eSight 20.1 Product Description 12

Network Management

Network Management

Network Device Management

This section describes the definition, benefits, application scenarios, and functions of the network device management service.

Definition

Network device management allows Huawei network devices (such as switches, routers, firewalls, and WLAN devices) to be connected to eSight. eSight provides basic management functions, such as alarm, topology, and performance management, for connected devices and monitors the devices in a visualized manner on a large screen or in reports.

Benefits

Network device management implements centralized management of network resources, enabling O&M personnel to monitor network device information, learn about the running statuses and health statuses of devices, and detect network problems in advance.

  • O&M personnel can connect a large number of network devices to eSight and centrally manage network resources.
  • O&M personnel can monitor the basic information, KPIs, and peripheral links of network devices in the device overview to learn about the running status of network devices.
  • eSight proactively monitors device KPIs and alarm information, helping O&M personnel detect network problems in advance, locate, and analyze device faults.
  • Large screens and reports visualize device KPIs, helping O&M personnel quickly learn the overall health status of services.

Application Scenarios

Network device management is applicable to centralized network resource O&M and network device fault monitoring.

  • Centralized network resource O&M

    • O&M personnel can add network devices one by one or import network devices in batches, and centrally manage network resources (such as subracks, boards, subcards, ports, AR wireless interfaces, and electronic labels).
    • O&M personnel can view the network device overview to learn about basic information, KPIs, peripheral links, and running statuses of network devices.
    • O&M personnel can quickly learn the device networking mode and entire network running status based on the topology. Network devices and links are automatically displayed in the topology, and the device and link statuses are automatically monitored.
    • O&M personnel can periodically audit the running status of all devices based on various eSight report statistics.
  • Network device fault monitoring

    • O&M personnel can monitor device KPIs and detect network risks in a timely manner, improving device management efficiency.
    • Device alarm information is proactively reported and centrally displayed, helping O&M personnel analyze and determine fault types and faulty nodes and rectify network faults.

Functions

Network device management provides the following functions: network device access, network resource list, NE Explorer, and monitoring and management of device alarms, topologies, performance, and reports.

Network Device Access

eSight connects to network devices using SNMP. Table 3-3 describes the access modes.

Table 3-3 Network device access modes

Access Mode

Description

Application Scenario

Adding a single device

Only one device can be added at a time.

The network is running properly. Only a few devices need to be added, and the SNMP parameters on the devices are different.

Adding devices in batches

Add multiple devices with different IP addresses in batches using an Excel template.

Devices in many different network segments or a large number of devices in the same network segment need to be connected.

Automatic discovery

Add devices in batches by network segment.

Devices are scattered in one or more network segments, and SNMP parameter settings are the same for multiple devices in the network segment. Automatic discovery can be performed to add the devices in one or multiple network segments at a time.

For details about the types and models of network devices that can connect to eSight, see eSight Supported Devices.

Network Resource List

You can view information about devices and resources connected to eSight (such as subracks, boards, subcards, ports, AR wireless interfaces, and electronic labels), and perform operations such as quick search, synchronization, export, topology locating, and deletion. You can switch from the device list to the NE Explorer to view device details.

Figure 3-8 Network resource list

NE Explorer

The NE Explorer centrally displays information such as device details, alarm statistics, and KPIs, helping users view the status of a single device and analyze device faults.
Figure 3-9 NE Explorer

Alarm

eSight can centrally monitor alarms of network devices, provide various alarm handling rules, and send real-time notifications in different ways to efficiently monitor, locate, and rectify faults.

Performance

eSight can collect, analyze, and display performance data of network devices to monitor the health status and performance trend of devices.

Topology

eSight displays the topology of the entire network. Users can view the networking mode and running status of video devices in the topology view to learn about and monitor the running status of the entire network in real time.

Large Screen/Report

The preset Data Center Overview view is provided in the Workspace.

