No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.

Configuration Guide - WLAN-AC
S12700 and S12700E V200R019C10

This document describes the configurations of WLAN, including WLAN Service Configuration, Radio Resource Management, Roaming, WLAN QoS, WLAN Security, WDS, Mesh, Location, Hotspot 2.0, Dual-Link Cold Backup, N+1 Backup.

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
About This Document

About This Document

Intended Audience

This document provides the basic concepts, configuration procedures, and configuration examples in different application scenarios of the WLAN feature supported by the device.

This document describes how to configure the WLAN feature. The S12700 and S12700Es are referred to as WLAN Access Controllers (WLAN ACs) in this document to facilitate WLAN AC function descriptions unless otherwise stated.

This document is intended for:

  • Data configuration engineers
  • Commissioning engineers
  • Network monitoring engineers
  • System maintenance engineers

Symbol Conventions

The symbols that may be found in this document are defined as follows.



Indicates a potentially hazardous situation which, if not avoided, could result in equipment damage, data loss, performance deterioration, or unanticipated results.

NOTICE is used to address practices not related to personal injury.

Calls attention to important information, best practices and tips.

NOTE is used to address information not related to personal injury, equipment damage, and environment deterioration.

Command Conventions

The command conventions that may be found in this document are defined as follows.




The keywords of a command line are in boldface.


Command arguments are in italics.

[ ]

Items (keywords or arguments) in brackets [ ] are optional.

{ x | y | ... }

Optional items are grouped in braces and separated by vertical bars. One item is selected.

[ x | y | ... ]

Optional items are grouped in brackets and separated by vertical bars. One item is selected or no item is selected.

{ x | y | ... }*

Optional items are grouped in braces and separated by vertical bars. A minimum of one item or a maximum of all items can be selected.

[ x | y | ... ]*

Optional items are grouped in brackets and separated by vertical bars. Several items or no item can be selected.


The parameter before the & sign can be repeated 1 to n times.


A line starting with the # sign is comments.

The interface types, command outputs, and device models provided in this manual vary according to device configurations and may differ from the actual information.

To obtain better user experience, you are advised to set the number of columns displayed on the command line editor to 132 or higher.

Interface Numbering Conventions

Interface numbers used in this manual are examples. In device configuration, use the existing interface numbers on devices.

To obtain better user experience, you are advised to set the number of columns displayed on the command line editor to 132 or higher.

Security Conventions

  • Password setting
    • When configuring a password, the cipher text is recommended. To ensure device security, change the password periodically.
    • When you configure a password in cipher text that starts and ends with (the password can be decrypted by the device), the password is displayed in the same manner as the configured one in the configuration file. Do not use this setting.
  • Encryption algorithm

    Currently, the device uses the following encryption algorithms: DES, AES, SHA-1, SHA-2, and MD5. DES and AES are reversible, and SHA-1, SHA-2, and MD5 are irreversible. The encryption algorithm depends on actual networking. If protocols are used for interconnection, the locally stored password must be reversible. It is recommended that the irreversible encryption algorithm be used for the administrator password.

  • Personal data

    Some personal data may be obtained or used during operation or fault location of your purchased products, services, features, so you have an obligation to make privacy policies and take measures according to the applicable law of the country to protect personal data.

  • The terms mirrored port, port mirroring, traffic mirroring, and mirroring in this document are mentioned only to describe the product's function of communication error or failure detection, and do not involve collection or processing of any personal information or communication data of users.

Reference Standards and Protocols

To obtain reference standards and protocols, log in to Huawei official website, search for Protocol Compliance List, and download the Huawei WLAN Protocol Compliance List.


  • This document is only a reference for you to configure your devices. The contents in the document, such as web pages, command line syntax, and command outputs, are based on the device conditions in the lab. The document provides instructions for general scenarios, but do not cover all usage scenarios of all product models. The contents in the document may be different from your actual device situations due to the differences in software versions, models, and configuration files. The document will not list every possible difference. You should configure your devices according to actual situations.

  • The maximum values provided in this document are obtained in specific lab environments (for example, the tested devices are only configured with one type of protocol). The actual tested data may be different according to device types or transmitted services.
  • In this document, public IP addresses may be used in feature introduction and configuration examples and are for reference only unless otherwise specified.

Product Software Versions Matching NMS Versions

The product software versions matching NMS versions are as follows.

S12700 and S12700E Product Software Version



eSight V300R010C00SPC600 (recommended)

Network Cloud Engine V100R019C10

eSight Network V300R009C00. If this version is used, the latest patch needs to be installed and activated on S series switches. For details, see the eSight Specification List.

Use of Interface Cards

X series cards are required when the WLAN AC function is configured on a switch.

If APs need to connect to the AC through non-X series interface cards, you need to configure the centralized AC function by adding the X series and non-X series interface cards to the same WLAN work group.

For details about the mapping interface cards, see the Card Classification in Hardware Description.

AP Version Support

The following table describes the mapping relationship between the product and AP software versions.

S12700 and S12700E Software Version

AP Software Version
































The central AP and RU must have the same version. For example, if the central AP version is V200R006C20, the RU version must be also V200R006C20.

Updated: 2020-02-18

Document ID: EDOC1100126930

Views: 7550

Downloads: 1

Average rating:
This Document Applies to these Products

Related Version

Related Documents

Previous Next