01-11 WLAN-AC Commands
01-11 WLAN-AC Commands
11 WLAN-AC Commands
NOTE
11.1.1 ac sysnetid
Function
The ac sysnetid command configures an NE name for an AC.
The undo ac sysnetid command deletes the NE name of an AC.
By default, no NE name is configured for an AC.
Format
ac sysnetid ac-sysnetid
undo ac sysnetid
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The administrator can run the ac sysnetid command to configure a unique NE name for an
AC. This facilitates AC management.
Configuration Impact
If you run the ac sysnetid command multiple times, only the latest configuration takes effect.
Example
# Set the NE name of an AC to ABC123.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ac sysnetid ABC123
Related Topics
11.1.82 display ac global configuration
Format
access-user syslog-restrain enable
undo access-user syslog-restrain enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After a STA passes authentication or successfully associates with the AP, the AP sends system
logs to the NMS server. A system log contains MAC addresses of the STA, AC, and AP, AP
and AC name and current time, and authentication result.
If a STA fails to associate with an AP or fails authentication, the STA attempts to go online
continuously. The AP sends a large number of duplicate logs to the AC in a short period,
which wastes resources and deteriorates system performance. To prevent this problem, enable
system log suppression.
Example
# Enable system log suppression.
<HUAWEI> system-view
[HUAWEI] access-user syslog-restrain enable
Function
The access-user syslog-restrain period command sets the period of system log suppression.
The undo access-user syslog-restrain period command restores the default period of system
log suppression.
Format
access-user syslog-restrain period period
Parameters
Parameter Description Value
period Specifies the period of system log suppression. The value is an integer
that ranges from 60 to
604800, in seconds.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When a STA is authenticated or successfully associates with an AP, the AP sends system logs
to the NMS server. A system log contains MAC addresses of the STA, AP, and AC, AP name
and current time, AC name and current time, and authentication result.
A STA retries continuously after it fails to associate with an AP or pass the authentication.
When this occurs, the AC sends a large number of logs in a short time. This results in a high
statistics failure rate and degrades the NMS performance. The system log suppression
function reduces impact of such logs on the NMS. After the period of system log suppression
is set, the AC will send only one system log to the NMS server during the suppression period,
reducing the load on the server.
Example
# Set the period of system log suppression to 600s.
<HUAWEI> system-view
[HUAWEI] access-user syslog-restrain period 600
11.1.4 ac-list
Function
The ac-list command configures an AC IPv4 address list for APs.
The undo ac-list command restores the AC IPv4 address list to the default value.
By default, no AC IPv4 address list is configured.
Format
ac-list ipv4-address &<1-4>
undo ac-list
Parameters
Parameter Description Value
ipv4-address Specifies the IPv4 address of an AC. The value is in dotted decimal notation.
Views
AP provisioning view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run this command to configure an AC IPv4 address list for APs. After this list is
configured, the APs can unicast a Discovery Request packet to discover an AC when they go
online using IPv4 addresses.
Follow-up Procedure
Run the commit command to deliver configuration to APs and restart the APs to make the
configuration take effect.
Example
# Set the AC's IPv4 address to 192.168.10.1 in AP provisioning view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] provision-ap
[HUAWEI-wlan-provision-ap] ac-list 192.168.10.1
Related Topics
11.1.120 display provision-ap parameter-list
11.1.68 commit (AP provisioning view)
Format
active-dull-client enable
undo active-dull-client enable
Parameters
None
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Due to individual reasons, some terminals may not run services normally when entering
energy-saving mode. You can run the active-dull-client enable command to enable the
function of preventing terminals from entering energy-saving mode. After that, an AP
frequently sends null data frames to these terminals to prevent them from entering energy-
saving mode, ensuring normal services.
Precautions
After the function is enabled, the terminals consume more power and extra bandwidth. If no
terminal enters an abnormal energy-saving state, you are advised to disable the function.
Example
# Enable the function of preventing terminals from entering energy-saving mode.
<HUAWEI> system-view
[HUAWEI] wlan
Related Topics
11.1.135 display ssid-profile
Function
The address-mode command sets the mode in which an AP obtains an IP address.
The undo address-mode command restores the default mode in which an AP obtains an IP
address.
Format
address-mode { dhcp | static }
undo address-mode
Parameters
Parameter Description Value
dhcp Indicates that an IP address is obtained in DHCP mode. The AP -
functions as a DHCP client and is assigned an IP address by the DHCP
server.
static Indicates that a static IP address is obtained. The AP must be -
configured with a static IP address.
Views
AP provisioning view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Follow-up Procedure
Run the commit command to deliver configuration to APs and restart the APs to make the
configuration take effect.
Example
# Configure an AP to obtain an IP address in DHCP mode.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] provision-ap
[HUAWEI-wlan-provision-ap] address-mode dhcp
Related Topics
11.1.120 display provision-ap parameter-list
11.1.68 commit (AP provisioning view)
Format
alarm-restriction disable
undo alarm-restriction disable
Parameters
None
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
If a STA cannot go online due to security type mismatch, UAC, or access user upper limit
exceeding, the STA will automatically re-connect to the AP. During this period, the AP sends
a large number of STA association failure alarms to the AC, which degrades the system
performance.
To solve this problem, enable alarm suppression for the AP. The AP then does not report
alarms repeatedly in the alarm suppression period, preventing alarm storms.
Example
# Disable alarm suppression for an AP.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] alarm-restriction disable
Related Topics
11.1.112 display ap-system-profile
Format
alarm-restriction period period
undo alarm-restriction period
Parameters
Parameter Description Value
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
You can run the ap alarm-restriction period command to configure the period of alarm
suppression for an AP. The AP reports an alarm only one time in the specified period if the
alarm is repeatedly generated.
Example
# Set the period of alarm suppression to 200 seconds for an AP.
<HUAWEI> system-view
[HUAWEI] wlan
Related Topics
11.1.112 display ap-system-profile
11.1.9 antenna-gain
Function
(AP group radio view) The antenna-gain command configures the antenna gain for all
specified radios in an AP group.
(AP group radio view) The undo antenna-gain command restores the default antenna gain
for all specified radios in an AP group.
(AP radio view) The antenna-gain command configures the antenna gain for an AP radio.
(AP radio view) The undo antenna-gain command cancels the configuration of the antenna
gain on an AP radio. The antenna gain on the AP radio is then determined by that configured
in the AP group radio view.
The antenna gain of AP radios depends on AP types and working channels of AP radios. You
can run the display ap-type { id type-id | type ap-type } command to check default antenna
gains of radios of different AP types.
Format
antenna-gain antenna-gain
undo antenna-gain
Parameters
Parameter Description Value
antenna-gain Specifies the The value is an integer that ranges from 0 to 30, in dB.
antenna gain.
Views
AP radio view, AP group radio view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The antenna gain is the ratio of the power density produced by an antenna to the power
density that should be obtained at the same point if the power accepted by the antenna were
radiated equally. It can measure the capability for an antenna to receive and send signals in a
specified direction, which is one of the most important parameters to select a BTS antenna. In
the same condition, if the antenna gain is high, the wave travels far.
Precautions
l The antenna gain of an AP radio configured using the command must be consistent with
the gain of the antenna connected to the AP.
l The antenna gain of an AP radio configured using the command takes effect only for
external antennas. When an AP uses an external antenna, configure the antenna gain for
the AP radio to be consistent with the gain of the external antenna connected to the AP.
l The maximum antenna gain should comply with laws and regulations of the
corresponding country. For details, see the Country Code & Channel Compliance Table.
You can obtain this table at Huawei technical support website.
– Enterprise technical support website: http://support.huawei.com/enterprise
– Carrier technical support website: http://support.huawei.com
l The configuration in the AP radio view has a higher priority than that in the AP group
radio view.
Example
# Set the antenna gain to 4 for radio 0 of AP 1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-id 1
[HUAWEI-wlan-ap-1] radio 0
[HUAWEI-wlan-radio-1/0] antenna-gain 4
Function
The anti-attack broadcast-flood blacklist enable command enables the broadcast flood
blacklist function.
The undo anti-attack broadcast-flood blacklist enable command disables the broadcast
flood blacklist function.
Format
anti-attack broadcast-flood blacklist enable
Parameters
None
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the broadcast flood blacklist function is enabled, the device considers traffic with a rate
higher than that specified in 11.1.12 anti-attack broadcast-flood sta-rate-threshold a
broadcast flood attack and adds the STA to the blacklist.
Prerequisites
The broadcast flood detection function has been enabled using the undo 11.1.11 anti-attack
broadcast-flood disable command.
Example
# Enable the broadcast flood blacklist function.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name profile1
[HUAWEI-vap-prof-profile1] anti-attack broadcast-flood blacklist enable
Related Topics
11.1.11 anti-attack broadcast-flood disable
11.1.12 anti-attack broadcast-flood sta-rate-threshold
Function
The anti-attack broadcast-flood disable command disables the broadcast flood detection
function.
The undo anti-attack broadcast-flood disable command enables the broadcast flood
detection function.
By default, the broadcast flood detection function is enabled.
Format
anti-attack broadcast-flood disable
undo anti-attack broadcast-flood disable
Parameters
None
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If a large number of broadcast packets are sent to a device in a short time, the device becomes
busy processing the packets and cannot process normal services. To prevent broadcast flood
attacks, you can configure broadcast flood detection.
Example
# Disable the broadcast flood detection function.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name profile1
[HUAWEI-vap-prof-profile1] anti-attack broadcast-flood disable
Related Topics
11.1.12 anti-attack broadcast-flood sta-rate-threshold
Function
The anti-attack broadcast-flood sta-rate-threshold command sets the broadcast flood
threshold.
The undo anti-attack broadcast-flood sta-rate-threshold command restores the default
broadcast flood threshold.
By default, the broadcast flood threshold is 10 pps.
Format
anti-attack broadcast-flood sta-rate-threshold sta-rate-threshold
undo anti-attack broadcast-flood sta-rate-threshold
Parameters
Parameter Description Value
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the broadcast flood detection function is enabled, you can set the broadcast traffic
threshold.
When the traffic rate exceeds the threshold, the device considers a broadcast flood attack from
the STA and discards the broadcast traffic. This prevents the upper-layer network from being
affected by the broadcast flood.
If the broadcast flood blacklist function is enabled using the 11.1.10 anti-attack broadcast-
flood blacklist enable command, the device adds broadcast flood STAs to the blacklist.
Prerequisites
The broadcast flood detection function has been enabled using the undo 11.1.11 anti-attack
broadcast-flood disable command.
Example
# Set the broadcast flood threshold to 100 pps.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name profile1
[HUAWEI-vap-prof-profile1] anti-attack broadcast-flood sta-rate-threshold 100
Related Topics
11.1.11 anti-attack broadcast-flood disable
11.1.10 anti-attack broadcast-flood blacklist enable
11.1.13 ap auth-mode
Function
The ap auth-mode command configures the AP authentication mode.
Format
ap auth-mode { mac-auth | no-auth | sn-auth }
undo ap auth-mode
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
After the ap auth-mode command is executed, the AC authenticates the AP using the
configured mode.
NOTE
The non-authentication mode brings security risks. You are advised to set the authentication mode to MAC
address authentication or SN authentication, which is more secure.
Example
# Change the AP authentication mode to MAC address authentication.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap auth-mode mac-auth
Related Topics
11.1.90 display ap global configuration
11.1.14 ap blacklist
Function
The ap blacklist command adds an AP to an AP blacklist.
By default, no AP is in an AP blacklist.
Format
ap blacklist mac ap-mac1 [ to ap-mac2 ]
undo ap blacklist mac ap-mac1 [ to ap-mac2 ]
Parameters
Parameter Description Value
to ap-mac2 Specifies the end MAC address. This The value is in H-H-H
parameter is used when you want to add format. An H is a
multiple MAC addresses to the blacklist. The hexadecimal number
value must be larger than ap-mac1. ap-mac1 of 4 digits.
and ap-mac2 identify a range.
The maximum number of MAC addresses that
can be added to the blacklist in batches is 128.
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If the AP's MAC address is in the blacklist, the AP cannot go online. If the MAC address of
an online AP is in the blacklist, the AP is forced to log out.
Precautions
The AP blacklist and whitelist can be configured at the same time. However, the MAC
address of an AP cannot be added to the AP blacklist and whitelist at the same time.
If AP whitelist and blacklist are all configured, check whether an AP is on the blacklist first.
Example
# Add the AP with the MAC address of 0025-9e07-8280 to the AP blacklist.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap blacklist mac 0025-9e07-8280
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap blacklist mac 0025-9e07-8270 to 0025-9e07-8276
Related Topics
11.1.32 ap-confirm
11.1.86 display ap blacklist
Function
The ap data-collection enable command enables an AC to buffer AP data.
Format
ap data-collection enable
Parameters
None
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
The NMS needs to periodically query performance statistics (including AP and radio
performance statistics and information about users on an AP) from an AC that queries the
information from the AP.
It is recommended that an AC be enabled to buffer AP data when you use the NMS to query
AP statistics. When NMS query expires, the NMS can obtain AP data from the AC.
Example
# Enable an AC to buffer AP data.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap data-collection enable
Related Topics
11.1.16 ap data-collection interval
11.1.90 display ap global configuration
Function
The ap data-collection interval command sets the data buffer duration.
The undo ap data-collection interval command restores the default data buffer duration.
Format
ap data-collection interval interval
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
You can run the ap data-collection interval command to set the buffer duration.
Example
# Enable an ACto buffer AP data and set the buffer duration.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap data-collection enable
[HUAWEI-wlan-view] ap data-collection interval 57
Related Topics
11.1.15 ap data-collection enable
11.1.90 display ap global configuration
Function
The ap lldp enable command enables LLDP in the WLAN view.
The undo ap lldp enable command disables LLDP in the WLAN view.
Format
ap lldp enable
Parameters
None
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The Link Layer Discovery Protocol (LLDP) is a Layer 2 discovery protocol defined in the
IEEE 802.1ab standard. Using LLDP, the AC or NMS can obtain Layer 2 information about
the connected APs, including APs' interfaces and connections with other devices.
Additionally, the AC or NMS can obtain details about network topology and interface
changes. To view the Layer 2 link status between APs, and between APs and switch or
analyze the network topology, enable WLAN LLDP.
Precautions
WLAN LLDP can be enabled in the system view and the AP wired port link profile view.
l An AP can send and receive LLDP packets only after LLDP is enabled in both the
WLAN view and the AP wired port link profile view.
l After LLDP is disabled in the WLAN view, the commands for enabling and disabling
LLDP on the AP wired port link profile view do not take effect.
Example
# Enable LLDP in the WLAN view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap lldp enable
Related Topics
11.1.90 display ap global configuration
11.1.176 lldp enable
11.1.18 ap manufacturer-config
Function
The ap manufacturer-config command restores the factory settings of APs.
Format
ap manufacturer-config { ap-name ap-name | ap-mac ap-mac | ap-id ap-id }
Parameters
Parameter Description Value
ap-name ap- Specifies the name of the AP, factory settings The AP name must
name of which need to be restored. already exist.
ap-mac ap- Specifies the MAC address of the AP, factory The AP's MAC
mac settings of which need to be restored. address must already
exist.
ap-id ap-id Specifies the ID of the AP, factory settings of The AP ID must
which need to be restored. already exist.
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
When a configuration error occurs on the AP, you can run this command to clear AP
configurations.
NOTICE
After restoring factory settings, the AP is reset and configurations are restored to factory
settings.
Example
# Restore the factory settings of AP N1-2.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap manufacturer-config ap-name N1-2
Warning: Reset AP to the manufacturing default configuration, continue?[Y/N]:y
11.1.19 ap modify
Function
The ap modify command changes the MAC address of an AP.
Format
ap modify ap-id mac ap-mac
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When AP hardware needs to be replaced, you can change the MAC address of the AP to that
of a new AP to prevent repetitive data configurations. After the change, the new AP goes
online using the ID of the original AP, and all data configurations of the original AP take
effect on the new AP.
By default, you can run the display ap { all | ap-group ap-group } command to check the
MAC address of an AP.
Precautions
Replacing an AP enables the new AP to go online on the AC but will interrupt services of the
original AP.
Example
# Replace the AP with the ID 0 with the AP with the MAC address 0002-1110-0120.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap modify 0 mac 0002-1110-0120
Warning: Modify AP will influence the service that has published in AP, Whether
to continue? [Y/N]y
Related Topics
11.1.83 display ap
Function
The ap update ftp-server command configures basic FTP information, including the FTP
server IP address, FTP server user name and password.
By default, no FTP server IP address is configured, the FTP server user name is anonymous,
the FTP server password is anonymous@huawei.com.
Format
ap update ftp-server ip-address server-ip-address ftp-username ftp-username ftp-
password cipher ftp-password
Parameters
Parameter Description Value
ip-address Specifies an IPv4 address for the FTP server. The value is in dotted
server-ip- decimal notation.
address
ftp-username Specifies the FTP server user name. The value is a string of
ftp-username 1 to 31 characters. The
value cannot contain
question marks (?) and
cannot start or end
with double quotation
marks (" ") or spaces.
