- About This Document
- General Precautions for WLAN
Wireless Network Deployment and Configuration Suggestions
WLAN Service Configuration Procedure
- Reference Relationships Between WLAN Profiles
- WLAN Basic Service Configuration Procedure
- AP Group and AP
- Regulatory Domain Profile
- Radio Profile
- Air Scan Profile
- RRM Profile
- VAP Profile
- SSID Profile
- Authentication Profile
- Security Profile
- Traffic Profile
- Soft GRE Profile
- STA Blacklist Profile
- STA Whitelist Profile
- AP System Profile
- AP Wired Port Profile
- AP Wired Port Link Profile
- WIDS Profile
- WIDS Spoof SSID Profile
- WIDS Whitelist Profile
- Location Profile
- BLE Profile
- WDS Profile
- WDS Whitelist Profile
- Mesh Profile
- Mesh Handover Profile
- Mesh Whitelist Profile
- IoT Profile
- WMI Profile
- Common Operations of Profiles
WLAN Service Configuration Guide
- Overview of WLAN
Understanding WLAN
Application Scenarios for WLAN
- WLAN Networking Application on Medium- and Large-sized Campus Networks
- WLAN Networking Application on Small Campus Networks
- WLAN Networking Application in Enterprise Branches
- Typical Application of an Agile Distributed WLAN
- Typical Application of Uninterrupted AP Operation After CAPWAP Link Disconnection
- Summary of WLAN Configuration Tasks
- VLAN Deployment Suggestions
- Licensing Requirements and Limitations for WLAN
- Default Settings for WLAN
- Creating an AP Group
Configuring APs to Go Online
- Configuring a DHCP Server
- Configuring Network Interconnections
- Configuring Country Codes
- Configuring a Source Interface
- (Optional) Configuring a Network Element Name
- Configuring CAPWAP Tunnel Parameters
- (Optional) Configuring Automatic Upgrade When APs Go Online
- Adding APs
- Checking Whether APs Can Go Online
Configuring the Central AP and RUs to Go Online
Configuring STAs to Go Online
- Configuring STAs to Go Online (Agile Distributed WLAN)
Maintaining Basic WLAN Services
- Checking Wireless Link Quality Between an AP and a STA
- Checking Connectivity Between an AP and a Network Device
- Checking AP Running Statistics
- Checking AP Online Failure and Offline Records
- Clearing AP Online Failure and Offline Records
- Clearing the List of Unauthorized APs
- Checking STA Running Statistics
- Checking STA Online Failure and Offline Records
- Clearing STA Online Failure and Offline Records
- Configuring the Function of Recording STA Association and STA Login Information in the Log
Configuration Examples for WLAN Services
- Example for Configuring WLAN Services on a Small-Scale Network
- Example for Configuring WLAN Services on a Medium-Scale Network
- Example for Configuring WLAN Services on a Large-Scale Network
- Example for Configuring Seamless Channel Switching
- Example for Configuring an Agile Distributed WLAN
- Example for Configuring the Soft GRE Service
Cloud-based Management Configuration of AC
AP Management Configuration Guide
- Configuration Limitations for AP Management
Configuring AP Online Parameters (AP Provisioning View)
Configuring AP Online Parameters (AP View)
- Configuring an AC to Support the Types of APs Running Later Versions
Managing APs
- Modifying AP Names
- Modifying the AP Group to Which APs Belong
- Configuring the Default Domain Name Suffix for APs
- Configuring AP Indicators
- Configuring the USB Function on an AP
- Performing an In-Service Upgrade and Patch Loading for APs
- Configuring a Scheduled AP Upgrade Task
- Switching the Working Mode of an AP
- Resetting an AP
- Restoring the Factory Settings of an AP
- Deleting an AP
- Configuring Terminal Attributes for the VTY User Interface
- Configuring ACL-based Login Control for the VTY User Interface of APs
- Configuring the Device to Not Process STA IPv6 Services
- Configuring an AC to Report STA Traffic Statistics and Online Duration on APs
- Setting the Longitude and Latitude of an AP
- Configuring the AP Channel Mode
- Configuring APs to Report Disassociation Request Packets of STAs to an AC
- Configuring a Management VLAN on an AP
- Configuring the Option 12 Field Carried in DHCP Packets Sent by APs
- Configuring the Rate Limit for Broadcast and Multicast Packets of APs
- Configuring Rate Limit for AP Traffic
- Configuring the Alarm Function on an AP
- Configuring the Log Backup and Log Suppression Functions on an AP
- Configuring LLDP on an AP
