eSight 20.1 Product Description 12
Network Management
This section describes the definitions, benefits, application scenarios, and functions of network device management.
Network Device Management
This section describes the definition, benefits, application scenarios, and functions of the network device management service.
Definition
Network device management allows Huawei network devices (such as switches, routers, firewalls, and WLAN devices) to be connected to eSight. eSight provides basic management functions, such as alarm, topology, and performance management, for connected devices and monitors the devices in a visualized manner on a large screen or in reports.
Benefits
Network device management implements centralized management of network resources, enabling O&M personnel to monitor network device information, learn about the running statuses and health statuses of devices, and detect network problems in advance.
- O&M personnel can connect a large number of network devices to eSight and centrally manage network resources.
- O&M personnel can monitor the basic information, KPIs, and peripheral links of network devices in the device overview to learn about the running status of network devices.
- eSight proactively monitors device KPIs and alarm information, helping O&M personnel detect network problems in advance, locate, and analyze device faults.
- Large screens and reports visualize device KPIs, helping O&M personnel quickly learn the overall health status of services.
Application Scenarios
Network device management is applicable to centralized network resource O&M and network device fault monitoring.
Centralized network resource O&M
- O&M personnel can add network devices one by one or import network devices in batches, and centrally manage network resources (such as subracks, boards, subcards, ports, AR wireless interfaces, and electronic labels).
- O&M personnel can view the network device overview to learn about basic information, KPIs, peripheral links, and running statuses of network devices.
- O&M personnel can quickly learn the device networking mode and entire network running status based on the topology. Network devices and links are automatically displayed in the topology, and the device and link statuses are automatically monitored.
- O&M personnel can periodically audit the running status of all devices based on various eSight report statistics.
Network device fault monitoring
- O&M personnel can monitor device KPIs and detect network risks in a timely manner, improving device management efficiency.
- Device alarm information is proactively reported and centrally displayed, helping O&M personnel analyze and determine fault types and faulty nodes and rectify network faults.
Functions
Network device management provides the following functions: network device access, network resource list, NE Explorer, and monitoring and management of device alarms, topologies, performance, and reports.
Network Device Access
eSight connects to network devices using SNMP. Table 3-3 describes the access modes.
Access Mode |
Description |
Application Scenario |
---|---|---|
Adding a single device |
Only one device can be added at a time. |
The network is running properly. Only a few devices need to be added, and the SNMP parameters on the devices are different. |
Adding devices in batches |
Add multiple devices with different IP addresses in batches using an Excel template. |
Devices in many different network segments or a large number of devices in the same network segment need to be connected. |
Automatic discovery |
Add devices in batches by network segment. |
Devices are scattered in one or more network segments, and SNMP parameter settings are the same for multiple devices in the network segment. Automatic discovery can be performed to add the devices in one or multiple network segments at a time. |
For details about the types and models of network devices that can connect to eSight, see eSight Supported Devices.
Network Resource List
You can view information about devices and resources connected to eSight (such as subracks, boards, subcards, ports, AR wireless interfaces, and electronic labels), and perform operations such as quick search, synchronization, export, topology locating, and deletion. You can switch from the device list to the NE Explorer to view device details.
NE Explorer
Alarm
eSight can centrally monitor alarms of network devices, provide various alarm handling rules, and send real-time notifications in different ways to efficiently monitor, locate, and rectify faults.
Performance
eSight can collect, analyze, and display performance data of network devices to monitor the health status and performance trend of devices.
Topology
eSight displays the topology of the entire network. Users can view the networking mode and running status of video devices in the topology view to learn about and monitor the running status of the entire network in real time.
Large Screen/Report
The preset Data Center Overview view is provided in the Workspace.
Besides preset views, eSight provides preset widgets for users to create network device views.
The network device management service provides the following default reports:
- NE CPU and Memory Usage Report
- Interface Traffic Performance Report
- Link Traffic Statistics Report
- Device Supplier Graphic Report
- Device Category Graphic Report
- Device Type Report
- Port Usage Report
- Optical Module Statistics ReportFigure 3-12 Port usage report
Terminal Resource Management
This section describes the definition, benefits, application scenarios, and functions of terminal resource management.
Definition
Terminal resource management allows users to centrally manage and control terminals on the network, learn about terminal access information in a timely manner, and detect unauthorized and suspicious terminals.
