information

Operation

Description

Prerequisites

Procedure

Viewing AC running information

View running status of a specified AC in a region, including the basic AC information, KPIs, alarms, AP information, and user information.

-

  1. Choose AC from the navigation tree on the left.
  2. Click an AC name to go to the AC object manager.

Viewing AP running information

View running status of a specified AP in a region, including the basic AP information, KPIs, alarms, and user information.

WLAN services have been deployed. For details, see the service deployment section.

  1. Choose AP from the navigation tree on the left.
  2. Click an AP name to go to the AP object manager.

Viewing MESH and LLDP link information

View the MESH and LLDP link information in the area, including the node information, key KPIs and statistics.

WLAN services have been deployed. For details, see the service deployment section.

  1. Choose Link from the navigation tree on the left.
  2. Click Import Layer 1 Node to import level-1 nodes connected to the AC.
  3. Click link quality display setting at the upper part of the link list and set KPIs.
    • On the Link page, view the node name, node role, link status, link type, and link KPI.
    • On the Statistics page, view the total number of nodes, number of online nodes, number of NPEs, number of online NPEs, and online rate of the NPE.

Viewing user information

View information about users who are connecting to the network in a region to learn overall user access information and network resource usage to determine whether network expansion is required.

NOTE:
  • A user refers to a client equipped with a wireless network adapter, such as a desktop or laptop computer, or a mobile phone.
  • To view terminal type, role, vendor, and OS information about access users, set parameters for the eSight server connected to the Agile Controller-Campus V100R002C10SPC410. For details about the connection method, contact Huawei engineers.

-

  1. Choose Client from the navigation tree on the left.
  2. Click the Access Current tab to view information about wireless users who are connecting to the network.

Viewing user access history

View detailed information about users who have accessed the network in a region. Access history helps administrators troubleshoot Internet access faults.

The log function must have been configured on the AC. For details, see Configuring the Log Function.

  1. Choose Client from the navigation tree on the left.
  2. Click the Access History tab to view user access records.

Viewing SSID information

View the information about all SSIDs on a WLAN, including the access AC name, access AP name, and ESS template name.

WLAN services have been deployed. For details, see the service deployment section.

Choose SSID from the navigation tree on the left.

NOTE:

In the SSID list, you must execute a Total online mobile terminals performance task before checking the number of clients. For details, see Operation Procedure.

Viewing Network Intrusion and Interference

eSight detects rogue access devices and attacks. The attacking devices are blacklisted dynamically, preventing authorized user access.

Prerequisites

You have logged in to the Region Object Manager.

Choose Resource > Network > Equipment > WLAN Resources from the main menu.

Operation Description and Main Procedures

Table 12-61 Main procedures for viewing information

Operation

Description

Prerequisites

Procedure

Viewing rogue devices and clients

Detect rogue devices and clients on networks to determine security risks on networks.

The WIDS Classify Profile has been configured and bound to APs.

Choose Security from the navigation tree of the Region Object Manager and view rogue devices and clients. In addition, the rogue clients associated with a rogue AP can be viewed in detail of the rogue AP.

Viewing attack information and defending against attacks

For small- and medium-sized WLAN networks, attack detection is enabled on ACs to detect attacks, including flood, weak initialization vector (IV), spoofing, and brute force (against WPA/WPA2/WAPI pre-shared key and WEP shared key). This helps users learn attack information.

The WIDS Attack Profile has been configured and bound to APs.

After the Dynamic Blacklist function is enabled in the WIDS Attack Profile, eSight will automatically blacklist users with attack behavior.

Viewing interferers

Detect interferers in a region to help administrators eliminate interferers quickly.

NOTE:

Currently, fat APs cannot function as monitoring APs.

The Interference Detect function is enabled in a 2G or 5G radio template and the template is bound to APs.

Choose Security > Interferer from the navigation tree on the left. Click the Current tab and view all current interferers. Click the History tab and view historical interferers.

Translation
Download
Updated: 2019-09-12

Document ID: EDOC1100044378

Views: 70919

Downloads: 375

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next