- Configuring an AP to Report Information About Its LLDP Neighbors
- Configuring Sampling Parameter on an AP
- Configuring Service Holding upon CAPWAP Link Disconnection
- Optimizing AP System Profile Parameters
- Verifying the AP Configuration
- Displaying Optical Module Information on an AP
- Checking Fan Information About a Central AP
- Checking Power Supply Information About a Central AP
- Managing Wired Login for APs
- Managing Wireless Login for APs
- Configuring the Bluetooth Serial Port on an AP
- Configuring Offline Management and Antenna Alignment VAPs
- Managing an AP's Wired Interface
Managing the PoE Function of an AP
- Overview of PoE
- Understanding PoE
- Configuration Limitations for PoE
- Enabling the PoE Function
- (Optional) Configuring the LLDP Power Capacity Negotiation
- Configuring PoE Power Management
- Configuring the Device to Allow High Inrush Current During Power-On
- Configuring PoE Power-on and Power-off Management
- Applying Profiles
- Verifying the PoE Configuration
Maintaining APs
- Checking Wireless Link Quality Between an AP and a STA
- Checking Connectivity Between an AP and a Network Device
- Checking AP Running Statistics
- Checking AP Neighbor Information
- Clearing Statistics on an AP
- Clearing the List of Types of APs that Fail to Connect to an AC Because They are Not Supported by the AC
Configuration Examples for AP Management
Common Configuration Errors
Radio Resource Management (SmartRadio)
- Overview of Radio Resource Management
Understanding Radio Resource Management
- Summary of Radio Resource Management Configuration Tasks
- Licensing Requirements and Limitations for Radio Resource Management
- Default Settings for Radio Resource Management
- Configuring Interference Detection
- Configuring Radio Calibration
Configuring Load Balancing
- Configuring Band Steering
- Configuring Smart Roaming
- Configuring the Function of Quickly Disconnecting STAs
- Configuring User CAC
- Configuring Dynamic EDCA Parameter Adjustment
- Configuring Air Scan
- Configuring the AMC Algorithm for a Radio
- Configuring Automatic Per Packet Power Adjustment
- Configuring the Smart Antenna Function
- Configuring a CCA Threshold
Maintaining Radio Resource Management
Configuration Examples for Radio Resource Management
Spectrum Analysis
- Overview of Spectrum Analysis
- Understanding Spectrum Analysis
- Application Scenarios for Spectrum Analysis
- Licensing Requirements and Limitations for Spectrum Analysis
- Default Settings for Spectrum Analysis
Configuring Spectrum Analysis
Maintaining Spectrum Analysis
Configuration Examples for Spectrum Analysis
Roaming Configuration
- Overview of Roaming
Understanding Roaming
- Licensing Requirements and Limitations for Roaming
- Default Settings for Roaming
Configuring Roaming Between APs in the Same Service VLAN
Configuring Roaming Between APs in Different Service VLANs
Configuring Inter-AC Roaming
- Configuring Agile Distributed SFN Roaming
Configuration Examples for Roaming
- Example for Configuring Non-Fast Roaming Between APs in the Same Service VLAN
- Example for Configuring Fast Roaming Between APs in the Same Service VLAN
- Example for Configuring Non-Fast Roaming Between APs in Different Service VLANs
- Example for Configuring Fast Roaming Between APs in Different Service VLANs
- Example for Configuring Layer 2 Roaming Between ACs in Distributed VXLAN Gateway Networking
- Example for Configuring Agile Distributed SFN Roaming
WLAN QoS Configuration
- Overview of WLAN QoS
Understanding WLAN QoS
- Application Scenarios for WLAN QoS
- Summary of WLAN QoS Configuration Tasks
- Licensing Requirements and Limitations for WLAN QoS
- Default Settings for WLAN QoS
Configuring WLAN QoS
- Configuring WMM
- Configuring Priority Mapping
- Configuring Traffic Policing
- Configuring Airtime Fair Scheduling
- Configuring ACL-based Packet Filtering
- Configuring ACL-based Priority Remarking
- Configuring User Isolation on a VAP
- Configuring Priorities for Lync Packets
- Configuring Multimedia Air Interface Optimization
- Configuring SVP Voice Traffic Optimization
- Configuring SEA
- Configuring Game Turbo
Configuration Examples for WLAN QoS
DFI Configuration
WLAN Security Configuration
- Overview of WLAN Security
Understanding WLAN Security
Application Scenarios for WLAN Security