Views
WLAN view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
l The FTP configuration is used when the automatic upgrade and online upgrade modes
are FTP. In the automatic upgrade or online upgrade, the AC sends basic FTP
information to the AP, and the AP requests the FTP server for upgrade based on FTP
information.
l After running the ap update ftp-server command, you can perform the following
operations:
a. Run the ap update mode command to set the upgrade mode to ftp-mode.
b. Run the ap update multi-load command to upgrade APs in batches.
Precautions
l It is recommended that you use an external FTP server to upgrade APs. If the AC
functions as the FTP server, a maximum of five APs can be upgraded simultaneously.
l The FTP server user name cannot contain the double quotation marks ("). Ensure that the
FTP server user name and unencrypted password configured on the AC do not contain
the preceding characters. Otherwise, FTP upgrade fails.
Example
# Configure the FTP server IP address, FTP server user name and password.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap update ftp-server ip-address 192.168.1.100 ftp-username
admin ftp-password cipher wlanadmin
Related Topics
11.1.23 ap update mode
11.1.24 ap update multi-load
11.1.105 display ap update configuration
Function
The ap update ftp-server command configures the maximum number of APs that can be
upgraded simultaneously in FTP mode.
The undo ap update ftp-server command restores the default maximum number of APs that
can be upgraded simultaneously in FTP mode.
Format
ap update ftp-server max-connect-number max-connect-number
Parameters
Parameter Description Value
max-connect- Specifies the maximum number of APs that The value is an integer
number can be upgraded simultaneously. that ranges from 1 to
64.
Views
WLAN view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
When APs are upgraded in FTP mode, you can configure the value of max-connect-number to
change the maximum number of APs that can be upgraded simultaneously.
l If the number of APs to be upgraded is equal to or smaller than max-connect-number, all
APs can be upgraded simultaneously.
l If the number of APs to be upgraded is larger than max-connect-number, only the
specified number of APs can be upgraded simultaneously. After the specified number of
APs are upgraded, the remaining APs are upgraded automatically until all APs are
upgraded. The number of APs that are upgraded at a time cannot exceed the value of
max-connect-number.
Precautions
An external FTP server can be used, which is recommended. The AC can also function as the
FTP server.
l When an external FTP server is used, the maximum number of APs that can be upgraded
simultaneously is the configured max-connect-number.
l If an AC is used as the FTP server, a maximum of five APs can be upgraded
simultaneously even if the specified number is larger than five.
When the AC functions as the FTP server, run the ap update ftp-server max-connect-
number max-connect-number command to set the maximum number of APs that can be
upgraded simultaneously. The value of max-connect-number is an integer ranging from 1
to 5. During the upgrade, a maximum of 1 to 5 APs can be upgraded at a time until all
APs are upgraded.
If the configured number of APs to be upgraded simultaneously is larger than 5, an error
message will be displayed after the first 5 APs are upgraded. The remaining APs cannot
be automatically upgraded. You have to repeat the command until all APs are upgraded.
Example
# Set the maximum number of APs that can be upgraded simultaneously in FTP mode to 10.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap update ftp-server max-connect-number 10
Related Topics
11.1.23 ap update mode
11.1.24 ap update multi-load
11.1.105 display ap update configuration
Function
The ap update load command upgrades a specified AP.
Format
ap update load { ap-name ap-name | ap-mac ap-mac | ap-id ap-id } update-filename
update-file-name
undo ap update load { ap-name ap-name | ap-mac ap-mac | ap-id ap-id }
Parameters
Parameter Description Value
ap-name ap- Specifies the name of the AP to be upgraded. The AP name must
name already exist.
ap-mac ap- Specifies the MAC address of the AP to be The AP's MAC
mac upgraded. address must already
exist.
Views
WLAN view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
When APs are upgraded in batches based on AP types, if the new version fails, the version
rollback takes a long period. Therefore, you can update a single AP to check whether faults
occur on the version, ensuring successful upgrades in batches.
Prerequisites
When the AC mode is used, the AP upgrade file has been uploaded to the AC. If the FTP or
SFTP mode is used, the AP upgrade file has been uploaded to the FTP server or SFTP server.
The AP is in normal or vmiss state.
Follow-up Procedure
Run the ap update reset { ap-name ap-name | ap-mac ap-mac | ap-id ap-id } command to
restart the AP to make the upgrade take effect.
Precautions
The undo ap update load { ap-name ap-name | ap-mac ap-mac | ap-id ap-id } command
cancels AP upgrade. However, if the AP system software has been written to the flash
memory during the upgrade, the command does not take effect. You can run the display ap
update status { ap-name ap-name | ap-id ap-id } command to check AP upgrade progress.
Example
# Upgrade the AP N1-2 using the upgrade file fitap6x10xn_v200r007c00.bin.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap update load ap-name N1-2 update-filename
fitap6x10xn_v200r007c00.bin
Related Topics
11.1.26 ap update reset
11.1.106 display ap update status
Function
The ap update mode command configures the AP upgrade mode.
The undo ap update mode command restores the default AP upgrade mode.
Format
ap update mode { ftp-mode | ac-mode | sftp-mode }
Parameters
Parameter Description Value
Views
WLAN view
Default Level
3: Management level
Usage Guidelines
l The AC, FTP or SFTP upgrade mode must be preset on the AP for automatic upgrade
and online upgrade.
l Run the ap update multi-load command to upgrade the AP.
Example
# Set the AP upgrade mode to sftp-mode.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap update mode sftp-mode
Related Topics
11.1.105 display ap update configuration
Function
The ap update multi-load command upgrades APs of the same type in batches.
The undo ap update multi-load command cancels batch upgrade of APs with the same type.
Format
ap update multi-load [ ap-type type-id ] [ ap-group group-name | { ap-name ap-name | ap-
id ap-id } &<1-10> ]
undo ap update multi-load [ ap-type type-id ] [ ap-group group-name | { ap-name ap-name
| ap-id ap-id } &<1-10> ]
Parameters
Parameter Description Value
Views
WLAN view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can run the ap update multi-load ap-type type-id [ ap-group group-name | { ap-name
ap-name | ap-id ap-id } &<1-10> ] command to upgrade APs of the same type in batches in
the online upgrade mode.
l If ap-group group-name is specified, only APs of the same type and in the specified AP
group are upgraded.
l If ap-name ap-name or ap-id ap-id is specified, only APs of the specified type and with
the specified AP name or AP ID are upgraded
l If none of the ap-group group-name, ap-name ap-name, and ap-id ap-id parameters are
specified, all APs of the specified type are upgraded.
l If the type of APs specified by ap-group group-name, ap-name ap-name, or ap-id ap-id
is different from ap-type type-id, the APs cannot be upgraded.
Prerequisites
AP upgrade files have been configured in batches using the ap update update-filename
command.
Follow-up Procedure
Run the ap update multi-reset command to reset APs in batches to make AP upgrade take
effect.
Precautions
The undo ap update multi-load ap-type type-id command cancels batch upgrade of APs
with the same type. However, if the AP system software has been written to the flash memory
during the upgrade, the command does not take effect. You can run the display ap update
status all command to check AP upgrade progress.
Example
# Upgrade APs with type-id 19 in batches online.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap update multi-load ap-type 19
Related Topics
11.1.29 ap update update-filename
11.1.25 ap update multi-reset
11.1.106 display ap update status
Function
The ap update multi-reset command resets APs in batches.
Format
ap update multi-reset [ ap-type type-id ] [ ap-group group-name | { ap-name ap-name | ap-
id ap-id } &<1-10> ]
Parameters
Parameter Description Value
ap-type type-id Resets APs of the specified type ID. The AP type ID must
exist.
ap-name ap- Resets APs with the specified AP name. The AP name must
name exist.
ap-id ap-id Resets APs with the specified AP ID. The AP ID must exist.
Views
WLAN view
Default Level
3: Management level
Usage Guidelines
This command resets APs in batches and can be used only after APs are upgraded in batches.
l If none of the ap-group group-name, ap-name ap-name, or ap-id ap-id parameters are
specified, all APs of the specified type are reset.
l If the type of APs specified by ap-group group-name, ap-name ap-name, or ap-id ap-id
is different from ap-type type-id, the APs cannot be reset.
Example
# Reset APs with type-id 19 in batches.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap update multi-reset ap-type 19
Format
ap update reset { ap-name ap-name | ap-mac ap-mac | ap-id ap-id }
Parameters
Parameter Description Value
ap-name ap- Specifies the name of the AP to be restarted. The AP name must
name already exist.
ap-mac ap- Specifies the MAC address of the AP to be The AP's MAC
mac restarted. address must already
exist.
Views
WLAN view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
After a single AP has been upgraded, run the ap update reset command to restart the AP and
make the AP upgrade take effect.
Prerequisites
The specified AP has been upgraded using the ap update load { ap-name ap-name | ap-mac
ap-mac | ap-id ap-id } update-filename update-file-name command.
Example
# Restart AP N1-2 after the upgrade.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap update load ap-name N1-2 update-filename huawei.bin
[HUAWEI-wlan-view] ap update reset ap-name N1-2
Related Topics
11.1.22 ap update load
Function
The ap update sftp-server command configures basic sftp information, including the sftp
server IP address, sftp server user name and password.
By default, no SFTP server IP address is configured, the SFTP server user name is
anonymous, the SFTP server password is anonymous@huawei.com.
Format
ap update sftp-server ip-address server-ip-address sftp-username sftp-username sftp-
password cipher sftp-password
Parameters
Parameter Description Value
ip-address Specifies an IPv4 address for the sftp server. The value is in dotted
server-ip- decimal notation.
address
sftp-username Specifies the sftp server user name. The value is a string of
sftp-username 1 to 31 characters. The
value cannot contain
question marks (?) and
cannot start or end
with double quotation
marks (" ") or spaces.
Views
WLAN view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
l The sftp configuration is used when the automatic upgrade and online upgrade modes are
sftp. In the automatic upgrade or online upgrade, the AC sends basic sftp information to
the AP, and the AP requests the sftp server for upgrade based on sftp information.
l After running the ap update sftp-server command, you can perform the following
operations:
a. Run the ap update mode command to set the upgrade mode to sftp-mode.
b. Run the ap update multi-load command to upgrade APs in batches.
Precautions
l It is recommended that you use an external sftp server to upgrade APs. If the AC
functions as the sftp server, a maximum of five APs can be upgraded simultaneously.
l APs do not support the following characters:". Ensure that the sftp server user name and
unencrypted password configured on the AC do not contain the preceding characters.
Otherwise, sftp upgrade fails.
Example
# Configure the sftp server IP address, sftp server user name and password.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap update sftp-server ip-address 192.168.1.100 sftp-username
admin sftp-password cipher wlanadmin
Related Topics
11.1.23 ap update mode
11.1.24 ap update multi-load
11.1.105 display ap update configuration
Function
The ap update sftp-server command configures the maximum number of APs that can be
upgraded simultaneously in SFTP mode.
The undo ap update sftp-server command restores the default maximum number of APs that
can be upgraded simultaneously in SFTP mode.
Format
ap update sftp-server max-connect-number max-connect-number
Parameters
Parameter Description Value
max-connect- Specifies the maximum number of APs that The value is an integer
number can be upgraded simultaneously. that ranges from 1 to
64.
Views
WLAN view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
When APs are upgraded in sftp mode, you can configure the value of max-connect-number to
change the maximum number of APs that can be upgraded simultaneously.
l If the number of APs to be upgraded is equal to or smaller than max-connect-number, all
APs can be upgraded simultaneously.
l If the number of APs to be upgraded is larger than max-connect-number, only the
specified number of APs can be upgraded simultaneously. After the specified number of
APs are upgraded, the remaining APs are upgraded automatically until all APs are
upgraded. The number of APs that are upgraded at a time cannot exceed the value of
max-connect-number.
Precautions
An external sftp server can be used, which is recommended. The AC can also function as the
sftp server.
l When an external sftp server is used, the maximum number of APs that can be upgraded
simultaneously is the configured max-connect-number.
l If an AC is used as the SFTP server, a maximum of five APs can be upgraded
simultaneously even if the specified number is larger than five.
When the AC functions as the SFTP server, run the ap update sftp-server max-
connect-number max-connect-number command to set the maximum number of APs
that can be upgraded simultaneously. The value of max-connect-number is an integer
ranging from 1 to 5. During the upgrade, a maximum of 1 to 5 APs can be upgraded at a
time until all APs are upgraded.
If max-connect-number is set larger than 5, an error message will be displayed after the
first five APs are upgraded. The remaining APs cannot be automatically upgraded. You
have to repeat the command until all APs are upgraded.
Example
# Set the maximum number of APs that can be upgraded simultaneously in SFTP mode to 10.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap update sftp-server max-connect-number 10
Related Topics
11.1.23 ap update mode
11.1.24 ap update multi-load
11.1.105 display ap update configuration
Function
The ap update update-filename command configures the upgrade file name for APs of a
specified type.
The undo ap update update-filename command deletes the upgrade file name for APs of a
specified type.
Format
ap update update-filename filename ap-type type-id [ ap-group ap-group-name ]
Parameters
Parameter Description Value
Views
WLAN view
Default Level
3: Management level
Usage Guidelines
If you specify ap-group ap-group-name, the command configures the upgrade file name only
for APs of the specified type and in the specified group.
Run the ap update multi-load ap-type command to upgrade APs of the same type in batches.
Example
# Set the upgrade file name for APs with the type ID 19 to fitap6x10xn_v200r007c00.bin.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap update update-filename fitap6x10xn_v200r007c00.bin ap-type
19
Warning: If AP update mode is AC-mode, update-file's default path is flash:/,
continue?[Y/N]:y
Related Topics
11.1.24 ap update multi-load
11.1.30 ap username
Function
The ap username command sets the user name and password for AP login.
The undo ap username command restores the default user name and password for AP login.
Format
ap username username password cipher
undo ap username
Parameters
Parameter Description Value
username Specifies the user name for AP login. The value is a string of
4-31 characters. It can
contain letters,
underlines, and digits.
The character string
must start with letters.
Views
WLAN view
Default Level
3: Management level
Usage Guidelines
Unauthorized users may use the default user name and password to log in to APs, causing
security risk to APs. You can use the ap username command to change the user name and
password to improve security for APs.
NOTE
It is recommended that you change the user name and password in a timely manner to ensure device security.
The password cannot be the same as the user name or the mirror user name.
Example
# Set the user name to huawei and password to Zz123456.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap username huawei password cipher
Enter the password (plain-text password of 8-32 characters or cipher-text passwo
rd of 48 or 68 characters):
Confirm password:
Related Topics
11.1.90 display ap global configuration
11.1.107 display ap username
11.1.31 ap whitelist
Function
The ap whitelist command adds an AP to an AP whitelist.
By default, no AP is in an AP whitelist.
Format
ap whitelist { mac ap-mac1 [ to ap-mac2 ] | sn ap-sn1 [ to ap-sn2 ] }
Parameters
Parameter Description Value
to ap-mac2 Specifies the end MAC address. This The value is in H-H-H
parameter is used when you want to add format. An H is a
multiple MAC addresses to the whitelist. The hexadecimal number
value must be larger than ap-mac1. ap-mac1 of four digits.
and ap-mac2 identify a range.
The maximum number of MAC addresses that
can be added to the whitelist in batches is
4096.
to ap-sn2 Specifies the end SN. This parameter is used The value is a string of
when you want to add multiple SNs to the 1 to 31 characters.
whitelist. It must be larger than ap-sn1. ap-sn1
and ap-sn2 identify a range.
The maximum number of MAC addresses that
can be added to the whitelist in batches is
4096.
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
l When the AP authentication mode is set to MAC address authentication using the
11.1.13 ap auth-mode command, if the MAC address of an online AP exists in the
whitelist, the AP is automatically added to the AC. If the MAC address of an online AP
does not exist in the whitelist or the AP is not added offline, the AP cannot be
automatically added to the AC. You need to run the 11.1.32 ap-confirm command to
confirm the AP.
l When the AP authentication mode is set to SN authentication using the 11.1.13 ap auth-
mode command, if the SN of an online AP exists in the whitelist, the AP is
automatically added to the AC. If the SN of an online AP does not exist in the whitelist
or the AP is not added offline, the AP cannot be automatically added to the AC. You
need to run the 11.1.32 ap-confirm command to confirm the AP.
Prerequisites
The AP authentication mode has been set to MAC address or SN authentication using the
11.1.13 ap auth-mode command.
Precautions
When adding multiple SNs to the whitelist, ensure that the start SN length and the end SN
length are the same.
Example
# Add AP MAC address 0025-9e07-8280 to the whitelist.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap whitelist mac 0025-9e07-8280
Related Topics
11.1.109 display ap whitelist
11.1.13 ap auth-mode
11.1.32 ap-confirm
11.1.32 ap-confirm
Function
The ap-confirm command confirms unauthenticated APs and allows them to go online.