Figure 3-10 Data Center Overview

Besides preset views, eSight provides preset widgets for users to create network device views.

Figure 3-11 Customized network view

The network device management service provides the following default reports:

  • NE CPU and Memory Usage Report
  • Interface Traffic Performance Report
  • Link Traffic Statistics Report
  • Device Supplier Graphic Report
  • Device Category Graphic Report
  • Device Type Report
  • Port Usage Report
  • Optical Module Statistics Report
    Figure 3-12 Port usage report

Terminal Resource Management

This section describes the definition, benefits, application scenarios, and functions of terminal resource management.

Definition

Terminal resource management allows users to centrally manage and control terminals on the network, learn about terminal access information in a timely manner, and detect unauthorized and suspicious terminals.

Benefits

Terminal resource management allows users to learn about terminal access information in a timely manner and centrally manage terminals. Users can quickly locate, rectify faults, and detect unauthorized terminals, improving the security of using terminal resources.

Application Scenarios

Terminal resource management allows users to discover, monitor, and troubleshoot terminals.

  • Centralized terminal management

    O&M personnel can quickly find information about terminals on the network, intuitively learn terminal online statuses, view terminal online and offline history, and centrally manage terminals.

  • Quick troubleshooting

    O&M personnel can quickly view the running status, performance indicators, and alarms of devices and ports in the NE Explorer and device panel to locate terminal network faults. Terminal resource management facilitates fault demarcation and locating.

  • Terminal security control

    O&M personnel can quickly identify unauthorized terminals on the network based on the whitelist. This facilitates unauthorized access auditing and improves the security of using terminal resources.

Functions

The terminal resource management function includes centralized terminal management, quick fault locating, and terminal security management and control.

Centralized terminal management

  • Automatically discovers terminals on the network and displays terminal details in multiple dimensions, including the terminal MAC address, terminal IP address, device name, and port number.
  • Allows users to view historical terminal access records and unauthorized access records.
Figure 3-13 Terminal access records

Quick troubleshooting

  • Terminals not in the whitelist are identified as unauthorized.
    Figure 3-14 Unauthorized terminals
  • Users can click Access Ne Name and Access Port Name in the terminal access record list to access the NE Explorer. On the device panel, users can view the port status and perform port operations to locate terminal network faults.

Terminal Security Control

  • Users can maintain the MAC address whitelist on the whitelist page.
    Figure 3-15 Whitelist
  • On the terminal access records or unauthorized terminal page, users can select the terminals that are allowed to access eSight and add the corresponding MAC addresses to the MAC address whitelist.
  • In the unauthorized terminal list, users can view information about terminals not in the whitelist to demarcate and locate faults.
    Figure 3-16 Unauthorized terminals

Command Configuration Tool

This section describes the definition, benefits, application scenarios, functions, availability, principle, dependency, and limitation of the command configuration tool.

Definition

The command configuration tool delivers commands to network devices connected to eSight based on service requirements, helping users deliver device tasks on the GUI.

Benefits

  • Traditionally, scripts need to be prepared one by one to deliver configurations to devices, which is time-consuming and error-prone. The command configuration tool implements one-click deployment. Commands can be easily delivered using the configuration template and planning table, greatly improving network device configuration efficiency.
  • Traditionally, complex operations are required to configure different commands on devices, and fault locating is time consuming. The command configuration tool can be used to centrally manage, plan network devices, and analyze task execution results, helping O&M personnel locate and rectify faults.
  • Traditionally, devices tasks are executed in a single mode, which cannot meet O&M personnel's requirements on the task execution time. The command configuration tool allows O&M personnel to flexibly configure network devices and set the configuration execution time based on O&M requirements, improving user experience.

Application Scenarios

During the deployment of a network environment, a large number of devices must be configured. eSight can deliver templates or planning tables to configure network devices connected to eSight in batches, improving device configuration efficiency.

  • Template delivery

    This mode is applicable to delivering the same command parameters to multiple devices at the same time. You can customize or import a template as required.