Benefits
Terminal resource management allows users to learn about terminal access information in a timely manner and centrally manage terminals. Users can quickly locate, rectify faults, and detect unauthorized terminals, improving the security of using terminal resources.
Application Scenarios
Terminal resource management allows users to discover, monitor, and troubleshoot terminals.
Centralized terminal management
O&M personnel can quickly find information about terminals on the network, intuitively learn terminal online statuses, view terminal online and offline history, and centrally manage terminals.
Quick troubleshooting
O&M personnel can quickly view the running status, performance indicators, and alarms of devices and ports in the NE Explorer and device panel to locate terminal network faults. Terminal resource management facilitates fault demarcation and locating.
- Terminal security control
O&M personnel can quickly identify unauthorized terminals on the network based on the whitelist. This facilitates unauthorized access auditing and improves the security of using terminal resources.
Functions
The terminal resource management function includes centralized terminal management, quick fault locating, and terminal security management and control.
Centralized terminal management
- Automatically discovers terminals on the network and displays terminal details in multiple dimensions, including the terminal MAC address, terminal IP address, device name, and port number.
- Allows users to view historical terminal access records and unauthorized access records.
Quick troubleshooting
- Terminals not in the whitelist are identified as unauthorized.Figure 3-14 Unauthorized terminals
- Users can click Access Ne Name and Access Port Name in the terminal access record list to access the NE Explorer. On the device panel, users can view the port status and perform port operations to locate terminal network faults.
Terminal Security Control
- Users can maintain the MAC address whitelist on the whitelist page.Figure 3-15 Whitelist
- On the terminal access records or unauthorized terminal page, users can select the terminals that are allowed to access eSight and add the corresponding MAC addresses to the MAC address whitelist.
- In the unauthorized terminal list, users can view information about terminals not in the whitelist to demarcate and locate faults.Figure 3-16 Unauthorized terminals
Command Configuration Tool
This section describes the definition, benefits, application scenarios, functions, availability, principle, dependency, and limitation of the command configuration tool.
Definition
The command configuration tool delivers commands to network devices connected to eSight based on service requirements, helping users deliver device tasks on the GUI.
Benefits
- Traditionally, scripts need to be prepared one by one to deliver configurations to devices, which is time-consuming and error-prone. The command configuration tool implements one-click deployment. Commands can be easily delivered using the configuration template and planning table, greatly improving network device configuration efficiency.
- Traditionally, complex operations are required to configure different commands on devices, and fault locating is time consuming. The command configuration tool can be used to centrally manage, plan network devices, and analyze task execution results, helping O&M personnel locate and rectify faults.
- Traditionally, devices tasks are executed in a single mode, which cannot meet O&M personnel's requirements on the task execution time. The command configuration tool allows O&M personnel to flexibly configure network devices and set the configuration execution time based on O&M requirements, improving user experience.
Application Scenarios
During the deployment of a network environment, a large number of devices must be configured. eSight can deliver templates or planning tables to configure network devices connected to eSight in batches, improving device configuration efficiency.
- Template delivery
This mode is applicable to delivering the same command parameters to multiple devices at the same time. You can customize or import a template as required.
- Planning table delivery
This mode is applicable to delivering different commands to multiple devices at the same time, facilitating customization.
Functions
The command configuration tool can configure services for eSight network devices and deliver tasks to network devices in a configuration template or planning table.
Template Delivery
A template allows users to quickly generate a configuration script to deliver the same commands to multiple devices in batches.
- Template management
- Importing or exporting a template: Users can import a preset template from the local PC to eSight or export a template from eSight and edit the template.
- Creating a template: Users can create a template as required, edit the commands to be delivered, and save the customized template to eSight.
- Template delivery
Customized or imported templates are delivered to devices configured based on the wizard.
Figure 3-17 Delivering templates
Planning Table Delivery
Users can use a network planning table to deliver different commands to devices in batches.
- Planning table management
Command planning table: A command planning table can deliver different commands to different devices. You need to download a command planning table template to the local PC and edit it.
- Planning table delivery Planning tables configured by users are delivered to network devices.Figure 3-18 Delivering planning tables
Configuration Task
Users can centrally manage all delivery tasks on the Configuration Task page.
- Users can view and delete tasks, or enable or disable periodic tasks.
- Users can view delivery records, task execution details, modify, and redeliver commands that fail to be delivered.