Format
ap-confirm { all | mac ap-mac | sn ap-sn }
Parameters
Parameter Description Value
mac ap-mac Confirms the AP with the specified MAC The value is in H-H-H
address. format. An H is a
hexadecimal number
of four digits.
sn ap-sn Confirms the AP with the specified SN. The value is a string of
1 to 31 characters.
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
After viewing unauthenticated APs using the 11.1.103 display ap unauthorized record
command, you can run the ap-confirm command to confirm these unauthenticated APs if you
want to connect them to the AC. After confirmation, the APs are allowed to go online, added
to the default region, and bound to the default AP profile.
Example
# Confirm the AP with MAC 0025-9e07-8270.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-confirm mac 0025-9e07-8270
Related Topics
11.1.83 display ap
11.1.109 display ap whitelist
11.1.90 display ap global configuration
11.1.33 ap-group
Function
The ap-group command creates an AP group and displays the AP group view, or displays the
view of an existing AP group.
The undo ap-group command deletes an AP group.
Format
ap-group name group-name
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If you need to perform the same configuration on multiple APs, add the APs to an AP group
and perform the configuration in the AP group. The configuration takes effect on all APs of
the group. This prevents repetitive configuration.
Follow-up Procedure
Run the 11.1.35 ap-group (AP view) or 11.1.42 ap-regroup command to add APs to an AP
group.
Precautions
l If the configuration of an AP in the AP view is different from that in the AP group view,
the configuration in the AP view is preferentially used.
l The device supports a maximum of 256 AP groups.
l The AP group that has APs cannot be deleted. The AP group default cannot be deleted
either.
l By default, an AP group has the following profiles bound: AP system profile default, 2G
radio profile default, 5G radio profile default, regulatory domain profile default, WIDS
profile default, and AP wired port profile default.
Example
# Create the AP group group1 and display the AP group view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name group1
[HUAWEI-wlan-ap-group-group1]
Related Topics
11.1.35 ap-group (AP view)
11.1.42 ap-regroup
11.1.111 display ap-group
Format
ap-group ap-group
undo ap-group
Parameters
Parameter Description Value
ap-group Specifies the group that an AP joins. The AP group must exist.
Views
AP provisioning view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the group that an AP joins is changed, and the change is delivered to the AP, the AP
automatically restarts and joins the new group.
Follow-up Procedure
Run the commit command to deliver configuration to APs and restart the APs to make the
configuration take effect.
Example
# Change the group that the AP joins to group ap-new-group.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] provision-ap
[HUAWEI-wlan-provision-ap] ap-group ap-new-group
Related Topics
11.1.68 commit (AP provisioning view)
11.1.120 display provision-ap parameter-list
Format
ap-group ap-group
undo ap-group
Parameters
Parameter Description Value
ap-group Specifies an AP group. The AP group must exist.
Views
AP view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If you need to perform the same configuration on multiple APs, add the APs to an AP group
and perform the configuration in the AP group. The configuration takes effect on all APs of
the group. This prevents you from configuring each AP one by one.
Example
# Configure the AP group ap-new-group for an AP.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-id 0
[HUAWEI-wlan-ap-0] ap-group ap-new-group
Warning: This operation may cause AP reset. If the country code changes, it will
clear channel, power and antenna gain configuration
s of the radio, Whether to continue? [Y/N]:y
11.1.36 ap-id
Function
The ap-id command adds an AP offline or displays the AP view.
Format
ap-id ap-id [ type-id type-id | ap-type ap-type ] [ ap-mac ap-mac ] [ ap-sn ap-sn ]
Parameters
Parameter Description Value
ap-id Specifies the AP ID. The value is an integer that ranges from 0
to 1023.
type-id type-id Specifies the AP type ID. The value is an integer that ranges from 0
to 255.
ap-mac ap- Specifies the MAC address The value is in H-H-H format. An H is a
mac of an AP. hexadecimal number of 4 digits.
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After an AP is successfully added to an AC, you can configure parameters for the AP offline.
When the AP goes online, it uses the configured parameters.
Precautions
To add an AP, enter the MAC address of the AP if the AP authentication mode is MAC
address authentication. If the AP authentication mode is SN authentication, enter the SN of
the AP.
To enter the AP view, you only need to enter the AP ID.
Example
# Create an AP with ID 11, type ID 19, and MAC address 0025-9e07-8270.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-id 11 type-id 19 ap-mac 0025-9e07-8270
Related Topics
11.1.83 display ap
11.1.37 ap-mac
Function
The ap-mac command adds an AP offline or displays the AP view.
By default, no AP is added offline.
Format
ap-mac ap-mac [ type-id type-id | ap-type ap-type ] [ ap-id ap-id ] [ ap-sn ap-sn ]
Parameters
Parameter Description Value
type-id type-id Specifies the AP type ID. The value is an integer that ranges from 0
to 255.
ap-id ap-id Specifies the AP ID. The value is an integer that ranges from 0
to 1023.
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After an AP is successfully added to an AC, you can configure parameters for the AP offline.
When the AP goes online, it uses the configured parameters.
Precautions
When adding an AP, you need to enter the MAC address of the AP. If the AP authentication
mode is SN authentication, you also need to enter the SN of the AP.
To enter the AP view, you only need to enter the MAC address of the AP. If the entered MAC
address does not exist, the system adds a new AP and displays the AP view.
The ap-mac ap-mac [ type-id type-id | ap-type ap-type ] [ ap-id ap-id ] [ ap-sn ap-sn ] and
ap-id ap-id [ type-id type-id | ap-type ap-type ] [ ap-mac ap-mac ] [ ap-sn ap-sn ]
commands have the same function. You can use either one according to the actual situation.
Example
# Add the AP with the MAC address 0025-9e07-8260.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-mac 0025-9e07-8260
Related Topics
11.1.83 display ap
11.1.38 ap-name
Function
The ap-name command displays the AP view.
Format
ap-name ap-name
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
After entering the AP view, you can perform personalized configuration on an AP.
Example
# Display the view of the AP named area_1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-name area_1
[HUAWEI-wlan-ap-2]
Related Topics
11.1.83 display ap
Format
ap-name ap-new-name
undo ap-name
Parameters
Parameter Description Value
ap-new-name Specifies an AP The value is a string of 1 to 31 case-sensitive
name. characters. It does not contain question marks (?) or
spaces, and cannot start or end with double quotation
marks (" ").
Views
AP provisioning view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the name of an AP is changed, and the change is delivered to the AP, the AP
automatically restarts and goes online using the new name.
Precautions
The new AP name cannot be the same as the existing AP name.
Follow-up Procedure
Run the commit command to deliver configuration to APs and restart the APs to make the
configuration take effect.
Example
# Change the AP name to AP-N1-2.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] provision-ap
[HUAWEI-wlan-provision-ap] ap-name AP-N1-2
Related Topics
11.1.68 commit (AP provisioning view)
11.1.120 display provision-ap parameter-list
Format
ap-name ap-name
undo ap-name
Parameters
Parameter Description Value
ap-name Specifies an AP The value is a string of 1 to 31 case-sensitive characters.
name. It does not contain question marks (?) or spaces, and
cannot start or end with double quotation marks (" ").
Views
AP view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Precautions
Example
# Change the AP name to AP-N1-2.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-id 0
[HUAWEI-wlan-ap-0] ap-name AP-N1-2
11.1.41 ap-ping
Function
The ap-ping command uses a specified AP to ping a network device and displays the returned
result.
Format
ap-ping { ap-name ap-name | ap-id ap-id } [ -c count | -s packetsize | -m time | -t timeout ] *
host
Parameters
Parameter Description Value
ap-name ap- Specifies the name of an AP used to ping other The AP name must
name network devices. already exist.
-c count Specifies the number of ICMP Echo Request The value is an integer
packets to be sent. that ranges from 1 to
10. The default value
is 4.
-s packetsize Specifies the length of an Echo Request packet The value is an integer
excluding the IP header and ICMP header. that ranges from 20 to
8100, in bytes. The
default value is 56
bytes.
-m time Specifies the time to wait before sending the The value is an integer
next ICMP Request packet. that ranges from 1 to
5000, in milliseconds.
The default value is
2000 ms.
-t timeout Specifies the timeout period for an ICMP Echo The value is an integer
Response packet. that ranges from 0 to
10000, in milliseconds.
The default value is
2000 ms.
host Specifies the domain name or IP address of the The value is a string of
destination host. 1 to 20 characters.
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
l You can run this command to check the connectivity between an AP and network device
by pinging a network device from an AP.
l The prerequisite is that the AP is online and has been configured with an IP address.
Precautions
l This command may cost much time because the parameters such as waiting time affects
the command running.
l Only one AP can perform the ping operation at a time.
Example
# Use the AP N1-2 to perform a ping operation.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-ping ap-name N1-2 172.168.129.109
Warning: This operation maybe takes several minutes, continue?[Y/N]:y
[HUAWEI-wlan-view]
AP ping result
Success count : 4
Failure count : 0
Average response time: 1 ms
Minimum response time: 1 ms
Maximum response time: 1 ms
11.1.42 ap-regroup
Function
The ap-regroup command changes the group that an AP joins.
Format
ap-regroup { ap-name ap-name | ap-id ap-id } new-group new-group-name
Parameters
Parameter Description Value
new-group Specifies the name of the new group to which The AP group must
new-group- the AP is added. exist.
name
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Prerequisites
The AP group has been created using the 11.1.33 ap-group command.
Configuration Impact
Changing the group of an AP will restart the AP and interrupt services. Exercise caution when
you run the command.
Example
# Change the group that an AP joins to the AP group group1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name group1
[HUAWEI-wlan-ap-group-group1] quit
[HUAWEI-wlan-view] ap-regroup ap-name 1047-80b1-56a0 new-group group1
Warning: This operation may cause AP reset. If the country code changes, it will
clear channel, power and antenna gain configuration
s of the radio, Whether to continue? [Y/N]:y
Related Topics
11.1.33 ap-group
11.1.83 display ap
11.1.43 ap-rename
Function
The ap-rename command changes the name of an AP.
Format
ap-rename { ap-name name | ap-mac ap-mac-address | ap-id ap-id } new-name ap-new-
name
Parameters
Parameter Description Value
ap-name name Specifies the old name of an AP. The AP name must
exist.
ap-mac ap- Specifies the MAC address of an AP. The AP's MAC
mac-address address must exist.
new-name ap- Specifies the new name of an AP. The value is a string of
new-name 1 to 31 case-sensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
If the name of an AP conflicts with that of another or an AP requires a more proper name, you
can run this command to change the name of the AP.
Example
# Change the AP name from N1-2 to N2-2.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-rename ap-name N1-2 new-name N2-2
Related Topics
11.1.83 display ap
11.1.44 ap-reset
Function
The ap-reset command resets an AP.
Format
ap-reset { all | ap-name ap-name | ap-mac ap-mac | ap-id ap-id | ap-group ap-group | ap-
type { type type-name | type-id type-id } }
Parameters
Parameter Description Value
ap-name ap- Resets the AP with the specified AP name. The AP name must
name exist.
ap-mac ap- Resets the AP with the specified MAC The AP's MAC
mac address. address must exist.
ap-id ap-id Resets the AP with the specified AP ID. The AP ID must exist.
The value is a string of
1 to 255 characters.
When multiple APs are
selected, use commas
(,) or hyphens (-) to
separate AP IDs. For
example, 5,8,10-13,20
indicates the list of
APs with IDs 5, 8, 10,
11, 12, 13, and 20.
ap-group ap- Resets APs in the specified AP group. The AP group must
group exist.
type type-name Resets APs of the specified type name. The AP type name
must exist.
type-id type-id Resets APs of the specified type ID. The AP type ID must
exist.
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After in-service upgrade of APs is complete, you can run the ap-reset command to reset the
APs. After the command is run, the APs restart with the upgraded software version. You can
also use the command to restart APs for other reasons.
Prerequisites
Example
# Reset the AP N1-2.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-reset ap-name N1-2
Warning: Reset AP(s), continue?[Y/N]:y
Function
The ap-system-profile command creates an AP system profile and displays the AP system
profile view, or displays the view of an existing AP system profile.
Format
ap-system-profile name profile-name
Parameters
Parameter Description Value
name profile- Specifies the name of an AP system profile. The value is a string of
name 1 to 35 case-insensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To manage and maintain multiple APs in a centralized manner, add the APs in an AP group,
configure parameters in an AP system profile, and apply the AP system profile to the AP
group.
To manage and maintain an AP independently, configure parameters in an AP system profile
and apply the AP system profile to the AP specific profile.
Follow-up Procedure
Run the 11.1.46 ap-system-profile (AP group view and AP view) command to bind the AP
system profile to an AP or AP group so that the AP system profile can take effect.
Precautions
l The AP system profile default cannot be deleted.
l The AP system profile referenced by an AP or AP group cannot be deleted. To delete the
AP system profile, unbind it from the AP or AP group first.
Example
# Create the AP system profile ap-system1 and display the AP system profile view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1]
Related Topics
11.1.46 ap-system-profile (AP group view and AP view)
11.1.112 display ap-system-profile
Function
The ap-system-profile command binds an AP system profile to an AP or AP group.
The undo ap-system-profile command unbinds an AP system profile from an AP or AP
group.
By default, the AP system profile default is bound to an AP group, but no AP system profile
is bound to an AP.
Format
ap-system-profile profile-name
undo ap-system-profile
Parameters
Parameter Description Value
Views
AP group view, AP view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After you create an AP system profile using the 11.1.45 ap-system-profile (WLAN view)
command, bind it to an AP or AP group so that the AP system profile can take effect.
Precautions
Example
# Create the AP system profile ap-system1 and bind it to AP group group1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] quit
[HUAWEI-wlan-view] ap-group name group1
[HUAWEI-wlan-ap-group-group1] ap-system-profile ap-system1
Related Topics
11.1.33 ap-group
11.1.45 ap-system-profile (WLAN view)
11.1.124 display references ap-system-profile
Function
The arp anti-attack check user-bind enable command enables dynamic ARP inspection
(DAI).
The undo arp anti-attack check user-bind enable command disables DAI.
Format
arp anti-attack check user-bind enable
Parameters
None
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
DAI allows an AP to detect the ARP Request and Reply packets transmitted on the VAPs of
the AP, to discard invalid and attack ARP packets, and to send an alarm to the connected AC.
This function prevents ARP packets of unauthorized users from accessing the external
network through the AP, protecting authorized users against interference or spoofing, and
protecting the AP.
l Invalid ARP packets: The source IP and MAC addresses of ARP Request and Reply
packets do not match.
l Attack ARP packets: When an AP receives a large number of consecutive ARP packets
and the number of ARP packets exceeds the ARP attack alarm threshold, an ARP attack
occurs.
Example
# Enable DAI.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] arp anti-attack check user-bind enable
Related Topics
11.1.143 display vap-profile
11.1.48 assignment
Function
The assignment command configures the VLAN assignment algorithm in a VLAN pool.
The undo assignment command restores the default VLAN assignment algorithm in a VLAN
pool.
By default, the VLAN assignment algorithm is hash in a VLAN pool.
Format
assignment { even | hash }
undo assignment
Parameters
Parameter Description Value
even Sets the VLAN assignment algorithm to even. -
Views
VLAN pool view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
l When the VLAN assignment algorithm is set to even, service VLANs are assigned to
STAs from the VLAN pool based on the order in which STAs go online. The STAs are
assigned a similar number of IP addresses. If a STA goes online many times, it obtains
different IP addresses.
l When the VLAN assignment algorithm is set to hash, VLANs are assigned to STAs
from the VLAN pool based on the harsh result of their MAC addresses. As long as the
VLANs in the VLAN pool do not change, the STAs obtain fixed service VLANs. A STA
is preferentially assigned the same IP address when going online at different times.
Precautions
For the even VLAN assignment algorithm, the aging time of IP addresses is set large on the
DHCP server. A STA is assigned different IP addresses when going one at different times. As
a result, a STA may occupy many IP addresses, which wastes IP addresses. Additionally,
frequent IP address changes may lower user experience.
Configuration Impact
The VLAN assignment algorithm configuration affects only newly connected STAs, but not
those that have been connected to the network.
Example
# Set the VLAN assignment algorithm to even in a VLAN pool.
<HUAWEI> system-view
[HUAWEI] vlan pool pool1
[HUAWEI-vlan-pool-pool1] assignment even
Related Topics
11.1.144 display vlan pool
11.1.263 vlan (VLAN pool view)
11.1.49 association-timeout
Function
The association-timeout command configures an association aging time for STAs.
The undo association-timeout command restores the default association aging time.
Format
association-timeout association-timeout
undo association-timeout
Parameters
Parameter Description Value
association- Specifies the association aging time of STAs. The value is an integer
timeout that ranges from 1 to
30, in minutes.
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The administrator can run the association-timeout command to set the association aging time
for STAs. If the AP receives no data packet from a STA in a specified time, the STA goes
offline after the association aging time expires.