  • Planning table delivery

    This mode is applicable to delivering different commands to multiple devices at the same time, facilitating customization.

Functions

The command configuration tool can configure services for eSight network devices and deliver tasks to network devices in a configuration template or planning table.

Template Delivery

A template allows users to quickly generate a configuration script to deliver the same commands to multiple devices in batches.

  • Template management
    • Importing or exporting a template: Users can import a preset template from the local PC to eSight or export a template from eSight and edit the template.
    • Creating a template: Users can create a template as required, edit the commands to be delivered, and save the customized template to eSight.
  • Template delivery

    Customized or imported templates are delivered to devices configured based on the wizard.

    Figure 3-17 Delivering templates

Planning Table Delivery

Users can use a network planning table to deliver different commands to devices in batches.

  • Planning table management

    Command planning table: A command planning table can deliver different commands to different devices. You need to download a command planning table template to the local PC and edit it.

  • Planning table delivery
    Planning tables configured by users are delivered to network devices.
    Figure 3-18 Delivering planning tables

Configuration Task

Users can centrally manage all delivery tasks on the Configuration Task page.

  • Users can view and delete tasks, or enable or disable periodic tasks.
  • Users can view delivery records, task execution details, modify, and redeliver commands that fail to be delivered.
  • Users can quickly locate the root cause of a configuration task that fails to be executed based on the delivery result and rectify the fault.
  • Users can quickly search for tasks by Task Name, Creator, Task Description, or Task Type, and view tasks.
Figure 3-19 Configuration tasks

Configuration File Management

This section describes the definition, benefits, application scenarios, and functions of the configuration file management service.

Definition

Configuration file management refers to using the configuration file management component to back up, restore, baseline, view, import, export, compare configuration files of managed devices, and set running configurations as startup configurations.

Benefits

Configuration file management helps O&M personnel learn about network configuration changes in a timely manner and quickly restore configuration files. This prevents device configuration losses caused by device faults and improves service security and reliability.

  • The configuration file management function backs up device configuration files in a timely manner, preventing device configuration loss caused by device faults and improving service security and reliability.
  • If the configuration file of a device is damaged or the device configuration is modified as required, you can use the configuration file restoration function to restore the backup and uploaded configuration file to the device to quickly restore services.
  • After a configuration file is backed up, the system automatically compares the differences to help O&M personnel learn about network configuration changes in a timely manner.

Application Scenarios

The configuration file on a device changes as the device services change or expand. To ensure configuration file security, the functions of backing up, restoring device configuration files, and sending notifications upon changes to configuration files are required.

  • Configuration file backup

    O&M personnel use the configuration file management service to back up device configuration files in a timely manner, preventing configuration loss and improving service security and reliability.

  • Configuration file restoration

    If the configuration file of a device is damaged due to a fault or the device configuration is modified, O&M personnel can restore the backup configuration file to the device to quickly restore device services, reducing the loss caused by the fault.

  • Configuration file changes

    O&M personnel can compare configuration files to learn about configuration changes, check whether the changes are valid, and handle the changes in a timely manner to prevent network attacks or unauthorized modification.

Functions

The configuration file management function includes configuration file backup, configuration file restoration, and configuration file change management.

Configuration File Backup

  • Allows users to manually or periodically, automatically back up configuration files.
  • Sends alarms upon failures in backing up configuration files.
  • Sets running configurations of devices as startup configurations.
Figure 3-20 Backing up configuration files

Configuration File Restoration

  • Restores backup configuration files to devices.
  • Exports configuration files to the local PC. Users can import local configuration files to eSight and restore configuration files to devices based on service requirements.

Configuration File Changes

  • Allows users to compare configuration files before and after the changes and view the change details.
    Figure 3-21 Comparing files
  • Sends alarms upon changes to configuration files.

SLA Management

This section describes the definition, benefits, application scenarios, functions, technical principles, dependency and limitations, as well as availability of SLA Management.