- Users can quickly locate the root cause of a configuration task that fails to be executed based on the delivery result and rectify the fault.
- Users can quickly search for tasks by Task Name, Creator, Task Description, or Task Type, and view tasks.
Configuration File Management
This section describes the definition, benefits, application scenarios, and functions of the configuration file management service.
Definition
Configuration file management refers to using the configuration file management component to back up, restore, baseline, view, import, export, compare configuration files of managed devices, and set running configurations as startup configurations.
Benefits
Configuration file management helps O&M personnel learn about network configuration changes in a timely manner and quickly restore configuration files. This prevents device configuration losses caused by device faults and improves service security and reliability.
- The configuration file management function backs up device configuration files in a timely manner, preventing device configuration loss caused by device faults and improving service security and reliability.
- If the configuration file of a device is damaged or the device configuration is modified as required, you can use the configuration file restoration function to restore the backup and uploaded configuration file to the device to quickly restore services.
- After a configuration file is backed up, the system automatically compares the differences to help O&M personnel learn about network configuration changes in a timely manner.
Application Scenarios
The configuration file on a device changes as the device services change or expand. To ensure configuration file security, the functions of backing up, restoring device configuration files, and sending notifications upon changes to configuration files are required.
- Configuration file backup
O&M personnel use the configuration file management service to back up device configuration files in a timely manner, preventing configuration loss and improving service security and reliability.
- Configuration file restoration
If the configuration file of a device is damaged due to a fault or the device configuration is modified, O&M personnel can restore the backup configuration file to the device to quickly restore device services, reducing the loss caused by the fault.
- Configuration file changes
O&M personnel can compare configuration files to learn about configuration changes, check whether the changes are valid, and handle the changes in a timely manner to prevent network attacks or unauthorized modification.
Functions
The configuration file management function includes configuration file backup, configuration file restoration, and configuration file change management.
Configuration File Backup
- Allows users to manually or periodically, automatically back up configuration files.
- Sends alarms upon failures in backing up configuration files.
- Sets running configurations of devices as startup configurations.
Configuration File Restoration
- Restores backup configuration files to devices.
- Exports configuration files to the local PC. Users can import local configuration files to eSight and restore configuration files to devices based on service requirements.
Configuration File Changes
- Allows users to compare configuration files before and after the changes and view the change details.Figure 3-21 Comparing files
- Sends alarms upon changes to configuration files.
SLA Management
This section describes the definition, benefits, application scenarios, functions, technical principles, dependency and limitations, as well as availability of SLA Management.
Definition
eSight can monitor, analyze, and manage the network status based on the SLA. SLA management allows users to customize KPIs for different services to monitor network quality. This provides a reliable basis for formulating a network performance optimization solution. In addition, the Network Quality Analysis (NQA) feature on network devices proactively sends diagnosis packets between network devices. In this way, various KPIs, such as the packet loss rate, delay, and jitter on links, can be measured to evaluate network service quality.
Benefits
SLA management monitors service and network quality and helps O&M personnel quickly demarcate and locate faults.
- Network and service quality monitoring
The eSight SLA builds a KPI system that covers multiple service network domains, such as video, voice, data, and IP networks, dynamically reports network and service health status changes, checks whether network services are affected, and visualizes network quality by displaying data in charts. This allows enterprise users to learn about user experience and uninterruptedly monitor network quality in real time.
- Efficient fault demarcation and locating
The SLA obtains returned values of test cases using the NQA protocol deployed on network devices and provides six types of test cases based on specific service and network testing requirements. This facilitates high-precision, high-frequency, and on-demand tests, helping to quickly demarcate and locate faults.
Application Scenarios
SLA management is applicable to network quality monitoring, network quality analysis, fast network diagnosis, and fault demarcation.
- Network quality monitoring
Helps enterprises monitor network quality data provided by carriers in real time around the clock to ensure that network quality meets the standards.
- Network quality analysis
- Monitors service quality of each QoS queue in two areas and compares service quality based on historical task data.
- Allows O&M personnel to view the task status overview, SLA service types, top N minimum SLA compliance, and historical SLA task trend in the overview.
- Quick network diagnosis
Allows O&M personnel to use the quick diagnosis function to detect exceptions on a network where no SLA task is created and view network service quality.