Precautions
Changing the association aging time of a STA may interrupt the STA services.
Example
# Set the association aging time of STAs to 15 minutes in the SSID profile ssid1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] association-timeout 15
Warning: This action may cause service interruption. Continue?[Y/N]y
Related Topics
11.1.135 display ssid-profile
Function
The auto-off service command enables the scheduled VAP auto-off function and sets the time
range within which the VAP is disabled.
The undo auto-off service command disables the scheduled VAP auto-off function.
Format
auto-off service start-time start-time end-time end-time
Parameters
Parameter Description Value
Views
VAP profile view, 2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When an enterprise does not want employees to access the internal WLAN from 01:00 to
05:00, the administrator can run the auto-off service command to enable the scheduled VAP
auto-off function.
Precautions
l After the service mode of a VAP is enabled using the undo service-mode disable
command, you can run the auto-off service command to configure the scheduled VAP
auto-off function. In the scheduled time, the VAP is disabled and cannot be enabled
using the undo service-mode disable command. To enable the VAP, run the undo auto-
off service command.
l The scheduled VAP auto-off function takes effect in the scheduled time only after the
undo service-mode disable command is executed. If the service mode of a VAP is
disabled using the service-mode disable command, the VAP auto-off function does not
take effect.
l The scheduled VAP auto-off function enabled in the VAP profile view takes effect on
APs referencing the VAP profile, and the scheduled VAP auto-off function enabled in the
radio profile view takes effect on APs referencing the radio profile.
l The scheduled VAP auto-off function does not allow for the configuration of multiple
time ranges. If the auto-off service command is executed for multiple times, only the
latest time range configuration takes effect.
Example
# Configure the scheduled VAP auto-off function in the VAP profile vap1, and configure the
VAP to be disabled from 1:00:00 to 7:00:00.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] auto-off service start-time 1:00:00 end-time 7:00:00
Related Topics
11.1.141 display vap
11.1.234 service-mode disable
11.1.51 beacon-2g-rate
Function
The beacon-2g-rate command sets the transmit rate of 2.4 GHz Beacon frames.
The undo beacon-2g-rate command restores the default transmit rate of 2.4 GHz Beacon
frames.
By default, the transmit rate of 2.4 GHz Beacon frames is 1 Mbit/s.
Format
beacon-2g-rate beacon-2g-rate
undo beacon-2g-rate
Parameters
Parameter Description Value
beacon-2g-rate Specifies the transmit rate of Beacon frames. Enumerated type:
l 1: 1 Mbit/s
l 2: 2 Mbit/s
l 5.5: 5.5 Mbit/s
l 6: 6 Mbit/s
l 9: 9 Mbit/s
l 11: 11 Mbit/s
l 12: 12 Mbit/s
l 18: 18 Mbit/s
l 24: 24 Mbit/s
l 36: 36 Mbit/s
l 48: 48 Mbit/s
l 54: 54 Mbit/s
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In high-density wireless scenarios, too many Beacon frames occupy a large number of
wireless resources. To reduce wireless resource occupation of Beacon frames and improve
channel usage efficiency, you can run the beacon-2g-rate command to set a large transmit
rate for 2.4 GHz Beacon frames.
Precautions
Modifying the transmit rate of Beacon frames will affect the association experience of STAs.
Exercise caution when running the command.
The 802.11b protocol supports only 1 Mbit/s, 2 Mbit/s, 5.5 Mbit/s, and 11 Mbit/s. If you set
the transmit rate of Beacon frames to a rate not supported by the 802.11b protocol, STAs
supporting only 802.11b cannot connect to the wireless network.
If you run the radio-type dot11b command in the 2G radio profile view to set the radio type
to dot11b, and the 2G radio profile is applied to an AP, beacon-2g-rate that takes effect on the
2 GHz radio of the AP is fixed as 1 Mbps, and beacon-2g-rate configured in the SSID profile
view does not take effect on the AP.
Example
# Set the transmit rate of 2.4 GHz Beacon frames to 18 Mbit/s in the SSID profile ssid1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] beacon-2g-rate 18
Related Topics
11.1.135 display ssid-profile
11.1.213 radio-type (2G radio profile view)
11.1.52 beacon-5g-rate
Function
The beacon-5g-rate command sets the transmit rate of 5 GHz Beacon frames.
The undo beacon-5g-rate command restores the default transmit rate of 5 GHz Beacon
frames.
By default, the transmit rate of 5 GHz Beacon frames is 6 Mbit/s.
Format
beacon-5g-rate beacon-5g-rate
undo beacon-5g-rate
Parameters
Parameter Description Value
beacon-5g-rate Specifies the transmit rate of Beacon frames. Enumerated type:
l 6: 6 Mbit/s
l 9: 9 Mbit/s
l 12: 12 Mbit/s
l 18: 18 Mbit/s
l 24: 24 Mbit/s
l 36: 36 Mbit/s
l 48: 48 Mbit/s
l 54: 54 Mbit/s
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In high-density wireless scenarios, too many Beacon frames occupy a large number of
wireless resources. To reduce wireless resource occupation of Beacon frames and improve
channel usage efficiency, you can run the beacon-5g-rate command to set a large transmit
rate for 5 GHz Beacon frames.
Precautions
Modifying the transmit rate of Beacon frames will affect the association experience of STAs.
Exercise caution when running the command.
Example
# Set the transmit rate of 5 GHz Beacon frames to 18 Mbit/s in the SSID profile ssid1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] beacon-5g-rate 18
Related Topics
11.1.135 display ssid-profile
11.1.53 beacon-interval
Function
The beacon-interval command sets the interval for sending Beacon frames.
The undo beacon-interval restores the default interval for sending Beacon frames.
Format
beacon-interval beacon-interval
undo beacon-interval
Parameters
Parameter Description Value
beacon-interval Specifies the interval for sending Beacon The value is an integer
frames. that ranges from 60 ms
to 1000 ms
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
An AP broadcasts Beacon frames at intervals to notify STAs of an existing 802.11 network.
After receiving a Beacon frame, a STA can modify parameters used to connect to the 802.11
network.
A long interval for sending Beacon frames lengthens the dormancy time of STAs, while a
short interval for sending Beacon frames increases air interface costs. Therefore, you are
advised to set the interval for sending Beacon frames for an AP based on the VAP quantity.
The following intervals for sending Beacon frames are recommended for APs with different
VAP quantities on a single radio (except the AP7030DE and AP9330DN):
l No more than 4 VAPs: about 100 ms
l 5 to 8 VAPs: about 200 ms
l 9 to 12 VAPs: about 300 ms
l 13 to 16 VAPs: about 400 ms
Example
# Set the interval for sending Beacon frames to 200 ms in the 2G radio profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] beacon-interval 200
Related Topics
11.1.122 display radio-2g-profile
11.1.123 display radio-5g-profile
Function
The beamforming enable command enables Beamforming.
Format
beamforming enable
Parameters
None
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Beamforming is a signal processing technique that controls signal transmission direction, and
transmission and reception of radio signals. The transmit end uses weight to transmit signals.
The signals are transmitted to the destination as narrow beams. Beamforming increases the
signal-to-noise ratio (SNR) for the destination device.
Precautions
If nodes on the WDS or Mesh network are fixed and distant from each other, enable
Beamforming to increase WDS or Mesh link SNR. Mobile nodes may cause low link SNR in
WDS or Mesh scenarios. To prevent this problem, disable Beamforming. Among
Beamforming-capable APs, the AP2x10xN series, AP7x30xE series, and AP9330DN APs do
not support WDS and Mesh.
The smart antenna function cannot take effect if beamforming or MU-MIMO has been
configured.
AP3010DN, AP5010SN,
AP5010DN, AP6010SN,
AP6010DN, AP6310SN,
N Y Y
AP6510DN, AP6610DN,
AP7110SN, AP7110DN, and
AP2010DN
AP5030DN, AP5130DN,
AP2030DN, AP3030DN,
AP4030DN, AP4130DN,
AP9131DN, AP9132DN, N Y N
AD9430DN-12 (with R240D),
AD9430DN-24 (with R240D),
AP4030DN-E, and AP4030TN
AP8030DN, AP8130DN
AD9430DN-12 (with R230D),
N N N
and AD9430DN-24 (with
R230D)
AP4050DN-E, AP4050DN-HD,
AP6050DN, AP6150DN, Y N N
AP7050DN-E, and AP7050DE
Example
# Enable Beamforming.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] beamforming enable
Related Topics
11.1.122 display radio-2g-profile
11.1.123 display radio-5g-profile
Function
The capwap control-link-priority command configures the priority of CAPWAP
management packets.
The undo capwap control-link-priority command restores the default priority of CAPWAP
management packets.
Format
capwap control-link-priority { local | remote } priority-value
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can use the capwap control-link-priority command to configure the DSCP priority of
CAPWAP management packets. A higher priority indicates a more reliable link between the
AC and AP.
The configuration of the priority of CAPWAP management packets from an AC to an AP
takes effect immediately. After the priority of CAPWAP management packets from an AP to
an AC is changed, if the AP is online, the priority is sent to the AP in the Echo packet. If the
AP is not online, the priority is delivered to the AP in the Echo packet when the AP goes
online. The new priority takes effect once the AP receives it.
Precautions
NOTICE
Configure priority 4 to 7 for CAPWAP management packets from an AC to an AP, preventing
the CAPWAP management tunnel from being interrupted due to large traffic.
Example
# Set the priority of CAPWAP management packets from an AC to an AP to 6.
<HUAWEI> system-view
[HUAWEI] capwap control-link-priority local 6
Related Topics
11.1.114 display capwap configuration
Function
The capwap dtls control-link encrypt command enables the function of encrypting the
CAPWAP control tunnel using Datagram Transport Layer Security (DTLS).
The undo capwap dtls control-link encrypt command disables the function of encrypting
the CAPWAP control tunnel using DTLS.
By default, the function of encrypting the CAPWAP control tunnel using DTLS is disabled.
Format
capwap dtls control-link encrypt
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In the Discovery phase of the CAPWAP tunnel establishment between the AP and the AC, the
AP obtains the AC IP address using the discovery mechanism. Then in the DTLS negotiation
phase, the CAPWAP tunnel encrypts UDP packets using DTLS.
After this command is run, the CAPWAP control packets between the AP and AC are
encrypted using DTLS, and the AP and AC use the PSK to perform DTLS negotiation. If the
DTLS negotiation fails, the CAPWAP tunnel cannot be established.
Configuration Impact
Precautions
When is enabled or APs are being upgraded, the status of DTLS encryption cannot be
changed.
Example
# Enable the function of encrypting the CAPWAP control tunnel using DTLS.
<HUAWEI> system-view
[HUAWEI] capwap dtls control-link encrypt
Warning: The DTLS PSK is the default one. It is recommended to change it to
ensure security. Change it now?[Y/N]:y
New PSK:huawei@123
Configuring the new PSK, waiting......................done.
Warning: This operation may cause devices connected through CAPWAP to reset or go
offline. After DTLS is enabled, the maximum number
s of the connected ASs and APs decrease to 16 and 48 respectively. Continue?
[Y/N]:y
Related Topics
11.1.114 display capwap configuration
Format
capwap dtls psk psk-value
undo capwap dtls psk
Parameters
Parameter Description Value
psk-value Specifies the pre-shared key used for DTLS The value is string of
encryption. characters. The pre-
shared key contains 48
or 68 characters in
cipher text, for
example, %^
%#u(Oz:BL,QKYZw
%-
JWC*P8aGC,="C&M'
OI*Gmt.V(%^%#, or
contains 6 to 32
characters in plain text,
for example,
a1234567. The
password must contain
at least two types of
the following:
uppercase letters (A to
Z), lowercase letters (a
to z), digits, and
special characters
except the question
mark (?) and space.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Application Scenario
During the CAPWAP tunnel establishment between an AP and an AC, the AP performs a
DTLS session with the AC as soon as the AP is associated with the AC. DTLS supports PSK
encryption. When the pre-shared key is used for DTLS encryption, the capwap dtls psk
command can be used to manually change the value in the DTLS session on the AC.
NOTE
It is recommended that you change the pre-shared key in a timely manner to ensure device security.
Follow-up Procedure
Run the capwap dtls control-link encrypt command to enable the function of encrypting the
CAPWAP control tunnel using Datagram Transport Layer Security (DTLS).
Precautions
After the configuration is complete, the new pre-shared key will be automatically
synchronized to online APs. However, the old pre-shared key takes effect on the APs. The
new pre-shared key takes effect only after the APs goes offline and goes online again.
Example
# Configure the pre-shared key for DTLS encryption as z0020011@11.
<HUAWEI> system-view
[HUAWEI] capwap dtls psk z0020011@11
Related Topics
11.1.56 capwap dtls control-link encrypt
11.1.58 capwap dtls psk-mandatory-match enable
11.1.114 display capwap configuration
Function
The capwap dtls psk-mandatory-match enable command enables an AP to establish a
Datacom Transport Layer Security (DTLS) session with an AC using the default pre-shared
key.
The undo capwap dtls psk-mandatory-match enable command disables an AP to establish
a Datacom Transport Layer Security (DTLS) session with an AC using the default pre-shared
key.
By default, an AP is disabled to establish a DTLS session with an AC using the default pre-
shared key.
Format
capwap dtls psk-mandatory-match enable
undo capwap dtls psk-mandatory-match enable
Parameters
None.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When a new AP is added to the WLAN or the passwords of the AP and AC are different (for
example, the password of the AC is changed but the AP is not online), you can enable the AP
to perform DTLS sessions with the AC using the default pre-shared key. After three DTLS
session failures, the AP notifies the AC of DTLS sessions using the default pre-shared key. In
this way, a CAPWAP tunnel is established between the AP and the AC.
Example
# Enable the AP to establish a DTLS session with the AC using the default pre-shared key.
<HUAWEI> system-view
[HUAWEI] capwap dtls psk-mandatory-match enable
Related Topics
11.1.114 display capwap configuration
Function
The capwap echo command sets the CAPWAP heartbeat detection interval and the number of
CAPWAP heartbeat detections.
The undo capwap echo command restores the default CAPWAP heartbeat detection interval
and the number of CAPWAP heartbeat detections.
By default, the CAPWAP heartbeat detection interval is 25s and the number of CAPWAP
heartbeat detections is 6.
By default, If dual-link backup is enabled, the CAPWAP heartbeat detection interval is 25s
and the number of CAPWAP heartbeat detections is 3.
Format
capwap echo { interval interval-value | times times-value } *
Parameters
Parameter Description Value
times times- Specifies the number of CAPWAP heartbeat The value is an integer
value detections. If no response is received after the ranging from 3 to 120.
specified number of times, the link is
considered disconnected.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Precautions
If dual-link backup is enabled, the CAPWAP heartbeat detection interval is 25s and the
number of CAPWAP heartbeat detections is 3. When the Wireless Distribution System
(WDS) is required in dual-link backup configuration, the WDS link may be unstable and
users may not access the network. You need to run this command to set the interval for
CAPWAP heartbeat detection to 25 seconds and the number of CAPWAP heartbeat detections
to 6.
After the CAPWAP heartbeat detection interval and the number of CAPWAP heartbeat
detections are configured, the interval and the number of times for sending Echo packets are
configured.
Radio traffic statistics packets are sent and received together with Echo packets.
If you set the CAPWAP heartbeat detection interval and the number of CAPWAP heartbeat
detections smaller than the default values, the CAPWAP link reliability is degraded. Exercise
caution when you set the values. The default values are recommended.
Example
# Set the CAPWAP heartbeat detection interval to 30s and the number of CAPWAP heartbeat
detections to 3.
<HUAWEI> system-view
[HUAWEI] capwap echo interval 30 times 3
Related Topics
11.1.55 capwap control-link-priority
11.1.114 display capwap configuration
Function
The capwap message-integrity psk command enables integrity check of CAPWAP packets
and configures a pre-shared key (PSK).
The undo capwap message-integrity psk command disables integrity check of CAPWAP
packets.
Format
capwap message-integrity psk psk-value
undo capwap message-integrity psk
Parameters
Parameter Description Value
psk-value Specifies the PSK for checking integrity of The value can be a
CAPWAP packets. string of 48 or 68
characters in cipher
text (for example, %^
%#u(Oz:BL,QKYZw
%-
JWC*P8aGC,="C&
M'OI*Gmt.V(%^
%#) or a string of 6 to
32 characters in plain
text (for example,
a1234567). The key
must contain at least
two of the following:
uppercase letters A to
Z, lowercase letters a
to z, digits, and special
characters except the
question mark (?) and
space.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
CAPWAP packets are transmitted between the AC and APs. To prevent the packets from
being forged or tampered with and prevent malformed packet attacks, you can configure
integrity check of of CAPWAP packets. When a PSK is used to check integrity of CAPWAP
packets, you can run this command on the AC to enable integrity check of CAPWAP packets
and configure a PSK.