Definition

eSight can monitor, analyze, and manage the network status based on the SLA. SLA management allows users to customize KPIs for different services to monitor network quality. This provides a reliable basis for formulating a network performance optimization solution. In addition, the Network Quality Analysis (NQA) feature on network devices proactively sends diagnosis packets between network devices. In this way, various KPIs, such as the packet loss rate, delay, and jitter on links, can be measured to evaluate network service quality.

Benefits

SLA management monitors service and network quality and helps O&M personnel quickly demarcate and locate faults.

  • Network and service quality monitoring

    The eSight SLA builds a KPI system that covers multiple service network domains, such as video, voice, data, and IP networks, dynamically reports network and service health status changes, checks whether network services are affected, and visualizes network quality by displaying data in charts. This allows enterprise users to learn about user experience and uninterruptedly monitor network quality in real time.

  • Efficient fault demarcation and locating

    The SLA obtains returned values of test cases using the NQA protocol deployed on network devices and provides six types of test cases based on specific service and network testing requirements. This facilitates high-precision, high-frequency, and on-demand tests, helping to quickly demarcate and locate faults.

Application Scenarios

SLA management is applicable to network quality monitoring, network quality analysis, fast network diagnosis, and fault demarcation.

  • Network quality monitoring

    Helps enterprises monitor network quality data provided by carriers in real time around the clock to ensure that network quality meets the standards.

  • Network quality analysis
    • Monitors service quality of each QoS queue in two areas and compares service quality based on historical task data.
    • Allows O&M personnel to view the task status overview, SLA service types, top N minimum SLA compliance, and historical SLA task trend in the overview.
  • Quick network diagnosis

    Allows O&M personnel to use the quick diagnosis function to detect exceptions on a network where no SLA task is created and view network service quality.

  • Fault locating

    Network quality monitoring facilitates fault demarcation. If a problem is detected by E2E voice service diagnosis between campuses, segment-by-segment quick diagnosis can be performed. First, quick diagnosis is performed between the connected devices and campus egress devices. If no problem is detected, fast detection is performed on the egress devices (WAN) of the campuses. If a problem is detected, the fault can be demarcated as a WAN problem.

Functions

SLA management provides the network performance measurement and diagnosis functions. Users can create SLA tasks to periodically monitor the network delay, packet loss, and jitter, and calculate the current network compliance based on the SLA services.

By default, SLA Manager provides various types of SLA services. You can also customize SLA services as required. The overview function supports global SLA task monitoring, allowing users to quickly understand the overall quality of all services on the entire network. Fast diagnosis is used to temporarily diagnose the links between the source and sink devices and the services carried on the links, helping to quickly locate network faults.

SLA Overview

The SLA overview provides four types of preset widgets.

  • Service category

    Top five services are displayed. You can click a service to go to the task management list and filter out SLA tasks that do not contain the service.

  • Task status overview

    The statuses of all tasks are displayed, including stopped, started, invalid, and abnormal. Click a status color. The task management list automatically filters out tasks in other statuses.

  • Top N SLA minimum compliance

    Top five SLA tasks with minimum compliance within one hour are filtered and sorted in ascending order by compliance.

  • Historical trend statistics

    Service quality data charts display overall compliance and single-network indicator data, and historical data of multiple tasks at the same time.

Figure 3-22 SLA management overview

SLA Service Management

The SLA provides multiple predefined templates for common services, such as voice, video, and data services. Users can use the predefined templates to monitor service quality, or customize compliance and network quality KPI thresholds based on the O&M requirements and network status. Users can modify user-defined services in use.

Figure 3-23 SLA service management

Table 3-4 describes the services predefined in the system.

Table 3-4 Default SLA services

Service

Description

UDP Echo

This service tests the response speed of the specified port of the UDP connection, that is, tests the round trip time of the UDP packets between the source and the destination.