- Fault locating
Network quality monitoring facilitates fault demarcation. If a problem is detected by E2E voice service diagnosis between campuses, segment-by-segment quick diagnosis can be performed. First, quick diagnosis is performed between the connected devices and campus egress devices. If no problem is detected, fast detection is performed on the egress devices (WAN) of the campuses. If a problem is detected, the fault can be demarcated as a WAN problem.
Functions
SLA management provides the network performance measurement and diagnosis functions. Users can create SLA tasks to periodically monitor the network delay, packet loss, and jitter, and calculate the current network compliance based on the SLA services.
By default, SLA Manager provides various types of SLA services. You can also customize SLA services as required. The overview function supports global SLA task monitoring, allowing users to quickly understand the overall quality of all services on the entire network. Fast diagnosis is used to temporarily diagnose the links between the source and sink devices and the services carried on the links, helping to quickly locate network faults.
SLA Overview
The SLA overview provides four types of preset widgets.
- Service category
Top five services are displayed. You can click a service to go to the task management list and filter out SLA tasks that do not contain the service.
- Task status overview
The statuses of all tasks are displayed, including stopped, started, invalid, and abnormal. Click a status color. The task management list automatically filters out tasks in other statuses.
- Top N SLA minimum compliance
Top five SLA tasks with minimum compliance within one hour are filtered and sorted in ascending order by compliance.
- Historical trend statistics
Service quality data charts display overall compliance and single-network indicator data, and historical data of multiple tasks at the same time.
SLA Service Management
The SLA provides multiple predefined templates for common services, such as voice, video, and data services. Users can use the predefined templates to monitor service quality, or customize compliance and network quality KPI thresholds based on the O&M requirements and network status. Users can modify user-defined services in use.
Table 3-4 describes the services predefined in the system.
Service |
Description |
---|---|
UDP Echo |
This service tests the response speed of the specified port of the UDP connection, that is, tests the round trip time of the UDP packets between the source and the destination. |
UDP Jitter |
This service tests UDP packets forwarded between the source and the specified destination, and checks the response time, jitter, and packet loss. |
DNS |
This service tests the speed at which a given DNS name is converted into an IP address. |
DHCP |
This service tests the speed at which the source device assigns IP addresses. |
RADIUS |
This service tests the connectivity of the RADIUS server. |
ICMP Echo |
This service tests whether the destination is reachable from the source and the round-trip time of packets. This service is similar to the ping command but provides more information. |
ICMP Jitter |
This service detects network transmission quality, including the delay, jitter, and packet loss rate. |
Signaling |
A protocol at the session layer, which is used to set up a session before communication. This type of service has a high requirement for delay but a small amount of data. If the delay is long, users have to wait for a long time before starting communication. An example is the SIP protocol. |
High-quality voice service |
VoIP services, for example, the voice service for IP phones |
Common voice service |
VoIP services, for example, desktop eSpace voice service |
Real-time application |
Data applications often have high delay and jitter requirements and have low tolerance. An example is a stock trading system. |
High-quality video service |
High-quality, real-time, and highly interactive video services. Users of these services require superior video experience. An example is the telepresence conference system. |
Common video service |
Video services with common quality requirements. Examples are IPTV and desktop video conference. |
Streaming media service |
Unidirectional video services. Examples are video on demand (VoD) and video surveillance. |
Common data service |
Common enterprise data services |
Key data service |
This type of service is the most important and core data service in the information system of an enterprise. Other systems in the enterprise depend on this type of service. This type of service has delay requirements. If the delay is too long, the performance of other systems is affected. Examples are database read/write access and ERP system. |
The following methods for calculating common network quality indicators are supported:
- Latency = Interval for receiving a packet – Interval for sending the packet
- Jitter = Interval for receiving two consecutive packets - Interval for sending the two packets
- Packet loss rate = (Total number of sent packets - Total number of received packets)/Total number of sent packets x 100%
SLA Task Management
SLA tasks periodically monitor various indicators, such as the delay, jitter, and packet loss rate on a network. On the SLA task management page, you can create, delete, start, and stop SLA tasks. The collection period of SLA tasks can be intelligently adjusted. If the network quality deteriorates, the collection frequency can be automatically increased to provide more details about quality deterioration.
Quick Diagnosis
Network quality can be quickly diagnosed without tasks, allowing users to learn real-time network quality.
Historical Data
Specific historical SLA data can be viewed, and historical data of multiple tasks can be displayed simultaneously.