Configuration Impact
APs in V200R006 cannot receive the integrity check PSK delivered by the AC. Therefore,
these APs cannot go online after integrity check is enabled and the PSK is configured. In this
case, run the capwap message-integrity psk-mandatory-match enable command to
configure APs to pass integrity check of CAPWAP packets so that the APs in V200R006 can
properly go online.
Example
# Set the PSK for checking integrity of CAPWAP packets to z0020011@11.
<HUAWEI> system-view
[HUAWEI] capwap message-integrity psk z0020011@11
Warning: In a backup scenario, the PSK and status of CAPWAP message integrity
check must be the same between the master and backup e
nds. This operation may cause devices using CAPWAP connections to reset or go
offline. Continue? [Y/N]:y
Related Topics
11.1.61 capwap message-integrity psk-mandatory-match enable
11.1.114 display capwap configuration
Function
The capwap message-integrity psk-mandatory-match enable command enables APs to
pass integrity check of CAPWAP packets.
By default, APs are disabled from passing integrity check of CAPWAP packets.
Format
capwap message-integrity psk-mandatory-match enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
APs in V200R006 cannot receive the integrity check PSK delivered by the AC. Therefore,
these APs cannot go online after integrity check is enabled and the PSK is configured using
the capwap message-integrity psk psk-value command. In this case, you can run the capwap
message-integrity psk-mandatory-match enable command to enable APs in V200R006 to
pass integrity check of CAPWAP packets and properly go online.
Example
# Enable APs to pass integrity check of CAPWAP packets.
<HUAWEI> system-view
[HUAWEI] capwap message-integrity psk-mandatory-match enable
Related Topics
11.1.60 capwap message-integrity psk
Format
capwap sensitive-info psk psk-value
undo capwap sensitive-info psk
Parameters
Parameter Description Value
psk-value Specifies the PSK for encrypting sensitive The value can be a
information. string of 48 or 68
characters in cipher
text (for example, %^
%#u(Oz:BL,QKYZw
%-
JWC*P8aGC,="C&
M'OI*Gmt.V(%^
%#) or a string of 6 to
32 characters in plain
text (for example,
a1234567). The key
must contain at least
two of the following:
uppercase letters A to
Z, lowercase letters a
to z, digits, and special
characters except the
question mark (?) and
space.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Sensitive information may be exchanged between the AC and APs, for example, FTP user
name/password, AP login user name/password, and service configuration PSK. By default, a
PSK is used for encrypting sensitive information. This command allows users to manually
modify the PSK.
NOTE
After the command is executed, all APs connected to the AC are restarted.
Precautions
In dual-link backup and HSB scenarios, the PSK for encryption must be set to the same value
on the active and standby ACs. Otherwise, APs cannot set up a CAPWAP tunnel with the
standby AC.
Example
# Modify the PSK for encrypting sensitive information to z0020011@11.
<HUAWEI> system-view
[HUAWEI] capwap sensitive-info psk z0020011@11
Warning: This operation may cause devices using CAPWAP connections to reset or go
offline. Continue? [Y/N]:y
Format
capwap source interface { loopback loopback-number | vlanif vlan-id }
undo capwap source interface { loopback loopback-number | vlanif vlan-id }
Parameters
Parameter Description Value
vlanif vlan-id Configures a VLANIF interface as the source The value is an integer
interface. that ranges from 1 to
4094.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
An AC uses the IP address of the specified interface as the source IP address. All access
devices connected to the AC can learn this IP address and use the IP address to communicate
with the AC.
Prerequisites
An IP address has been assigned to the specified loopback or VLANIF interface.
Precautions
A maximum of eight AC source interfaces can be configured.
If the SVF function is enabled, only one source interface can be configured.
Configure multiple source interfaces. When the source interfaces are added to different VPN
instances, the IP addresses of these interfaces cannot be the same.
Changing configuration of the CAPWAP source interface will clear statistics of the CAPWAP
packets in CPU attack defense.
Example
# Configure a loopback interface as the source interface.
<HUAWEI> system-view
[HUAWEI] interface loopback 20
[HUAWEI-LoopBack20] ip address 192.168.10.1 24
[HUAWEI-LoopBack20] quit
[HUAWEI] capwap source interface loopback 20
Related Topics
11.1.114 display capwap configuration
11.1.64 channel
Function
(AP group radio view) The channel command configures the working bandwidth and channel
for all specified radios in an AP group.
(AP group radio view) The undo channel command restores the default working bandwidth
and channel for all specified radios in an AP group.
(AP radio view) The channel command configures the working bandwidth and channel for an
AP radio.
(AP radio view) The undo channel command cancels the configuration of the working
bandwidth and channel on an AP radio. The working bandwidth and channel on the AP radio
are then determined by those configured in the AP group radio view.
By default, the working bandwidth of a radio is 20 MHz, and no working channel is
configured for a radio.
You can run the 11.1.87 display ap config-info command to check the channel in use on a
radio.
Format
channel { 20mhz | 40mhz-minus | 40mhz-plus | 80mhz | 160mhz } channel
channel 80+80mhz channel1 channel2
undo channel
Parameters
Parameter Description Value
channel/ Specifies the working channel for a radio. The The parameter is an
channel1/ channel is selected based on the country code enumeration value.
channel2 and radio mode. The value range is
determined according
to the country code and
radio mode.
Views
AP radio view, AP group radio view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Different radios use different channels. Channels for radios also vary in different countries
and regions. Select channels based on the actual situations.
Precautions
The configured channel parameters must match the radio frequency band. For details about
mappings between channel parameters and frequency bands, see Country Codes & Channels
Compliance. You can obtain this table at Huawei technical support website.
l Enterprise technical support website: http://support.huawei.com/enterprise
l Carrier technical support website: http://support.huawei.com
The channels you configure must be supported by the terminals; otherwise, the terminals
cannot discover wireless signals. For example, when the country code is set to China, 5 GHz
channels 36, 40, 44, 48, 52, 56, 60, and 64 can be configured. However, most terminals do not
support these channels currently. If these channels are configured, the terminals cannot
discover wireless signals. In this case, you can configure 5 GHz channels 149, 153, 157, 161,
and 165, which are supported by the terminals.
If an AP detects radar signals on a channel, the channel cannot be configured as the radio
channel of the AP in 30 minutes. However, the channel can be configured as the radio channel
of other APs not detecting radar signals on it.
The configuration in the AP radio view has a higher priority than that in the AP group radio
view.
NOTE
l The 80 MHz, 160 MHz, and 80+80 MHz working bandwidths are only supported in the 5G radio view.
l Currently, only the 5 GHz radio of the AP6050DN, AP6150DN, AP7050DE, and 7050DN-E supports
160 MHz, and 80+80 MHz. Only the 5 GHz radio of the AD9430DN-24 (including the mapping RUs),
AD9430DN-12 (including the mapping RUs), AP5030DN, AP5130DN, AP8030DN, AP8130DN,
AP7030DE, AP9330DN, AP2030DN, AP4030DN, AP4130DN, AP9131DN, AP9132DN, AP4030TN,
AP4050DN-E, AP4050DN-HD, AP6050DN, AP6150DN, AP7050DN-E, AP7050DE supports 80 MHz.
Example
# Set the working bandwidth to 20 MHz and channel to 6 for radio 0 of AP 1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-id 1
[HUAWEI-wlan-ap-1] radio 0
[HUAWEI-wlan-radio-1/0] channel 20mhz 6
Related Topics
11.1.122 display radio-2g-profile
11.1.123 display radio-5g-profile
Function
The channel-switch announcement disable command disables an AP from sending an
announcement when the channel is switched.
Format
channel-switch announcement disable
Parameters
None
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
When the AP works on a Depth First Select (DFS) channel, a radar detection is performed.
The AP automatically switches to another channel because the DFS channel frequency may
interfere with the radar frequency.
After the undo channel-switch announcement disable command is run, if the AP channel
switches, the AP sends an Action frame to instruct STAs to switch channels after multiple
Beacon intervals. The AP also switches the channel after the same intervals. The AP and
STAs switch channels at the same time to prevent STA reassociations and ensure rapid service
recovery.
NOTE
The channel switching announcement function must be supported by both the AP and STA.
Example
# Disable the AP from sending an announcement after the channel is switched.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] channel-switch announcement disable
Related Topics
11.1.122 display radio-2g-profile
11.1.123 display radio-5g-profile
Function
The channel-switch mode command configures an announcement mode for channel
switching.
The undo channel-switch mode command restores the default announcement mode for
channel switching.
By default, data transmission from STAs continues on the current channel when the channel is
switched.
Format
channel-switch mode { stop-transmitting | continue-transmitting }
undo channel-switch mode
Parameters
Parameter Description Value
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
During channel switching, STA communication is interrupted. The administrator can stop an
associated STA sending data on the current channel until channel switching is complete.
Alternatively, data transmission from STAs can be continued on the current channel before
channel switching is complete.
Example
# Stop data transmission from STAs on the current channel during channel switching.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] channel-switch mode stop-transmitting
Related Topics
11.1.122 display radio-2g-profile
11.1.123 display radio-5g-profile
Function
The clear configuration this command clears all configurations in the AP provisioning view.
Format
clear configuration this
Parameters
None
Views
AP provisioning view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To configure new AP provisioning parameters, run the clear configuration this command in
the AP provisioning view to clear existing configurations.
Configuration Impact
Configurations in the AP provisioning view cannot be restored after they are cleared.
Therefore, exercise caution when running the clear configuration this command.
Example
# Clear all configurations in the AP provisioning view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] provision-ap
[HUAWEI-wlan-provision-ap] clear configuration this
Related Topics
11.1.120 display provision-ap parameter-list
Function
The commit command commits configuration to .
Format
commit { ap-name ap-name | ap-mac ap-mac-address | ap-id ap-id | ap-group ap-group-
name }
Parameters
Parameter Description Value
ap-name ap- Commits configuration to the AP with the The AP name must
name specified AP name. already exist.
ap-mac ap- Commits configuration to the AP with the The AP's MAC
mac-address specified MAC address. address must already
exist.
Views
AP provisioning view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can configure AP provisioning parameters on the AC, such as the AP's management
VLAN, static IP address, gateway, and AC list. After the configuration is complete, run the
commit command, and the configuration will be delivered to the AP.
Prerequisites
APs have gone online on the AC.
Precautions
l After the configuration is committed, the AP receives the configuration and compares
the configuration with its local configuration.
– If they are consistent, the AP does not process the received configuration.
– If they are different, the AP saves the committed configuration and automatically
restarts, and the received configuration takes effect.
l If the name or static IP address of an AP is specified in the AP provisioning view, the
configuration is delivered only to the AP by specifying the AP name or MAC address,
but cannot be delivered to APs in the specified AP group.
l If you commit configurations to a large number of APs simultaneously, some of the APs
may fail to receive the configurations. In this case, you are advised to commit the
configurations again.
Example
# Commit configuration to the AP with the MAC address 0023-0024-0080.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] provision-ap
[HUAWEI-wlan-provision-ap] commit ap-mac 0023-0024-0080
Related Topics
11.1.120 display provision-ap parameter-list
Format
commit { all | ap-name ap-name | ap-id { ap-id1 [ to ap-id2 ] } &<1-10> }
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
You can configure attributes for APs on the AC. The configurations are delivered to APs only
after you run the commit command to commit the configurations.
NOTE
If you commit configurations to a large number of APs simultaneously, some of the APs may fail to receive
the configurations. In this case, you are advised to commit the configurations again.
Example
# Commit the configuration of a specified AP.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] commit ap-name ap-1
Warning: Committing configuration may cause service interruption, continue?[Y/N]:y
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] commit all
Warning: Committing configuration may cause service interruption, continue?[Y/N]:y
Function
The console disable command disables a user from logging in to the AP through a console
interface.
The undo console disable command enables a user from logging in to the AP through a
console interface.
Format
console disable
Parameters
None
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
When a user cannot telnet or stelnet to the AP, the user can log in to the AP through a console
interface to manage and configure the AP.
After the console disable command is run, unauthorized users cannot log in to the AP through
the console interface to perform operations.
Example
# Disable a user to log in to the AP through a console interface.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] console disable
Related Topics
11.1.112 display ap-system-profile
11.1.71 copy-from
Function
The copy-from command copies data to the current profile from a profile of the same type.
Format
copy-from profile-name
Parameters
Parameter Description Value
profile-name Specifies the name of the profile from which The profile name must
data is copied. already exist.
Views
All WLAN profile views
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run the copy-from command to copy data to the current profile from a profile of the
same type. This simplifies profile configuration and improves configuration efficiency.
l To create a profile that has the same configuration as an existing profile, enter the view
of the profile to be created and run the copy-from command to copy data from the
existing profile.
l To create a profile that has most configurations the same as an existing profile, enter the
view of the profile to be created, run the copy-from command to copy data from the
existing profile, and modify the different configurations.
Precautions
If the current profile is referenced by another profile, you cannot run the command to copy
data to the current profile.
Example
# Create the VAP profile huawei and copy data from the profile sample.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name huawei
[HUAWEI-wlan-vap-prof-huawei] copy-from sample
11.1.72 country-code
Function
The country-code command configures a country code.
The undo country-code command restores the default country code.
By default, the country code CN is configured.
Format
country-code country-code
undo country-code
Parameters
Parameter Description Value
Views
Regulatory domain profile view
Default Level
2: Configuration level
Usage Guidelines
AM Armenia
AR Argentina
AT Austria
AU Australia
AZ Azerbaijan
BE Belgium
BG Bulgaria
BH Bahrain
BN Brunei Darussalam
BO Bolivia
BR Brazil
BY Belarus
BZ Belize
CA Canada
CH Switzerland
CL Chile
CN China (default)
CO Colombia
CR Costa Rica
CY Cyprus
CZ Czech Republic
DE Germany
DK Denmark
DO Dominican Republic
EC Ecuador
EE Estonia
EG Egypt
ES Spain
FI Finland
FR France
GB United Kingdom
GE Georgia
GR Greece
GT Guatemala
HN Honduras
HR Croatia
HU Hungary
ID Indonesia
IE Ireland
IL Israel
IN India
IQ Iraq
IR Iran
IS Iceland
IT Italy
JO Jordan
JP Japan
KR Republic of Korea
KW Kuwait
KZ Kazakhstan
LB Lebanon
LI Liechtenstein
LK Sri Lanka
LT Lithuania
LU Luxembourg
LV Latvia
MA Morocco
MC Monaco
MK Macedonia
MT Malta
MX Mexico
MY Malaysia
NG Nigeria
NL Netherlands
NO Norway
NZ New Zealand
OM Oman
PA Panama
PE Peru
PH Philippines
PK Pakistan
PL Poland
PR Puerto Rico
PT Portugal
QA Qatar
RO Romania
RU Russia
SA Saudi Arabia
SE Sweden
SG Singapore
SI Slovenia
SK Slovakia
SV El Salvador
SY Syria
TH Thailand
TN Tunisia
TR Turkey
UA Ukraine
US United States
UY Uruguay
UZ Uzbekistan
VE Venezuela
VN Vietnam
YE Yemen
ZA South Africa
ZW Zimbabwe
Usage Scenario
When an AC controls APs in different countries or regions, different country codes can be
configured based on the regulatory domain profile to meet different radio requirements in
different countries or regions, such as power requirements and channel requirements.
Configuration Impact
Modifying the country code in a regulatory domain profile will restart APs using the profile.
Example
# Set the country code to US in the regulatory domain profile region1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] regulatory-domain-profile name region1
[HUAWEI-wlan-regulate-domain-region1] country-code us
Warning: Modifying the country code will clear channel, power and antenna gain
configurations of the radio and reset the AP. Continu
e?[Y/N]:y
Related Topics
11.1.133 display regulatory-domain-profile
Function
(AP group radio view) The coverage distance command configures the radio coverage
distance parameter for all specified radios in an AP group.
(AP group radio view) The undo coverage distance command restores the default radio
coverage distance parameter for all specified radios in an AP group.
(AP radio view) The coverage distance command configures the radio coverage distance
parameter for an AP radio.
(AP radio view) The undo coverage distance command cancels the configuration of the radio
coverage distance parameter on an AP radio. The radio coverage distance parameter on the
AP radio is then determined by that configured in the AP group radio view.
By default, the radio coverage distance parameter is 3 (unit: 100 m) for all radios.
Format
coverage distance distance
Parameters
Parameter Description Value
Views
AP radio view, AP group radio view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In actual application scenarios, two APs may be connected over dozens of meters to dozens of
kilometers. Due to different AP distances, the time to wait for ACK packets from the peer AP
varies. A proper acktimeout value can improve data transmission efficiency between APs.
You can configure the radio coverage distance parameter based on distances between APs and
the APs automatically adjust the values of slottime, acktimeout, and ctstimeout based on the
configured distance parameter to improve data transmission efficiency.
Precautions
The configuration in the AP radio view has a higher priority than that in the AP group radio
view.