UDP Jitter

This service tests UDP packets forwarded between the source and the specified destination, and checks the response time, jitter, and packet loss.

DNS

This service tests the speed at which a given DNS name is converted into an IP address.

DHCP

This service tests the speed at which the source device assigns IP addresses.

RADIUS

This service tests the connectivity of the RADIUS server.

ICMP Echo

This service tests whether the destination is reachable from the source and the round-trip time of packets. This service is similar to the ping command but provides more information.

ICMP Jitter

This service detects network transmission quality, including the delay, jitter, and packet loss rate.

Signaling

A protocol at the session layer, which is used to set up a session before communication. This type of service has a high requirement for delay but a small amount of data. If the delay is long, users have to wait for a long time before starting communication. An example is the SIP protocol.

High-quality voice service

VoIP services, for example, the voice service for IP phones

Common voice service

VoIP services, for example, desktop eSpace voice service

Real-time application

Data applications often have high delay and jitter requirements and have low tolerance. An example is a stock trading system.

High-quality video service

High-quality, real-time, and highly interactive video services. Users of these services require superior video experience. An example is the telepresence conference system.

Common video service

Video services with common quality requirements. Examples are IPTV and desktop video conference.

Streaming media service

Unidirectional video services. Examples are video on demand (VoD) and video surveillance.

Common data service

Common enterprise data services

Key data service

This type of service is the most important and core data service in the information system of an enterprise. Other systems in the enterprise depend on this type of service. This type of service has delay requirements. If the delay is too long, the performance of other systems is affected. Examples are database read/write access and ERP system.

The following methods for calculating common network quality indicators are supported:

  • Latency = Interval for receiving a packet – Interval for sending the packet
  • Jitter = Interval for receiving two consecutive packets - Interval for sending the two packets
  • Packet loss rate = (Total number of sent packets - Total number of received packets)/Total number of sent packets x 100%

SLA Task Management

SLA tasks periodically monitor various indicators, such as the delay, jitter, and packet loss rate on a network. On the SLA task management page, you can create, delete, start, and stop SLA tasks. The collection period of SLA tasks can be intelligently adjusted. If the network quality deteriorates, the collection frequency can be automatically increased to provide more details about quality deterioration.

Figure 3-24 SLA task management

Quick Diagnosis

Network quality can be quickly diagnosed without tasks, allowing users to learn real-time network quality.

Figure 3-25 Quick diagnosis

Historical Data

Specific historical SLA data can be viewed, and historical data of multiple tasks can be displayed simultaneously.

Figure 3-26 Historical data

SLA Reports

SLA Task Counter Report, SLA Service Quality ReportTopN, and TopN SLA Compliance Report are provided.

WLAN Management

This document describes the definition, benefits, application scenarios, functions, standards and protocols, availability, technical principles, dependencies, and limitations of eSight WLAN Management.

Definition

A wireless local area network (WLAN) refers to a network system in which devices with wireless network cards are interconnected using RF wireless communications technologies to provide network services for users with wireless terminals, such as a mobile phone or a notebook computer.

On a common WLAN, access points (APs) are deployed in a distributed manner to provide access capabilities for STAs. The wireless access controller (WAC) centrally manages APs and provides large-capacity, highly reliable, and easy-to-maintain wireless data control services.

Benefits

A WLAN is a typical cluster network with a large number of APs. WLAN O&M is expensive and difficult. Unlike wired networks, wireless networks are more vulnerable to interference sources and attacks due to their openness. AP deployment locations, RF channel planning, and power configuration directly affect user experience, posing high requirements on O&M personnel. The eSight WLAN management service provides resource and regional monitoring and O&M capabilities, helping network administrators efficiently perform high-quality network planning and routine monitoring, achieve operations and O&M objectives, and ensure wireless user experience.

Application Scenarios

WLAN management is applicable to wireless network planning, wireless network monitoring, user detection, and WLAN resource management.

