Optional Configurations
The WLAN configuration methods are almost the same in coverage scenarios of wireless cities. However, in some scenarios with special requirements, additional configurations are required. (Optional configurations are not included in the configuration scripts.)
Wi-Fi Terminal Location
Customers may need to collect statistics on STA locations for big data analytics. In this case, the terminal location function should be enabled for APs to report information about surrounding STAs.
Data Planning
Item |
Data |
---|---|
AP group |
|
2G radio profile |
|
5G radio profile |
|
eSight |
IP address: 172.16.1.251 |
Air scan profile |
|
Location profile |
|
Configuration Procedure
- Configure the air scan function.
# Create air scan profile wireless_city, and configure an air scan channel set in the profile. By default, an air scan channel set contains all channels supported by the country code of an AP.
[AC_1] wlan [AC_1-wlan-view] air-scan-profile name wireless_city [AC_1-wlan-air-scan-prof-wireless_city] scan-channel-set country-channel [AC_1-wlan-air-scan-prof-wireless_city] quit
# Bind the air scan profile wireless_city to the 2G and 5G radio profiles.
[AC_1-wlan-view] radio-2g-profile name 2G_transport_indoor [AC_1-wlan-radio-2g-prof-2G_transport_indoor] air-scan-profile wireless_city [AC_1-wlan-radio-2g-prof-2G] quit
[AC_1-wlan-view] radio-5g-profile name 5G_transport_indoor [AC_1-wlan-radio-5g-prof-5G_transport_indoor] air-scan-profile wireless_city [AC_1-wlan-radio-5g-prof-5G_transport_indoor] quit
- Configure the Wi-Fi terminal location function.
# Create location profile wireless_city, enable the Wi-Fi terminal location function, and configure the destination IP address and port number to which location information is reported.
[AC_1-wlan-view] location-profile name wireless_city [AC_1-wlan-location-prof-wireless_city] private mu-enable [AC_1-wlan-location-prof-wireless_city] private server ip-address 172.16.1.251 port 32180 via-ac ac-port 10001 //Set the IP address of the eSight server to 172.16.1.251. [AC_1-wlan-location-prof-wireless_city] quit
# Bind the location profile to the AP group.
[AC_1-wlan-view] ap-group name transport_indoor [AC_1-wlan-ap-group-transport_indoor] location-profile wireless_city radio all Warning: This action may cause service interruption. Continue?[Y/N]y [AC_1-wlan-ap-group-transport_indoor] quit [AC_1-wlan-view] quit
- Configure AC_1 and AC_2 to communicate with eSight.
[AC_1] snmp-agent [AC_1] snmp-agent community read Public123 mib-view iso-view //Configure the read community name. [AC_1] snmp-agent community write Private123 mib-view iso-view //Configure the write community name. [AC_1] snmp-agent sys-info version v2c //Configure the SNMP version for negotiation between eSight and the AC. [AC_1] snmp-agent mib-view iso-view include iso //Configure MIB view iso-view that contains the iso subtree.
# Configure the trap report function.
[AC_1] snmp-agent trap enable //Enable the AC to report traps about all service modules. Info: All switches of SNMP trap/notification will be open. Continue? [Y/N]:y [AC_1] snmp-agent trap source vlanif 800 //Specify the source interface that sends traps. [AC_1] snmp-agent target-host trap-hostname esight address 172.16.1.251 udp-port 162 trap-paramsname esight //Set address to the eSight server IP address, udp-port to the destination port (port 162 by default) that receives traps, and trap-paramsname to the name of the trap sending parameter list used by the eSight server. [AC_1] snmp-agent target-host trap-paramsname esight v2c securityname Public123 //Set the parameter after securityname to the name of the SNMP read community.
# Enable first authentication on the SSH client.
[AC_1] ssh client first-time enable
# Configure AC_2 to communicate with eSight in the same way.
After the wireless configuration synchronization function is enabled, public configurations on AC_1 will be automatically synchronized to AC_2.
- Configure eSight.
- Log in to eSight and create a region. In the following example, region AP_region_1 is created.
# Choose Business > WLAN Management > Region Monitor from the main menu.
# Click Region Topology in Resource, and click
on the topology toolbar to enter the editing mode.
# Right-click in the topology view of the AP_region_1 region and choose Add Region from the shortcut menu.
# Click OK.
- Add APs to AP_region_1.
# Choose Region Topology > AP_region_1 in Resource, or double-click AP_region_1 in the view on the right. The view of ap_region_1 is displayed.
# Right-click in the AP_region_1 view and choose Add AP from the shortcut menu. Select the APs that need to perform terminal location and click Confirm.
Add at least three APs that need to perform terminal location to ensure accurate locating of STAs.
- Set the background map and scale for AP_region_1.
# Right-click in the AP_region_1 view and choose Set Background for Subnet from the shortcut menu.
# Select a background map and click Apply Background.
The background image is a floor plan of the physical network environment and can be in GIF, JPG, JPEG, or PNG format.
# Right-click in the AP_region_1 view and choose Set Scale from the shortcut menu. Set the start point, end point, and actual distance between the two points. eSight will automatically calculate the scale of the background map.
# In the AP_region_1 view, place APs on the background map correctly according to their actual deployment locations.
# Click save in the AP_region_1 view.
- Enable the Wi-Fi terminal location function on eSight.
# Choose Region Topology > AP_region_1 in Resource, or right-click AP_region_1 in the view on the right and choose Enable WIFI Location from the shortcut menu. Click Confirm in the dialog box that is displayed.
- Log in to eSight and create a region. In the following example, region AP_region_1 is created.
Verifying the Configuration
Check location results on the location server.
# Click Monitor in the AP_region_1 view to return to the monitor mode. Click on the topology toolbar to select information to be displayed in the topology.
# On the Terminal Location tab page, select STAs or heat maps to be displayed in the topology.
PoE Switch Configurations in Outdoor Coverage Scenarios
Typically, PoE switches cannot be used as access switches in outdoor coverage scenarios. Instead, an ONU is directly connected to APs, as shown in the following figure. Therefore, management VLANs and service VLANs need to be configured on the interfaces connecting the ONU to APs.
huawei(config)#service-port vlan 900 eth 0/3/1 multi-service user-vlan untagged huawei(config)#service-port vlan 730 eth 0/3/1 multi-service user-vlan 730 huawei(config)#service-port vlan 900 eth 0/3/2 multi-service user-vlan untagged huawei(config)#service-port vlan 730 eth 0/3/2 multi-service user-vlan 730 huawei(config)#service-port vlan 900 eth 0/3/3 multi-service user-vlan untagged huawei(config)#service-port vlan 730 eth 0/3/3 multi-service user-vlan 730