Example
# Set the radio coverage distance parameter to 2 for radio 0 of AP 1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-id 1
[HUAWEI-wlan-ap-1] radio 0
[HUAWEI-wlan-radio-1/0] coverage distance 2
Related Topics
11.1.122 display radio-2g-profile
11.1.123 display radio-5g-profile
Format
cpu-usage threshold threshold
undo cpu-usage threshold
Parameters
Parameter Description Value
threshold Specifies the CPU usage alarm threshold of The value is an integer
APs. that ranges from 50 to
100.
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
You can run the cpu-usage threshold command to configure the CPU usage alarm threshold
in the AP system profile view. The configuration is delivered to all APs using the profile.
l When the CPU usage of an AP exceeds the alarm threshold, the AP sends an alarm
message to the AC, and the AC displays the alarm information.
l When the CPU usage of an AP falls below the alarm threshold, the AP sends a clear
alarm message to the AC, and the AC displays the clear alarm information.
Example
# Set the CPU usage alarm threshold to 60.
<HUAWEI> system-view
[HUAWEI] wlan
Format
crc-alarm enable [ high-threshold high-threshold-value | low-threshold low-threshold-
value ]*
undo crc-alarm enable
Parameters
Parameter Description Value
high-threshold Specifies the alarm threshold for CRC errors The value is an integer
high-threshold- on the AP wired interface. ranging from 1 to 100.
value The unit is 1/10000.
The value of high-
threshold-value must
be larger than the value
of low-threshold-value.
low-threshold Specifies the clear alarm threshold for CRC The value is an integer
low-threshold- errors on the AP wired interface. ranging from 1 to 100.
value
Views
AP wired port link profile view
Default Level
2: Configuration level
Usage Guidelines
When the AP detects that the number of CRC errors exceeds the configured upper alarm
threshold in a specified period (the time period can be configured using the 11.1.233 sample-
time command, and is 30s by default), it sends an alarm message to the AC. To prevent the
AP from frequently sending alarm messages or alarm clearance messages to the AC, you need
to configure the lower threshold for clearing the alarm. The AP sends an alarm clearance
message to the AC only when the AP detects that the number of CRC errors is lower than the
configured lower threshold.
Example
# Enable the alarm function for CRC errors on the AP's wired interface.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] port-link-profile name port-link1
[HUAWEI-wlan-port-link-prof-port-link1] crc-alarm enable
Related Topics
11.1.119 display port-link-profile
11.1.233 sample-time
Function
The dai enable command enables dynamic ARP inspection (DAI) on an AP's wired interface.
The undo dai enable command disables DAI on an AP's wired interface.
By default, DAI is disabled on an AP's wired interface.
Format
dai enable
undo dai enable
Parameters
None
Views
AP wired port profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can enable DAI using this command to prevent Man in The Middle (MITM) attacks and
theft on authorized user information. When a device receives an ARP packet, it compares the
source IP address, source MAC address, interface number, and VLAN ID of the ARP packet
with DHCP snooping binding entries. If the ARP packet matches a binding entry, the device
allows the packet to pass through. If the ARP packet does not match any binding entry, the
device discards the packet.
Prerequisites
Terminal address learning has been enabled on the AP's wired interface using the learn-
client-address enable command.
Follow-up Procedure
Precautions
This command takes effect only on ARP packets transmitted on an AP's wired interface.
The AP wired interfaces added to an Eth-trunk interface do not support this function.
Example
# Enable DAI on an AP's wired interface.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wired-port-profile name wire1
[HUAWEI-wlan-wired-port-wire1] dai enable
Related Topics
11.1.145 display wired-port-profile
Function
The deny-broadcast-probe enable command configures an AP not to respond to broadcast
Probe Request frames.
Format
deny-broadcast-probe enable
Parameters
None
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In high-density wireless scenarios, too many Probe Response frames occupy a large number
of wireless resources. To reduce wireless resource occupation of the frames and improve
channel usage efficiency, you can run the deny-broadcast-probe enable command to
configure an AP not to respond to broadcast Probe Request frames.
Precautions
Configuring an AP not to respond to broadcast Probe Request frames may reduce channel
scan efficiency of some STAs.
Example
# Configure an AP not to respond to broadcast Probe Request frames.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] deny-broadcast-probe enable
Related Topics
11.1.135 display ssid-profile
Format
description description
undo description
Parameters
Parameter Description Value
Views
AP wired port profile view
Default Level
2: Configuration level
Usage Guidelines
To manage AP interfaces conveniently, run this command to set AP interface descriptions.
The description of an AP interface helps you identify the AP interface and know its functions.
Example
# Change the description of the AP's wired interface to poe-power.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wired-port-profile name wired-port1
[HUAWEI-wlan-wired-port-wired-port1] description poe-power
Related Topics
11.1.145 display wired-port-profile
Function
The dhcp option82 insert enable command enables the function of adding the Option 82
field to DHCP packets sent by STAs.
The undo dhcp option82 insert enable command disables the function of adding the Option
82 field to DHCP packets sent by STAs.
By default, the function of adding the Option 82 field to DHCP packets sent by STAs is
disabled.
Format
dhcp option82 insert enable
Parameters
None
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
After going online, a STA obtains the IP address through DHCP. When the DHCP Request
packet from the STA reaches an AP, the AP adds the Option 82 field to the packet and sends
the packet to the DHCP server. The Option 82 field contains the MAC address or SSID of the
associated AP. Therefore, the DHCP server knows the AP on which the STA goes online.
Example
# Enable the function of adding the Option 82 field to DHCP packets sent by STAs.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] dhcp option82 insert enable
Related Topics
11.1.80 dhcp option82 format (vap profile view)
11.1.143 display vap-profile
Function
The dhcp option82 format command configures the format of the Option 82 field in DHCP
packets sent by STAs.
The undo dhcp option82 format command restores the default format of the Option 82 field
in DHCP packets sent by STAs.
By default, the format of the Option 82 field inserted in DHCP packets sent by STAs is ap-
mac.
Format
dhcp option82 { circuit-id | remote-id } format { { ap-mac | ap-mac-ssid } [ mac-format
{ normal | compact } ] | user-defined text }
Parameters
Parameter Description Value
circuit-id Specifies the circuit-ID (CID) in the Option 82 -
field.
remote-id Specifies the remote-ID (RID) in the Option 82 -
field.
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
After an AP is enabled to insert the Option 82 field in DHCP packets sent from a STA, you
can run the dhcp option82 format command to configure the format of the Option 82 field.
You can use the following keywords to define the Option 82 field.
l ap-mac: MAC address of the AP. After DHCP packets from a STA reach an AP, the AP
inserts its MAC address into the Option 82 field of the DHCP packets.
l ap-mac-ssid: MAC address and SSID of the AP. After DHCP packets from a STA reach
an AP, the AP inserts its MAC address and SSID associated with the STA into the
Option 82 field of the DHCP packets.
If mac-format is not specified in the dhcp option82 { circuit-id | remote-id } format { ap-
mac | ap-mac-ssid } command, the AP MAC address in the Option 82 field is in the format
of XXXXXXXXXXXX.
Example
# Set the format of remote-id in Option 82 carried in DHCP packets sent by STAs to ap-mac-
ssid.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] dhcp option82 remote-id format ap-mac-ssid
Related Topics
11.1.79 dhcp option82 insert enable
11.1.143 display vap-profile
Format
dhcp trust port
undo dhcp trust port
Parameters
None
Views
VAP profile view, AP wired port profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If a bogus DHCP server is deployed at the user side, STAs may obtain incorrect IP addresses
and network configuration parameters and cannot communicate properly. After the undo
dhcp trust port command is executed in the VAP profile view, an AP discards the DHCP
OFFER, ACK, and NAK packets sent by the bogus DHCP server and reports to the AC about
the IP address of the unauthorized DHCP server.
Before WLAN services are delivered to an AP, run the dhcp trust port command in the AP
wired port profile view. After the command is run, the AP receives the DHCP OFFER, ACK,
and NAK packets sent by the authorized DHCP server and forwards the packets to STAs so
that the STAs can obtain valid IP addresses and go online.
The undo dhcp trust port command configured in the AP wired port profile view takes
effect only in direct forwarding mode, but not the tunnel forwarding mode.
Precautions
When executed in the AP wired port, this command takes effect only on uplink interfaces of
an RU.
Example
# Create the VAP profile vap1 and configure a DHCP trusted interface on the AP in the VAP
profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] dhcp trust port
Related Topics
11.1.143 display vap-profile
11.1.112 display ap-system-profile
Function
The display ac global configuration command displays AC global configuration.
Format
display ac global configuration
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view AC global information.
Example
# Display AC global configuration.
<HUAWEI> display ac global configuration
--------------------------------------------------------------------------------
AC sysnetid : AC
--------------------------------------------------------------------------------
Related Topics
11.1.1 ac sysnetid
11.1.83 display ap
Function
The display ap command displays AP information.
Format
display ap { all | ap-group ap-group }
display ap [ ap-group ap-group ] by-ssid ssid
display ap by-state state [ ap-group ap-group ]
Parameters
Parameter Description Value
ap-group ap- Specifies the group to which an AP belongs. The AP group must
group exist.
l standby: Displays
information about
APs in standby AC
state.
l ver-mismatch:
Displays
information about
APs with versions
that do not match
the AC version.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
To view information about APs, run this command.
Example
# Display information about all APs.
<HUAWEI> display ap all
Total AP information:
nor : normal [2]
----------------------------------------------------------------------------------
-------
ID MAC Name Group IP Type State STA
Uptime
----------------------------------------------------------------------------------
-------
0 dcd2-fcf6-76a0 area_1 ap-group1 192.168.120.254 AP6010DN-AGN nor 0 4H:
49M:11S
1 60de-4474-9640 area_2 ap-group1 192.168.120.253 AP5010DN-AGN nor 0 6H:
3M:40S
----------------------------------------------------------------------------------
-------
Total: 2
3M:40S
----------------------------------------------------------------------------------
-------
Total: 2
ID AP ID.
Name AP name.
Group AP group.
IP AP IP address.
Type AP type.
Related Topics
11.1.36 ap-id
11.1.37 ap-mac
Format
display ap around-ssid-list { ap-name ap-name | ap-id ap-id }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view SSIDs of neighbors of a specified AP. Neighbors of an AP
include authorized and unauthorized neighbors. Authorized neighbors are other APs managed
by the same AC. APs that are managed by other ACs are unauthorized neighbors.
Example
# Display SSIDs of neighbors of AP huawei.
<HUAWEI> display ap around-ssid-list ap-name huawei
In control AP(2.4G):
---------------------------------------------------
SSID
---------------------------------------------------
test1
---------------------------------------------------
Total: 1
Uncontrol AP(2.4G):
---------------------------------------------------
SSID
---------------------------------------------------
test2
---------------------------------------------------
Total: 1
In control AP(5G):
---------------------------------------------------
SSID
---------------------------------------------------
test3
---------------------------------------------------
Total: 1
Uncontrol AP(5G):
---------------------------------------------------
SSID
---------------------------------------------------
test4
---------------------------------------------------
Total: 1
Format
display ap asyn-message err-info { all | ap-name ap-name | ap-id ap-id }
Parameters
Parameter Description Value
ap-name ap- Displays records about restart failures of the The AP name must
name AP with a specified name. exist.
ap-id ap-id Displays records about restart failures of the The AP ID must exist.
AP with a specified ID.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
When you use commands on the AC to restart an AP manually, during an upgrade, or to
restore its factory settings, the restart message delivered by the AC may get lost due to
transmission failures. Therefore, APs are not restarted. If an AP does not receive the restart
message, the AP is still connected to the AC, which makes the AC incorrectly consider that
the AP is restarted successfully. This command displays records about AP restart failures,
helping you check whether the AP is restarted successfully. If the AP restart fails, restart the
AP.
Example
# Display records about restart failures of all APs.
<HUAWEI> display ap asyn-message err-info all
------------------------------------------------------------------------------
AP Name MAC Time Reason
------------------------------------------------------------------------------
hw1 dcd2-fcf4-6600 2015-1-19 14:41:59 update
hw2 dcd2-fcf4-8800 2015-1-19 14:45:56 clear config
------------------------------------------------------------------------------
Total: 2
Item Description
Function
The display ap blacklist command displays the AP blacklist.
Format
display ap blacklist
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
This command displays APs in the blacklist. These APs are not allowed to go online on the
AC. If an AP is online on the AC but is in the blacklist, the AP is forced to log out.
Example
# Display the AP blacklist.
<HUAWEI> display ap blacklist
--------------------------------------------------------------------------------
ID MAC
--------------------------------------------------------------------------------
0 0001-0002-0001
--------------------------------------------------------------------------------
Total: 1
Item Description
Related Topics
11.1.14 ap blacklist
Function
The display ap config-info command displays AP configuration.
Format
display ap config-info { ap-name ap-name | ap-id ap-id }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display ap config-info command to view AP configuration information,
including the basic configuration, radio configuration, VAP configuration, and profile
configuration.
Example
# Display the configuration of AP huawei.
<HUAWEI> display ap config-info ap-name huawei
--------------------------------------------------------------------------------
AP MAC : dcd2-fcf6-76a0
AP SN : 210235419610D2000097
AP type : AP6010DN-AGN
AP name : huawei
AP group : default
Country code : CN
--------------------------------------------------------------------------------
Radio 0 configurations:
Radio enable : yes
Work mode : normal
WDS mode : -
Mesh mode : -
Radio band : 2.4G
Radio type : bgn
Config channel/bandwidth : -/20M
Actual channel/bandwidth : 1/20M
Config EIRP : 127
Actual EIRP : 27
Maximum EIRP : 27
VAP configurations:
WLAN ID 1:
SSID : HUAWEI-WLAN
Forward mode : direct-forward
Authen mode : Open
Encrypt mode : -
--------------------------------------------------------------------------------
Radio 1 configurations:
Radio enable : yes
Work mode : normal
WDS mode : -
Mesh mode : -
Radio band : 5G
Radio type : an
Config channel/bandwidth : -/20M
Actual channel/bandwidth : 157/20M
Config EIRP : 127
Actual EIRP : 28
Maximum EIRP : 28
VAP configurations:
WLAN ID 1:
SSID : HUAWEI-WLAN
Forward mode : direct-forward
Authen mode : Open
Encrypt mode : -
--------------------------------------------------------------------------------
--------------------------------------------------------------------------------
AP system profile : default
Regulatory domain profile : default
WIDS profile : default
BLE profile :
AP wired port profile
Interface FE0 : default
Interface FE1 : default
Interface FE2 : default
Interface FE3 : default
Interface GE0 : default
Interface GE1 : default
Interface GE2 : default
Interface GE3 : default
Interface GE4 : default
Interface GE5 : default
Interface GE6 : default
Interface GE7 : default
Interface GE8 : default
Interface GE9 : default
Interface GE10 : default
Interface GE11 : default
Interface GE12 : default
Interface GE13 : default
Interface GE14 : default
Interface GE15 : default
Interface GE16 : default
Interface GE17 : default
Interface GE18 : default
Interface GE19 : default
Interface GE20 : default
Interface GE21 : default
Interface GE22 : default
Interface GE23 : default
Interface GE24 : default
Interface GE25 : default
Interface GE26 : default
Interface GE27 : default
Interface MultiGE0 : default
Interface Eth-trunk0 : default
Radio 0
Radio 2.4G profile : default
Radio 5G profile :
VAP profile
WLAN 1 : default
Mesh profile :
WDS profile :
Mesh whitelist profile :
WDS whitelist profile :
Location profile :
Radio switch : enable
Channel : -
AP SN SN of an AP.
AP type AP type.
AP name AP name.
To configure the parameter, run the 11.1.40
ap-name (AP view) or 11.1.43 ap-rename
command.
AP group AP group.
To configure the parameter, run the 11.1.35
ap-group (AP view) or 11.1.42 ap-regroup
command.
Item Description
Item Description
Item Description
Item Description
Function
The display ap configurable channel command displays the configurable channels
supported by a specified AP.
Format
display ap configurable channel { ap-name ap-name | ap-id ap-id }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Different countries or regions use different wireless channels and powers. Setting country and
area codes can specify channels that can be used on WLANs of different countries. The
display ap configurable channel command displays the configurable channels supported by
a specified AP.
Example
# Display configurable channels supported by AP huawei.
<HUAWEI> display ap configurable channel ap-name huawei
2.4G 20M : 1,2,3,4,5,6,7,8,9,10,11,12,13.
2.4G 40M+: 1,2,3,4,5,6,7,8,9.
2.4G 40M-: 5,6,7,8,9,10,11,12,13.
5G 20M :
36,40,44,48,52,56,60,64,100,104,108,112,116,120,124,128,132,136,140,149,153,157,16
1,165.
5G 40M+: 36,44,52,60,100,108,116,124,132,149,157.
5G 40M-: 40,48,56,64,104,112,120,128,136,153,161.
5G 80M :
36,40,44,48,52,56,60,64,100,104,108,112,116,120,124,128,149,153,157,161.
5G 160M : 36,40,44,48,52,56,60,64,100,104,108,112,116,120,124,128.