SLA Reports
SLA Task Counter Report, SLA Service Quality ReportTopN, and TopN SLA Compliance Report are provided.
WLAN Management
This document describes the definition, benefits, application scenarios, functions, standards and protocols, availability, technical principles, dependencies, and limitations of eSight WLAN Management.
Definition
A wireless local area network (WLAN) refers to a network system in which devices with wireless network cards are interconnected using RF wireless communications technologies to provide network services for users with wireless terminals, such as a mobile phone or a notebook computer.
On a common WLAN, access points (APs) are deployed in a distributed manner to provide access capabilities for STAs. The wireless access controller (WAC) centrally manages APs and provides large-capacity, highly reliable, and easy-to-maintain wireless data control services.
Benefits
A WLAN is a typical cluster network with a large number of APs. WLAN O&M is expensive and difficult. Unlike wired networks, wireless networks are more vulnerable to interference sources and attacks due to their openness. AP deployment locations, RF channel planning, and power configuration directly affect user experience, posing high requirements on O&M personnel. The eSight WLAN management service provides resource and regional monitoring and O&M capabilities, helping network administrators efficiently perform high-quality network planning and routine monitoring, achieve operations and O&M objectives, and ensure wireless user experience.
Application Scenarios
WLAN management is applicable to wireless network planning, wireless network monitoring, user detection, and WLAN resource management.
- The administrator can use either of the following methods to plan wireless networks based on regional monitoring:
- Import the planning table or the project file generated by the network planning tool.
- Manually plan the network.
The network planning procedure is as follows:
- Create a region by campus, building, floor, or other dimensions.
- Import the floor plan construction background image, set the scale based on the distance, and add obstacles.
- Deploy APs at the installation locations.
- The administrator monitors wireless networks based on WLAN resource and regional monitoring and focuses on routine operations and O&M information, including:
- Number of regions, deployed devices, and users
- Peak hours, hotspots, and traffic
- Network device running statuses, KPIs, alarms, top faulty devices, and ticket dispatching
- The administrator ensures user experience based on WLAN resource management and user detection.
- A user reports poor Internet access experience (such as access failure, frequently offline, frame freezing, and unexpected exit).
- The administrator can quickly locate the user based on key information, such as the user name.
- Perform user detection to locate the fault cause.
- Adjust and optimize the network based on the suggestions to resolve user experience problems.
Functions
WLAN management provides management, alarm reporting, and performance monitoring for wireless resources (such as WACs, APs, RF devices, and VAPs), region-based wireless network planning, seamless interconnection with network planning tools, wireless user management, fast detection, and KPI monitoring.
Homepage Portal
A preset WLAN overview is provided on the home page for the administrator to view WLAN operations and O&M information on a large screen. Various page widgets provide the following capabilities:
- Overview: Collects statistics on the number of planned regions, number of sent Wi-Fi signals, number of managed devices, device statuses (online/offline), number of users, and traffic.
- Top region statistics: Collects statistics on regions with a large number of users and heavy traffic, and identifies hotspots.
- Top AP statistics: Collects statistics on APs with the highest CPU and memory usage and the largest number of users, providing data for capacity expansion or network plan adjustment.
- User and traffic trends: Collects statistics on the number of users and traffic by time, and identifies peak hours.
- Regional monitoring: Displays operations information in a topology, including regions with a large number of users and heavy traffic.
WLAN Resource Management
WLAN resource management allows users to view information about physical resources, statistics, user information, and performance data on the entire network and in each area.
- Overview
This page summarizes WLAN management functions, including the overview, top AP statistics, top region statistics, the user trend, channel usage, the traffic trend, and region monitoring. The overview displays basic WLAN statistics, such as the number of APs and WACs by status, number of planned regions, number of users, and traffic. Top AP statistics show APs with the highest CPU usage, memory usage, or number of users. Top region statistics show regions with the largest number of users or the highest traffic. The user trend shows the number of users in a region based on the total number, 2.4 GHz/5 GHz, SSID, or other dimensions. The channel usage statistics show the trend of average channel usage in a region. The traffic statistics show the traffic trend in a region. The regional monitoring function displays the basic information, traffic, and number of users by region and AP in a topology.
- WAC list
The WAC list page displays the managed WAC data, including the name, status, IP address, and vendor. In addition, functions such as sorting, filtering, and column visibility settings are provided. You can click a WAC name to open a new page and view WAC details. Click Performance task management. On the displayed page, you can view WAC task details, delete device tasks, and re-deliver eSight tasks.