- Licensing Requirements and Limitations for WLAN Security
- Default Settings for WLAN Security
Configuring Device Detection and Containment
- Creating a WIDS Profile
- Configuring the Radio Working Mode
- (Optional) Setting Air Scan Parameters
- Configuring Device Detection
- (Optional) Configuring Fuzzy Matching Rules for Identifying Spoofing SSIDs
- (Optional) Configuring a WIDS Whitelist
- Configuring Device Containment
- Applying the Configuration to an AP Group or a Specific AP
- Verifying the Device Detection and Containment Configuration
Configuring Attack Detection and a Dynamic Blacklist
Configuring WLAN Security
- Configuring Strict STA IP Address Learning Through DHCP
- Configuring DAI
- Configuring Defense Against Bogus ND Server Attacks
- Configuring the IPSG Function for APs
- Configuring Flood Attack Prevention
- Configuring a Device to Send ARP/ND Proxy Packets for a STA After the STA Is Successfully Associated
- Applying the Configuration
- Verifying the WLAN Security Configuration
Maintaining WLAN Security
- Verifying the Configuration of Device Detection and Containment
- Verifying the Configuration of Attack Detection and Dynamic Blacklist
- Checking Air Interface Environment Information About AP Radios
- Clearing WLAN Security Information
- Configuring the Function of Recording Rogue Device Information in the Log
Configuration Examples for WLAN Security
Security Policy Configuration
Understanding WLAN Security Policies
- Application Scenarios for WLAN Security Policies
- Default Settings for WLAN Security Policies
Configuring a WLAN Security Policy
Configuration Examples for WLAN Security Policies
- Example for Configuring a WEP Security Policy
- Example for Configuring a WPA2-PSK-AES Security Policy
- Example for Configuring a WPA2-802.1X-AES Security Policy
- Example for Configuring a WPA3-SAE Security Policy
- Example for Configuring a WAPI-PSK Security Policy
- Example for Configuring a WAPI-Certificate Security Policy
- Example for Configuring MAC Address Authentication (AAA in RADIUS Mode)
- Example for Configuring MAC + 802.1X Authentication (AAA Mode: RADIUS)
- Example for Configuring External Portal Authentication
STA Blacklist and Whitelist Configuration
Configuration of Preferential Access of VIP Users
- Overview of Preferential Access of VIP Users
- Understanding Preferential Access of VIP Users
- Application Scenarios for Preferential Access of VIP Users
- Default Settings for Preferential Access of VIP Users
- WLAN Security
- Configuring Preferential Access of VIP Users
- Maintaining Preferential Access of VIP Users
- Example for Configuring Preferential Access of VIP Users
iConnect Configuration
WDS Configuration
Mesh Configuration
- Overview of Mesh
- Understanding Mesh
- Application Scenarios for Mesh
- STP Scenarios Supported by a Mesh Network
- Understanding Mesh Profiles
- Licensing Requirements and Limitations for Mesh
- Mesh Interconnection Requirements
- Default Settings for Mesh
Configuring the Mesh Function
- Adding APs
- (Optional) Enabling the Backhaul Function on the 4.9 GHz Frequency Band
- Configuring Mesh Radio Parameters
- Configuring Parameters for an AP's Wired Interface
- Configuring a Security Profile
- Configuring a Mesh Whitelist
- Configuring a Mesh Role and Mesh Profile
- (Optional) Enabling FWA
- Verifying the Mesh Configuration
Maintaining Mesh Links
Configuration Examples for Mesh
Vehicle-Ground Fast Link Handover Configuration
- Overview of Vehicle-Ground Fast Link Handover
Understanding Vehicle-Ground Fast Link Handover
- Application Scenarios for Vehicle-Ground Fast Link Handover
- Licensing Requirements and Limitations for Vehicle-Ground Fast Link Handover
- Default Settings for Vehicle-Ground Fast Link Handover
- Summary of Vehicle-Ground Fast Link Handover Configuration Tasks
Configuring Trackside APs
- Adding APs
- Configuring Mesh Radio Parameters
- Configuring Parameters for an AP's Wired Interface
- Configuring a Security Profile
- Configuring a Mesh Whitelist
- Configuring a Mesh Handover Profile
- Configuring Mesh Roles and Mesh Profiles
- Guaranteeing Multicast Data Transmission
- Verifying the Trackside AP Configuration
Configuring a Vehicle-Mounted AP
- Configuring Mesh Radio Parameters
- Configuring a Security Profile
- (Optional) Configuring a Mesh Whitelist
- Configuring Train-Ground Communication