5G 80+80M: 36+106, 36+122, 36+155, 40+106, 40+122, 40+155, 44+106, 44+122,
44+155, 48+106, 48+122, 48+155, 52+106, 52+122, 52+155, 56+106,
56+122, 56+155, 60+106, 60+122, 60+155, 64+106, 64+122, 64+155,
100+42, 100+58, 100+155, 104+42, 104+58, 104+155, 108+42, 108+58,
108+155, 112+42, 112+58, 112+155, 116+42, 116+58, 116+155, 120+42,
120+58, 120+155, 124+42, 124+58, 124+155, 128+42, 128+58, 128+155,
149+42, 149+58, 149+106, 149+122, 153+42, 153+58, 153+106, 153+122,
157+42, 157+58, 157+106, 157+122, 161+42, 161+58, 161+106, 161+122.
Item Description
Function
The display ap-elabel command displays electronic label information about a specified AP.
Format
display ap elabel { ap-name ap-name | ap-id ap-id | all }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view electronic label information about an AP. An electronic
label is also called permanent configuration data or information and is written in the storage
device during AP testing or commissioning. An electronic label includes the AP name, serial
number, manufacture date and manufacturer information.
Example
# Display electronic label information about AP huawei.
<HUAWEI> display ap elabel ap-name huawei
/$[ArchivesInfo Version]
/$ArchivesInfoVersion=3.0
[Board Properties]
BoardType=AP6310SN-GN-CN
BarCode=210235449210CB000011
Item=02354492
Description=AP6310SN-GN Bundle(11n,Distributed AP Indoor,Single Frequency,AC/DC
adapter(CN))
Manufactured=2012-11-27
VendorName=Huawei
IssueNumber=00
CLEICode=
BOM=
BoardType AP type.
ID AP ID.
Name AP name.
Type AP type.
SN SN of an AP.
Function
The display ap global configuration command displays AP global configuration.
Format
display ap global configuration
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view AP global information.
Example
# Display AP global configuration.
<HUAWEI> display ap global configuration
--------------------------------------------------------------------------------
AP auth-mode : MAC-auth
AP LLDP swtich : disable
AP username/password : -/******
AP data collection : disable
AP data collection interval(minute): 5
--------------------------------------------------------------------------------
Related Topics
11.1.13 ap auth-mode
11.1.17 ap lldp enable
11.1.30 ap username
11.1.15 ap data-collection enable
11.1.16 ap data-collection interval
Function
The display ap lldp neighbor command displays LLDP neighbor information on a specified
AP.
Format
display ap lldp neighbor { { ap-name ap-name | ap-id ap-id } [ interface interface-type
interface-number ] | brief }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view LLDP neighbor information on a specified AP, including
the number of LLDP neighbors, device ID, interface ID, system name system description, and
management address of each neighbor. The LLDP neighbor information is reported by an AP
to the connected AC.
Example
# Display LLDP neighbor information on all APs.
<HUAWEI> display ap lldp neighbor brief
----------------------------------------------------------------------------------
----
Hostname Neighbor device Management address Local intf Neighbor intf
TTL
----------------------------------------------------------------------------------
----
huawei Quidway 10.10.10.3 GE0 GigabitEthernet0/0/16
119
----------------------------------------------------------------------------------
----
Total: 1
Hostname AP name.
Neighbor index : 1
Host Name : huawei
Chassis ID type : macAddress
Chassis ID : 5489-9876-b7d7
Port ID type : interfaceName
Port ID : GigabitEthernet0/0/2
Time to live : 120s
Port description : GigabitEthernet0/0/2
System name : Quidway
System description : S5720-56C-HI
Huawei Versatile Routing Platform Software
VRP (R) software,Version 5.110 (S5720HI V200R009C00)
Copyright (C) 2007 Huawei Technologies Co., Ltd.
System capabilities supported: wlanAccessPoint telephone
System capabilities enabled : wlanAccessPoint telephone
Management address type : IPv4
Management address : 10.10.10.5
--------------------------------------------------------------------------------
Table 11-15 Description of the display ap lldp neighbor ap-name ap-name interface
interface-type interface-number command output
Item Description
Item Description
Item Description
Related Topics
11.1.17 ap lldp enable
Function
The display ap neighbor command displays information about neighbors of a radio,
including authorized and unauthorized neighbors.
Format
display ap neighbor { ap-name ap-name | ap-id ap-id } [ radio radio ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
APs' neighbor information reflects the APs' locations and neighbor relationships, helping you
plan the network.
Information about authorized neighbors includes forward channel attenuation and backward
channel attenuation:
l Forward channel attenuation: indicates the attenuation from the local AP to the
neighboring AP.
l Backward channel attenuation: indicates the attenuation from the neighboring AP to the
local AP.
If a neighboring AP is an unauthorized one, the system displays only the power of signals
received from the neighboring AP.
Example
# Display neighbor information of AP huawei.
<HUAWEI> display ap neighbor ap-name huawei
Radio: Radio ID of AP
In control AP:
----------------------------------------------------------
Radio AP ID AP name Channel Front(db) Back(db)
----------------------------------------------------------
0 1 ap-14 1 44 45
1 2 ap-14 2 44 45
----------------------------------------------------------
Total: 2
Uncontrol AP:
----------------------------------------------------------
Radio BSSID Channel RSSI(dBm) SSID
----------------------------------------------------------
0 0020-1306-0680 1 -79 b
1 cc53-b5ee-3d00 5 -60 test
---------------------------------------------------------
Total: 2
Item Description
AP ID ID of a neighboring AP.
Function
The display ap offline-record command displays AP offline records.
Format
display ap offline-record { all | mac mac-address }
Parameters
Parameter Description Value
mac mac- Displays offline records of the AP with the The AP's MAC
address specified MAC address. address must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
This command displays AP offline records, helping the maintenance personnel manage and
maintain the APs.
After the number of AP offline records reaches the maximum that can be stored, new records
overwrite existing ones.
Example
# Display all AP offline records.
<HUAWEI> display ap offline-record all
------------------------------------------------------------------------------
MAC Last offline time Reason
------------------------------------------------------------------------------
0023-0024-0080 2015-01-31/16:21:50 Reboot by ap-reset command
60de-4476-e360 2015-01-31/14:02:35 Reboot by ap update reset command
1047-80b1-56a0 2015-01-31/13:52:35 Reboot by ap update reset command
------------------------------------------------------------------------------
Total records: 3
Item Description
Related Topics
11.1.220 reset ap offline-record
Format
display ap online-fail-record { all | mac mac-address }
Parameters
Parameter Description Value
mac mac- Displays online failure records of the AP with The AP's MAC
address the specified MAC address. address must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
If an AP fails to go online on the AC, you can run the command to check the failure reason,
which helps locate the fault.
After the number of AP online failure records reaches the maximum that can be stored, new
records overwrites existing ones.
Example
# Display online failure records about the AP with the MAC address 1047-80b1-56a0.
<HUAWEI> display ap online-fail-record mac 1047-80b1-56a0
------------------------------------------------------------------------------
MAC Last fail time Reason
------------------------------------------------------------------------------
1047-80b1-56a0 2015-01-20/15:48:06 In blacklist
------------------------------------------------------------------------------
Total records: 1
Item Description
Item Description
Item Description
Related Topics
11.1.221 reset ap online-fail-record
Format
display ap optical-info { ap-name ap-name | ap-id ap-id }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run this command to view optical module information, including the optical module
type, transmit optical power, and receive optical power.
Prerequisites
The AP has been online. You can run the display ap command to check the AP status.
The AP supports optical modules. You can run the display ap-type command to view the AP
model.
NOTE
Example
# Display optical module information of AP huawei.
<HUAWEI> display ap optical-info ap-name huawei
-------------------------------------------------------------------------------
Common information:
Transceiver Type :1000_BASE_LX
Connector Type :LC
Wavelength(nm) :1310
Transfer Distance(m) :10000(9um)
Copper Link Length(m) :0
Digital Diagnostic Monitoring :NO
Vendor Name :FINISAR CORP.
Vendor Part Number :FTLF1318P2BTL-HW
Vendor IEEE Company ID :36965
Vendor Revision Level :A
Nominal Bit Rate(MBits/sec) :1200
--------------------------------------------------------------------------------
Manufacture information:
Manu. Serial Number :PMK2K62
Manufacturing Date :2012-05-09
Vendor Name :FINISAR CORP.
--------------------------------------------------------------------------------
Diagnostic information:
Temperature(degree C) :49
Temp High Threshold(degree C) :90
Temp Low Threshold(degree C) :-45
Voltage(0.1mV) :33161
Volt High Threshold(0.1mV) :37000
Volt Low Threshold(0.1mV) :29000
Bias Current(mA) :19
Bias High Threshold(mA) :25430
Bias Low Threshold(mA) :1929
RX Power(0.1uw) :0
RX Power High Threshold(0.1uw) :5012
RX Power Low Threshold(0.1uw) :126
TX Power(0.1uw) :2886
TX Power High Threshold(0.1uw) :6310
TX Power Low Threshold(0.1uw) :708
--------------------------------------------------------------------------------
Item Description
Volt High Threshold(0.1mV) The upper threshold for the voltage of the
optical module, in 0.1mV.
Volt Low Threshold(0.1mV) The lower threshold for the voltage of the
optical module, in 0.1mV.
Bias High Threshold(mA) Upper threshold for the bias current of the
optical module, in mA.
Item Description
Bias Low Threshold(mA) Lower threshold for the bias current of the
optical module, in mA.
Format
display ap performance statistics { ap-name ap-name | ap-id ap-id }
Parameters
Parameter Description Value
ap-name ap- Displays performance statistics about the AP The AP name must
name with a specified name. exist.
ap-id ap-id Displays performance statistics about the AP The AP ID must exist.
with a specified ID.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display ap performance statistics command to view AP performance
statistics to monitor AP performance.
Example
# Display performance statistics about AP huawei.
<HUAWEI> display ap performance statistics ap-name huawei
--------------------------------------------------------------------------------
Memory usage(%) : 58
Memory average usage(%) : 58
CPU usage(%) : 4
CPU average usage(%) : 4
Available space size(KB) : 1192
Temperature(degree C) : 54
Online user number : 0
Upstream traffic(wireless)(KB) : 23 KB
Wireless port drop frames(RX) : 0
Wireless port drop frames(TX) : 0
Wireless port total bytes(RX) : 0
Wireless port total bytes(TX) : 0
Wireless port unicast frames(RX): 0
GigabitEthernet port 0
port drop frames(RX) : 0
port drop frames(TX) : 0
port total Bytes(RX) : 0
port total Bytes(TX) : 0
port unknown frames(RX) : 0
port error frames(TX) : 0
port updown counts : 0
port up rate(Kbps) : 0
port down rate(Kbps) : 0
GigabitEthernet port 1
port drop frames(RX) : 0
port drop frames(TX) : 0
port total Bytes(RX) : 61210
port total Bytes(TX) : 38218
port unknown frames(RX) : 0
port error frames(TX) : 0
port updown counts : 0
port up rate(Kbps) : 0
port down rate(Kbps) : 0
--------------------------------------------------------------------------------
Item Description
Wireless port total bytes(TX) Total number of bytes sent by the wireless
interface.
Function
The display ap port command displays the AP port status and traffic information.
Format
display ap port { all | ap-name ap-name | ap-id ap-id | ap-mac ap-mac }
Parameters
Parameter Description Value
ap-name ap- Displays port status and traffic information of The AP name must
name the AP with a specified name. exist.
ap-id ap-id Displays port status and traffic information of The AP ID must exist.
the AP with a specified ID.
ap-mac ap- Displays port status and traffic information of The AP's MAC
mac the AP with a specified MAC address. address must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display ap port command to check port status and traffic information of
online APs, which facilitates AP port maintenance and management.
Example
# Display port status and traffic information of all APs.
<HUAWEI> display ap port all
Info: Waiting for AP response.
----------------------------------------------------------------------------------
-------------------------------------------------
AP-ID Port State Speed Duplex TX-Packets Tx-ErrorPackets TX-
Rate(Kbps) RX-Packets RX-DropPackets RX-Rate(Kbps)
----------------------------------------------------------------------------------
-------------------------------------------------
0 GE0 up 1000 full 9178 0
0 12857 0 1
----------------------------------------------------------------------------------
-------------------------------------------------
Total: 1
AP-ID AP ID.
Port AP port.
Format
display ap run-info { ap-name ap-name | ap-id ap-id }
Parameters
Parameter Description Value
ap-name ap- Displays running status of the AP with a The AP name must
name specified name. exist.
ap-id ap-id Displays running status of the AP with a The AP ID must exist.
specified ID.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
This command displays AP running status. You can run this command to monitor an AP in
real time.
Prerequisites
The AP works properly.
Example
# Display running status of AP huawei.
<HUAWEI> display ap run-info ap-name huawei
--------------------------------------------------------------------------------
AP type : AP7030DE
Country code : CN
Software version : V200R007C10
Hardware version : Ver.A
BIOS version : 271
BOM version : 001
Memory size(MB) : 256
Flash size(MB) : 64
Manufacture : Huawei Technologies Co., Ltd.
Software vendor : Huawei Technologies Co., Ltd.
Online time(ddd:hh:mm:ss) : 6H:56M:26S
Run time(ddd:hh:mm:ss) : 6H:59M:51S
IP address : 192.168.109.252
IP mask : 255.255.255.0
Gateway : 192.168.109.1
DNS server : 0.0.0.0
GigabitEthernet port 0
Port speed(Mbps) : 1000
Port speed mode : auto
Port duplex : full
Port duplex mode : auto
Port state : down
STP down recovery time(ddd:hh:mm:ss) : -
GigabitEthernet port 1
Port speed(Mbps) : 1000
AP type AP type.
Item Description
Function
The display ap service-config acl command displays the ACL configuration on a specified
AP.
Format
display ap service-config acl { ap-name ap-name | ap-id ap-id }
Parameters
Parameter Description Value
ap-name ap- Displays the ACL configuration on the AP The AP name must
name with a specified name. exist.
ap-id ap-id Displays the ACL configuration on the AP The AP ID must exist.
with a specified ID.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can determine which ACLs have been delivered to the AP based on the command output,
which helps locate and troubleshoot faults about user rights.
Example
# Display ACL configuration on AP huawei.
<HUAWEI> display ap service-config acl ap-name huawei
----------------------------------------------------------------------------------
-----------
Index ACL number
----------------------------------------------------------------------------------
-----------
1 3000
2 3002
3 3015
4 3022
5 3030
----------------------------------------------------------------------------------
-----------
Total: 5
Index Index.
Format
display ap sta-signal strength { ap-name ap-name | ap-id ap-id } [ radio radio-id ]
Parameters
Parameter Description Value
ap-name ap- Displays the average signal strength of STAs The AP name must
name connected to the AP with a specified name. exist.
ap-id ap-id Displays the average signal strength of STAs The AP ID must exist.
connected to the AP with a specified ID.
radio radio-id Displays the average signal strength of STAs The value is an integer
connected to a specified AP radio. that ranges from 0 to 2.
Only the AP4030TN
supports three radios.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view the average signal strength of STAs connected to an AP.
Example
# Display the average signal strength of STAs connected to AP huawei.
<HUAWEI> display ap sta-signal strength ap-name huawei
Station signal strength(%dBm): 0
Function
The display ap statistics command displays statistics on the types of APs added to an AC.
Format
display ap statistics
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Various types of APs can be added to an AC. You can run this command to view types of APs
added to an AC and the number of APs of various types.
Example
# Display statistics about AP types.
<HUAWEI> display ap statistics
--------------------------------------------------------------------------------
Type Number
--------------------------------------------------------------------------------
AP6010DN-AGN 1
AP6510DN-AGN 1
AP5010DN-AGN 1
--------------------------------------------------------------------------------
Type AP type.
Function
The display ap traffic statistics wireless command displays statistics about packets with the
specified SSID on the radio of an AP.
Format
display ap traffic statistics wireless { ap-name ap-name | ap-id ap-id } radio radio-id [ ssid
ssid ]
Parameters
Parameter Description Value
radio radio-id Specifies the radio ID. The value is an integer that
ranges from 0 to 2.
Only the AP4030TN
supports three radios.
Views
ALL views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display ap traffic statistics wireless command to view statistics about
packets with the specified SSID on the radio of an AP.
Example
# Display statistics about packets with the SSID cmcc on radio 0 of an AP huawei.
<HUAWEI> display ap traffic statistics wireless ap-name huawei radio 0 ssid cmcc
----------------------------------------------------------------
Wireless bytes(RX) : 14583149
Wireless error frames(RX) : 10
Wireless frames(RX) : 97419
Wireless unicast frames(RX) : 16
Wireless dropped frames(RX) : 0
Wireless bytes(TX) : 1725974
Wireless error frames(TX) : 6
Wireless frames(TX) : 9704
Wireless unicast frames(TX) : 9680
Wireless dropped frames(TX) : 6
Wireless retransmitted frames: 32674
Current accessed STA number : 0
----------------------------------------------------------------
Table 11-26 Description of the display ap traffic statistics wireless ap-name ap-name radio
radio-id ssid ssid command output
Item Description
Item Description
Table 11-27 Description of the display ap traffic statistics wireless ap-name ap-name radio
radio-id command output
Item Description
Wireless physical layer error frames(RX) Number of error frames received at the
physical layer of the radio.