  • The administrator can use either of the following methods to plan wireless networks based on regional monitoring:
    • Import the planning table or the project file generated by the network planning tool.
    • Manually plan the network.

    The network planning procedure is as follows:

    1. Create a region by campus, building, floor, or other dimensions.
    2. Import the floor plan construction background image, set the scale based on the distance, and add obstacles.
    3. Deploy APs at the installation locations.
  • The administrator monitors wireless networks based on WLAN resource and regional monitoring and focuses on routine operations and O&M information, including:
    1. Number of regions, deployed devices, and users
    2. Peak hours, hotspots, and traffic
    3. Network device running statuses, KPIs, alarms, top faulty devices, and ticket dispatching
  • The administrator ensures user experience based on WLAN resource management and user detection.
    1. A user reports poor Internet access experience (such as access failure, frequently offline, frame freezing, and unexpected exit).
    2. The administrator can quickly locate the user based on key information, such as the user name.
    3. Perform user detection to locate the fault cause.
    4. Adjust and optimize the network based on the suggestions to resolve user experience problems.

Functions

WLAN management provides management, alarm reporting, and performance monitoring for wireless resources (such as WACs, APs, RF devices, and VAPs), region-based wireless network planning, seamless interconnection with network planning tools, wireless user management, fast detection, and KPI monitoring.

Homepage Portal

A preset WLAN overview is provided on the home page for the administrator to view WLAN operations and O&M information on a large screen. Various page widgets provide the following capabilities:

  • Overview: Collects statistics on the number of planned regions, number of sent Wi-Fi signals, number of managed devices, device statuses (online/offline), number of users, and traffic.
  • Top region statistics: Collects statistics on regions with a large number of users and heavy traffic, and identifies hotspots.
  • Top AP statistics: Collects statistics on APs with the highest CPU and memory usage and the largest number of users, providing data for capacity expansion or network plan adjustment.
  • User and traffic trends: Collects statistics on the number of users and traffic by time, and identifies peak hours.
  • Regional monitoring: Displays operations information in a topology, including regions with a large number of users and heavy traffic.

WLAN Resource Management

WLAN resource management allows users to view information about physical resources, statistics, user information, and performance data on the entire network and in each area.

  • Overview

    This page summarizes WLAN management functions, including the overview, top AP statistics, top region statistics, the user trend, channel usage, the traffic trend, and region monitoring. The overview displays basic WLAN statistics, such as the number of APs and WACs by status, number of planned regions, number of users, and traffic. Top AP statistics show APs with the highest CPU usage, memory usage, or number of users. Top region statistics show regions with the largest number of users or the highest traffic. The user trend shows the number of users in a region based on the total number, 2.4 GHz/5 GHz, SSID, or other dimensions. The channel usage statistics show the trend of average channel usage in a region. The traffic statistics show the traffic trend in a region. The regional monitoring function displays the basic information, traffic, and number of users by region and AP in a topology.

  • WAC list

    The WAC list page displays the managed WAC data, including the name, status, IP address, and vendor. In addition, functions such as sorting, filtering, and column visibility settings are provided. You can click a WAC name to open a new page and view WAC details. Click Performance task management. On the displayed page, you can view WAC task details, delete device tasks, and re-deliver eSight tasks.

    Figure 3-27 WAC list
  • WAC details

    The WAC details page displays information about APs connected to the WAC and AP groups configured on the WAC. You can create, modify, and delete AP groups.

  • AP list

    The AP list displays information about managed APs, including the name, status, IP address, and type. In addition, the sorting, filtering, and visible column setting functions are provided. You can click an AP and view AP details on the page that is displayed.

    Figure 3-28 AP list
  • Basic AP information

    The basic information page displays the basic information, RF information, VAP information, and wired port information about the AP. You can click an RF ID and view details about an RF device.

  • RF details

    The RF details page displays basic, VAP, and KPI information about an RF device.