Figure 3-27 WAC list - WAC details
The WAC details page displays information about APs connected to the WAC and AP groups configured on the WAC. You can create, modify, and delete AP groups.
- AP list
The AP list displays information about managed APs, including the name, status, IP address, and type. In addition, the sorting, filtering, and visible column setting functions are provided. You can click an AP and view AP details on the page that is displayed.
Figure 3-28 AP list - Basic AP information
The basic information page displays the basic information, RF information, VAP information, and wired port information about the AP. You can click an RF ID and view details about an RF device.
- RF details
The RF details page displays basic, VAP, and KPI information about an RF device.
- User list
The user list page displays the data of managed users, including the current and historical access users. The current access user list displays information such as the user name, status, IP address, and access type, and provides functions such as sorting, filtering, and visible column setting. The historical access user list displays information such as the user name, occurrence time, and WAC name, and provides functions such as sorting, filtering, and visible column setting. You can click a MAC address of a user to open a new page and view details of the user.
Figure 3-29 User list - User details
The user details page displays basic user information, including the last access information, historical user access list, and historical user access KPIs. Quick user detection can quickly analyze user experience, identify root causes of network problems, and provide troubleshooting suggestions.
- SSID list
The SSID list displays information about the managed SSIDs, including the WAC or AP name, profile name, number of APs, and number of VAPs. In addition, the sorting and filtering functions are provided. You can click a WAC or AP name and view details about the WAC or AP on the displayed page.
Figure 3-30 SSID list - Region list
The region list page displays region data. If you click a non-bottom-layer region in the region tree, the region list is displayed on the right, displaying region names, the total number of APs, and the number of online APs. If you click a bottom-layer region in the region tree, the AP list is displayed on the right, displaying AP names, statuses, IP addresses, and types. The administrator can review the overall AP plan based on the region list.
Figure 3-31 Region list - Security
eSight monitors and recognizes unauthorized APs and devices, clients, interference sources, and attacks based on rules defined by the administrator, and sends remote alarm notifications.
- Statistics collection and display of unauthorized devices are supported. Unauthorized clients associated with unauthorized APs can be displayed.
- Unauthorized clients can be displayed.
- Statistics collection and display of non-Wi-Fi interference sources are supported.
- Attack statistics collection and display are supported.
- Unauthorized APs can be classified into rogue, suspected-rogue, adjacent, suspected-adjacent, and interference APs. Supported rules include adjacent or same frequency interference, signal strength, SSID (fuzzy or regular expression), number of detected APs, and attack.
- Setting
Parameter setting is supported to centrally manage global configurations in the system, including the resource polling synchronization period and policy.
- Inventory, AP, and user information polling can be enabled or disabled.
- Inventory, AP, and user polling intervals can be modified and set to 15 minutes, 30 minutes, or 60 minutes.
- The synchronization policy is supported for all devices and specified devices.
- Records can be added or deleted in the whitelist for specified devices.
If eSight manages a large number of devices that support the WLAN function but do not use WLAN services, you can set a whitelist to synchronize only the devices that use WLAN services to reduce system resource consumption.
Configuration Management
WLAN management supports WLAN device configuration. APs can be restarted or restored to factory settings to quickly rectify AP faults.
This function is applicable only to WLAN devices with a software version of V200R006 or later.
- Restart an AP: Perform this operation when an AP is upgraded online or when the network is calibrated.
- Restore an AP to factory settings: Perform this operation when AP settings are faulty or when the network is calibrated.
Regional Monitoring
Regional monitoring visualizes network planning and simulation, and integrates network planning information and KPIs in the topology to improve user experience.
- Allows users to use a planning table or planning project file to seamlessly import network planning data (planned regions, obstacles, AP locations, and other information) from the network planning tool to eSight.
- Allows users to plan regions by campus, building, floor, or other dimensions, import the background image, set and view the scale, view the obstacle types, set obstacles, and deploy APs. For a non-bottom-layer region, users can set a GIS map as the subnet background. In addition, users can perform operations such as zooming in or out the map, moving the map, and setting locations on the map.
Allows users to view the KPI portal by region, analyze user experience, set the time, and view historical KPI data.
Allows users to further locate and analyze issues that affect user experience based on regional KPIs and analyze root causes by viewing AP, RF, and user details.