- Configuring a Mesh Profile
- Configuring Proxied Ground Devices
- Configuring Proxied Vehicle-Mounted Devices
- Enabling IGMP Snooping on a Vehicle-Mounted AP
- Verifying the Vehicle-Mounted AP Configuration
- Monitoring Vehicle-Ground Fast Link Handover
Configuration Examples for Vehicle-Ground Fast Link Handover
Wi-Fi Tag Location Configuration
- Overview of Wi-Fi Tag Location
- Understanding Wi-Fi Tag Location
- Application Scenarios for Wi-Fi Tag Location
- Licensing Requirements and Limitations for WLAN Tag Location
- Summary of Wi-Fi Tag Location Configuration Tasks
- Default Settings for Wi-Fi Tag Location
Configuring Wi-Fi Tag Location
Maintaining Wi-Fi Tag Location
Configuration Examples for Wi-Fi Tag Location
Terminal Location Configuration
- Overview of Terminal Location
Understanding Terminal Location
- Implementation of Terminal Location
- Licensing Requirements and Limitations for Terminal Location
- Summary of Terminal Location Configuration Tasks
- Default Settings for Terminal Location
Configuring Terminal Location
Configuration Examples for Terminal Location
Bluetooth Location Configuration
- Overview of Bluetooth Location
Understanding Bluetooth Location
Application Scenarios for Bluetooth Location
- Licensing Requirements and Limitations for Bluetooth Location
- Default Settings for Bluetooth Location
Configuring Bluetooth Location
Maintaining Bluetooth Location
Configuration Examples for Bluetooth Location
Hotspot 2.0 Configuration Guide
WLAN Traffic Optimization Configuration
- Overview of WLAN Traffic Optimization
- Licensing Requirements and Limitations for WLAN Traffic Optimization
- Default Settings for WLAN Traffic Optimization
- Configuring Traffic Limit
Configuring Multicast Optimization
- Configuring Traffic Optimization in VR Scenarios
- Configuring TCP Properties
Maintaining WLAN Traffic Optimization
Configuration Examples for WLAN Traffic Optimization
Centralized License Control Configuration Guide
AC Backup Configuration
Smart Retail IoT Solution - ESL
Healthcare IoT Solution
Education IoT Solution - Student Health and Safety
- Overview of the Education IoT Solution - Student Health and Safety
- Understanding the Education IoT Solution - Student Health and Safety
- Implementation Precautions for the Education IoT Solution - Student Health and Safety
- Software and Hardware Installation for the Education IoT Solution - Student Health and Safety
Configuration Guide for the Education IoT Solution - Student Health and Safety
Shopping Mall and Supermarket IoT Solution - Hotspot Service and Customer Flow Analysis
- Shopping Mall and Supermarket IoT Solution - Overview of Hotspot Service and Customer Flow Analysis
- Shopping Mall and Supermarket IoT Solution - Understanding Hotspot Service and Customer Flow Analysis
- Implementation Precautions for the Shopping Mall and Supermarket IoT Solution - Hotspot Service and Customer Flow Analysis
- Software and Hardware Installation for the Shopping Mall and Supermarket IoT Solution - Hotspot Service and Customer Flow Analysis
Configuration Guide for the Shopping Mall and Supermarket IoT Solution - Hotspot Service and Customer Flow Analysis
Shopping Mall and Supermarket IoT Solution - Indoor Navigation
- Overview of the Shopping Mall and Supermarket IoT Solution - Indoor Navigation
- Understanding the Shopping Mall and Supermarket IoT Solution - Indoor Navigation
- Implementation Precautions for the Shopping Mall and Supermarket IoT Solution - Indoor Navigation
- Software and Hardware Installation for the Shopping Mall and Supermarket IoT Solution - Indoor Navigation
Configuration Guide for the Shopping Mall and Supermarket IoT Solution - Indoor Navigation
Shopping Mall and Supermarket Solution - Personnel and Asset Management
- Shopping Mall and Supermarket IoT Solution - Overview of Personnel and Asset Management
- Shopping Mall and Supermarket IoT Solution - Understanding Personnel and Asset Management
- Implementation Precautions for the Shopping Mall and Supermarket Solution - Personnel and Asset Management
- Software and Hardware Installation for the Shopping Mall and Supermarket Solution - Personnel and Asset Management
Configuration Guide for the Shopping Mall and Supermarket Solution - Personnel and Asset Management
KPI Information Report Configuration