  • User list

    The user list page displays the data of managed users, including the current and historical access users. The current access user list displays information such as the user name, status, IP address, and access type, and provides functions such as sorting, filtering, and visible column setting. The historical access user list displays information such as the user name, occurrence time, and WAC name, and provides functions such as sorting, filtering, and visible column setting. You can click a MAC address of a user to open a new page and view details of the user.

    Figure 3-29 User list
  • User details

    The user details page displays basic user information, including the last access information, historical user access list, and historical user access KPIs. Quick user detection can quickly analyze user experience, identify root causes of network problems, and provide troubleshooting suggestions.

  • SSID list

    The SSID list displays information about the managed SSIDs, including the WAC or AP name, profile name, number of APs, and number of VAPs. In addition, the sorting and filtering functions are provided. You can click a WAC or AP name and view details about the WAC or AP on the displayed page.

    Figure 3-30 SSID list
  • Region list

    The region list page displays region data. If you click a non-bottom-layer region in the region tree, the region list is displayed on the right, displaying region names, the total number of APs, and the number of online APs. If you click a bottom-layer region in the region tree, the AP list is displayed on the right, displaying AP names, statuses, IP addresses, and types. The administrator can review the overall AP plan based on the region list.

    Figure 3-31 Region list
  • Security

    eSight monitors and recognizes unauthorized APs and devices, clients, interference sources, and attacks based on rules defined by the administrator, and sends remote alarm notifications.

    • Statistics collection and display of unauthorized devices are supported. Unauthorized clients associated with unauthorized APs can be displayed.
    • Unauthorized clients can be displayed.
    • Statistics collection and display of non-Wi-Fi interference sources are supported.
    • Attack statistics collection and display are supported.
    • Unauthorized APs can be classified into rogue, suspected-rogue, adjacent, suspected-adjacent, and interference APs. Supported rules include adjacent or same frequency interference, signal strength, SSID (fuzzy or regular expression), number of detected APs, and attack.
  • Setting

    Parameter setting is supported to centrally manage global configurations in the system, including the resource polling synchronization period and policy.

    • Inventory, AP, and user information polling can be enabled or disabled.
    • Inventory, AP, and user polling intervals can be modified and set to 15 minutes, 30 minutes, or 60 minutes.
    • The synchronization policy is supported for all devices and specified devices.
    • Records can be added or deleted in the whitelist for specified devices.

      If eSight manages a large number of devices that support the WLAN function but do not use WLAN services, you can set a whitelist to synchronize only the devices that use WLAN services to reduce system resource consumption.

Configuration Management

WLAN management supports WLAN device configuration. APs can be restarted or restored to factory settings to quickly rectify AP faults.

This function is applicable only to WLAN devices with a software version of V200R006 or later.

  • Restart an AP: Perform this operation when an AP is upgraded online or when the network is calibrated.
  • Restore an AP to factory settings: Perform this operation when AP settings are faulty or when the network is calibrated.

Regional Monitoring

Regional monitoring visualizes network planning and simulation, and integrates network planning information and KPIs in the topology to improve user experience.

  • Allows users to use a planning table or planning project file to seamlessly import network planning data (planned regions, obstacles, AP locations, and other information) from the network planning tool to eSight.
  • Allows users to plan regions by campus, building, floor, or other dimensions, import the background image, set and view the scale, view the obstacle types, set obstacles, and deploy APs. For a non-bottom-layer region, users can set a GIS map as the subnet background. In addition, users can perform operations such as zooming in or out the map, moving the map, and setting locations on the map.
  • Allows users to view the KPI portal by region, analyze user experience, set the time, and view historical KPI data.

  • Allows users to further locate and analyze issues that affect user experience based on regional KPIs and analyze root causes by viewing AP, RF, and user details.

Translation
Favorite
Download
Update Date:2023-11-03
Document ID:EDOC1100192921
Views:94438
Downloads:861
Average rating:0.0Points

Digital Signature File

digtal sigature tool