Wireless private key and decrypt fail Number of frames with incorrect keys
frames(RX) received by the radio.
Item Description
Wireless data frames(TX) Number of data frames sent from the radio.
Wireless port drop rate(%) Packet loss ratio of the radio, in percentage
(%).
Wireless port PS-Poll Frames Number of data frames sent by the STA
working in power saving mode.
Wireless PER of the last statistic period(%) Packet error rate of the radio in the last
statistical period.
Item Description
Function
The display ap unauthorized record command displays information about unauthenticated
APs.
Format
display ap unauthorized record
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
If the MAC authentication or SN authentication mode is configured for an AP but the AP is
neither added offline nor added to the whitelist, the AC does not allow this AP to access. You
can run the display ap unauthorized record command to view information about
unauthenticated APs.
Example
# Display information about unauthenticated APs.
<HUAWEI> display ap unauthorized record
Unauthorized AP record:
Total number: 1
--------------------------------------------------------------------------------
AP type: AP7110SN-GN
AP SN: 210235568010D1000032
AP MAC address: dcd2-fc9d-0bb0
AP IP address: 192.168.109.252
Record time: 2015-01-22 17:23:17
--------------------------------------------------------------------------------
Item Description
Function
The display ap uncontrol all command displays information about all APs that are not
controlled by the local AC.
Format
display ap uncontrol all
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view information about all uncontrolled APs. The command
output includes channel of the controlled AP closest to the uncontrolled AP and the strength
of signals that the controlled AP received from the uncontrolled AP.
Example
# View information about all APs that are not controlled by the local AC.
<HUAWEI> display ap uncontrol all
---------------------------------------------------------
BSSID NEAREST-AP CHANNEL RSSI(dBm) SSID
---------------------------------------------------------
1047-80af-9970 ap-13 149 -68 test
---------------------------------------------------------
Total: 1
Item Description
Function
The display ap update configuration command displays AP upgrade configuration.
Format
display ap update configuration
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display ap update configuration command to view AP upgrade configuration,
including the upgrade mode, FTP server configuration, and SFTP server configuration.
Example
# Display AP upgrade configuration.
<HUAWEI> display ap update configuration
--------------------------------------------------------------------------------
AP update mode : AC-mode
FTP configuration
FTP IP : -
FTP username : anonymous
FTP password : ******
FTP max number : 50
SFTP configuration
SFTP IP : -
SFTP username : anonymous
SFTP password : ******
SFTP max number : 50
AP type/AP-group update filename
AP6010DN-AGN : FitAP6X10XN_V200R007C10.bin
--------------------------------------------------------------------------------
Item Description
Item Description
Format
display ap update status { all | downloading | failed | succeed | ap-name ap-name | ap-id
ap-id }
Parameters
Parameter Description Value
ap-name ap- Displays upgrade progress of the AP with a The AP name must
name specified name. exist.
ap-id ap-id Displays upgrade progress of the AP with a The AP ID must exist.
specified ID.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can use this command to check upgrade progress of all APs or a specified AP, and check
information about APs in specified upgrade status.
Example
# Display upgrade progress of all APs.
<HUAWEI> display ap update status all
------------------------------------------------------------------------------
ID Name AP Type AP MAC File Type Update Status
------------------------------------------------------------------------------
0 hw0 AP6010DN-AGN 60de-4476-e320 FIT succeed
1 hw1 AP6010DN-AGN 60de-4476-e340 FIT downloading(progress: 80%/
0%)
2 hw2 AP6010DN-AGN 60de-4476-e360 FIT downloading(progress:
100%/50%)
3 hw3 AP6010DN-AGN 60de-4476-e380 FIT -
4 hw4 AP6010DN-AGN 60de-4476-e3a0 FIT -
5 hw5 AP6010DN-AGN 60de-4476-e3c0 FIT -
------------------------------------------------------------------------------
Total: 6
ID AP ID.
Name AP name.
AP Type AP type.
Item Description
Item Description
Item Description
Related Topics
11.1.22 ap update load
11.1.24 ap update multi-load
Function
The display ap username command displays information about users logged in to the AP.
Format
display ap username [ ap-name ap-name | ap-id ap-id ]
Parameters
Parameter Description Value
ap-name ap-name Displays the user name for The AP name must exist.
logging in to the AP with a
specified name.
ap-id ap-id Displays the user name for The AP ID must exist.
logging in to the AP with a
specified ID.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The display ap username ap-name ap-name command displays the user name for logging in
to a specified AP.
Example
# Display the user name for logging in to AP huawei.
<HUAWEI> display ap username ap-name huawei
----------------------------------------------------------------------------
AP username: admin
AP password: ******
----------------------------------------------------------------------------
Item Description
Related Topics
11.1.30 ap username
Function
The display ap version command displays AP version information.
Format
display ap version { all | { ap-group ap-group-name | version-name version-name } * }
Parameters
Parameter Description Value
ap-group ap- Displays version information about all APs of The AP group must
group-name a specified AP group. exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display ap version command to view AP version information.
Example
# Display version information about all APs.
<HUAWEI> display ap version all
Compatible version : V200R009
--------------------------------------------------------------------------------
ID Name Group Type Version state
--------------------------------------------------------------------------------
0 60de-4476-e360 default AP6010DN-AGN V200R007C10 normal
1 1047-80b1-56a0 default AP6310SN-GN V200R007C10 normal
2 Huawei default AP7030DE V200R007C10 normal
3 AP4 gjg1 _ idle
--------------------------------------------------------------------------------
Total: 4, printed: 4
Name AP name.
Type AP type.
Format
display ap whitelist { mac | sn }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
When the AP authentication mode is set to MAC authentication or SN authentication using
the 11.1.13 ap auth-mode command, you can run the 11.1.31 ap whitelist command to
configure an AP whitelist. Only APs on the whitelist are allowed to go online. To check
information about APs in the whitelist, run the display ap whitelist command.
Example
# Display MAC addresses in the AP whitelist.
<HUAWEI> display ap whitelist mac
--------------------------------------------------------------------------------
Index MAC
--------------------------------------------------------------------------------
0 1047-80b1-56a0
1 0023-0024-0080
2 dcd2-fc9d-0bb0
--------------------------------------------------------------------------------
Total: 3
Index Index.
Index Index.
SN SN of an AP.
To add an SN to the AP whitelist, run the ap
whitelist sn ap-sn1 [ to ap-sn2 ] command.
Related Topics
11.1.31 ap whitelist
Format
display ap wired-port interface-type interface-number { ap-name ap-name | ap-id ap-id }
Parameters
Parameter Description Value
interface-type Specifies the type and number of an AP wired The interface type and
interface- interface. number need to be
number selected according to
the actual device.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can use this command to view configurations on the AP wired interface.
Example
# Display GE interface configuration of AP huawei.
<HUAWEI> display ap wired-port gigabitethernet 0 ap-name huawei
--------------------------------------------------------------------------------
Wired port number : 0
Wired port type : GigabitEthernet
Wired port description :
Wired port STP : disable
Wired port user isolate : disable
Wired port PVID VLAN : -
Wired port VLAN tagged : -
Wired port VLAN untagged : -
Wired port Eth-trunk : -
Wired port LLDP : enable
Wired port LLDP basic TLV management address: enable
Wired port LLDP basic TLV port description : enable
Wired port LLDP basic TLV system capability : enable
Wired port LLDP basic TLV system description: enable
Wired port LLDP basic TLV system name : enable
Wired port CRC warn switch : No
Wired port CRC warn high threshold : 50
Wired port CRC warn low threshold : 20
Wired port IPv4 inbound ACL number : -
Wired port IPv4 outbound ACL number: -
--------------------------------------------------------------------------------
Item Description
Item Description
Wired port LLDP basic TLV management Management IP address of the wired
address interface.
Wired port LLDP basic TLV system Wired interface capability set.
capability
Wired port LLDP basic TLV system Wired interface system description.
description
Wired port LLDP basic TLV system name Wired interface system name.
Wired port CRC warn switch Whether to enable the alarm function for
CRC errors on the wired interface.
Wired port CRC warn high threshold Upper alarm threshold for CRC errors on
the wired interface.
Wired port CRC warn low threshold Lower alarm threshold for CRC errors on
the wired interface.
Wired port IPv4 inbound ACL number IPv4-based ACL in the inbound direction.
Wired port IPv4 outbound ACL number IPv4-based ACL in the outbound direction.
Table 11-38 Description about the display ap wired-port eth-trunk 0 ap-name command
output
Item Description
Wired port IPv4 Inbound ACL Number IPv4-based ACL in the inbound direction.
Wired port IPv4 Outbound ACL Number IPv4-based ACL in the outbound direction.
Function
The display ap-group command displays configuration and reference information about an
AP group.
Format
display ap-group { all | name group-name }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display ap-group command to view configuration and reference information
about an AP group.
Example
# Display information about all AP groups.
<HUAWEI> display ap-group all
----------------------------------------------------------
Name APs
----------------------------------------------------------
default 1
ap-group1 0
----------------------------------------------------------
Total: 2
Item Description
Item Description
Item Description
Related Topics
11.1.33 ap-group
Format
display ap-system-profile { all | name profile-name }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display ap-system-profile command to view configuration and reference
information about an AP system profile.
Example
# Display information about all AP system profiles.
<HUAWEI> display ap-system-profile all
----------------------------------------------------------
Profile name Reference
----------------------------------------------------------
default 1
ap-system1 0
----------------------------------------------------------
Total: 2
AC priority : -
Protect AC IP address : -
AP management VLAN : -
Keep service : disable
Keep service allow new access : disable
Temporary management switch : disable
Mesh role : mesh-node
STA access mode : disable
STA whitelist profile : -
STA blacklist profile : -
EAPOL start mode : multicast
EAPOL start transform : equal-bssid
EAPOL response mode : unicast learning
EAPOL response transform : equal-bssid
AP LLDP message transmission delay time(s): 2
AP LLDP message transmission hold multiplier: 4
AP LLDP message transmission interval time(s): 30
AP LLDP restart delay time(s) : 2
AP LLDP admin status : txrx
AP LLDP report interval time(s): 30
AP high temperature threshold(degree C): -
AP low temperature threshold(degree C): -
AP CPU usage threshold(%) : 90
AP memory usage threshold(%) : 80
Alarm restriction : enable
Alarm restriction period(s) : 60
Log server IP address : -
Log record level : info
Ethernet port MTU(byte) : 1500
Telnet : enable
STelnet server : enable
SFTP server : enable
Console : enable
Antenna output mode : split
Led : on
Report disassoc request : enable
Sample time(s) : 30
Dynamic blacklist aging time(s): 600
MPP active reselection : disable
AP report to : server
Server IP : 0.0.0.0
Server port : -
AC port : -
Device aging-time(minute) : 3
PoE max power(mW) :380000
PoE power reserved(%) :0
PoE power threshold(%) :100
PoE af inrush :disable
PoE high inrush :disable
------------------------------------------------------------------------------
AC priority AC priority.
To configure the parameter, run the 11.12.7
priority command.
Item Description
Keep service allow new access Whether new STAs are allowed to go online
when an AP is offline.
l enable: This function is enabled.
l disable: This function is disabled.
To configure the parameter, run the 11.1.169
keep-service enable allow new-access
command.
Item Description
Item Description
Item Description
Antenna output mode Output mode of the AP's 2.4 GHz or 5 GHz
antenna.
To configure the parameter, run the 11.10.1
antenna-output command.
Item Description
Item Description
Related Topics
11.1.45 ap-system-profile (WLAN view)
Function
The display ap-type command displays AP type information.
Format
display ap-type { all | id type-id | type ap-type }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display ap-type command to view all AP types supported by the device and
information about an AP of the specified type.
Example
# Display all AP types supported by the device.
<HUAWEI> display ap-type all
--------------------------------------------------------------------------------
ID Type
--------------------------------------------------------------------------------
17 AP6010SN-GN
19 AP6010DN-AGN
21 AP6310SN-GN
23 AP6510DN-AGN
25 AP6610DN-AGN
27 AP7110SN-GN
28 AP7110DN-AGN
29 AP5010SN-GN
30 AP5010DN-AGN
31 AP3010DN-AGN
33 AP6510DN-AGN-US
34 AP6610DN-AGN-US
35 AP5030DN
36 AP5130DN
37 AP7030DE
38 AP2010DN
39 AP8130DN
40 AP8030DN
42 AP9330DN
43 AP4030DN
44 AP4130DN
45 AP3030DN
46 AP2030DN
47 AP9131DN
48 AP9132DN
49 AP5030DN-S
50 AP3010DN-V2
51 AP4030DN-E
52 AD9430DN-24
53 AD9430DN-12
54 R230D
55 R240D
56 AP6050DN
57 AP6150DN
58 AP7050DE
59 AP7050DN-E
60 AP4030TN
61 AP4050DN-E
62 AP4050DN-HD
64 AP430-E
--------------------------------------------------------------------------------
Total: 40
Item Description
ID ID of an AP.
Item Description
Type AP type.
Item Description
Function
The display capwap configuration command displays the CAPWAP configuration.
Format
display capwap configuration
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view the interval for sending Keepalive packets, number of
times for sending Keepalive packets, and priority of CAPWAP management packets.
Example
# Display the CAPWAP configuration.
<HUAWEI> display capwap configuration
------------------------------------------------------------
Source interface : vlanif100
Echo interval(seconds) : 25
Echo times : 6
Control priority(server to client) : 7
Control priority(client to server) : 7
Control-link DTLS encrypt : disable
DTLS PSK value : ******
PSK mandatroy match switch : enable
Message-integrity PSK value : ******
------------------------------------------------------------
Item Description
Related Topics
11.1.55 capwap control-link-priority
11.1.56 capwap dtls control-link encrypt
11.1.57 capwap dtls psk
11.1.58 capwap dtls psk-mandatory-match enable
11.1.59 capwap echo
Format
display channel switch-record { all| ap-name ap-name radio radio-id | ap-id ap-id radio
radio-id | reason reason }
Parameters
Parameter Description Value
all Displays all channel -
switching records.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
This command enables you to view channel switching records on a device.
Example
# Display all channel switching records.
<HUAWEI> display channel switch-record all
Old/New: Old channel/New channel
RfID : Radio ID
----------------------------------------------------------------------------------
------------
AP name RfID Old/New Switch reason Switch time
----------------------------------------------------------------------------------
------------
L2-4f 0 1/6 wds 11:03:30 2014/9/28
----------------------------------------------------------------------------------
------------
Total : 1, printed : 1
Table 11-46 Description of the display channel switch-record all command output
Item Description
Related Topics
11.1.223 reset channel switch-record
Function
The display distribute-ap command displays information about RUs.
Format
display distribute-ap { all | ap-id ap-id | ap-mac ap-mac | ap-name ap-name | central-ap-id
central-ap-id | central-ap-mac central-ap-mac | central-ap-name central-ap-name }
Parameters
Parameter Description Value
central-ap- Displays information about the RUs connected The MAC address of
mac central- to the central AP of a specified MAC address. the central AP must
ap-mac exist.
central-ap- Displays information about the RUs connected The central AP name
name central- to the central AP of a specified name. must exist.
ap-name
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to check RU information.
Example
# Display information about all RUs.
<HUAWEI> display distribute-ap all
Total AP information:
nor : normal [3]
----------------------------------------------------------------------------------
-------------------------------
ID MAC Name Group IP Type State Central-AP ID
Central-AP MAC Central-AP name
----------------------------------------------------------------------------------
-------------------------------
1 fcb6-98f5-ec20 fcb6-98f5-ec20 240D-1 10.1.1.182 R240D nor 0
88cf-9837-98a0 88cf-9837-98a0
2 fcb6-98f5-7280 fcb6-98f5-7280 240D 10.1.1.158 R240D nor 0
88cf-9837-98a0 88cf-9837-98a0
3 fcb6-98f6-0ce0 ap1 default 10.1.1.181 R240D nor 0
88cf-9837-98a0 88cf-9837-98a0
----------------------------------------------------------------------------------
-------------------------------
Total: 3
Item Description
ID RU ID.
Item Description
Type RU type.
Format
display mac-address mac-address [ verbose ] ap-all
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
When errors or attacks occur on the network, you can run the display mac-address ap-all
command to locate the attack sources based on the displayed MAC addresses.
Example
# Display dynamic MAC address entries of all APs.
<HUAWEI> display mac-address 00e0-fc09-bcf9 ap-all
Info: Waiting for AP response...done.
-------------------------------------------------------------------------------
MAC Address VLAN/VSI Learned-From Type AP ID
-------------------------------------------------------------------------------
00e0-fc09-bcf9 1/- GigabitEthernet0/0/0 dynamic 1
00e0-fc09-bcf9 1/- GigabitEthernet0/0/0 dynamic 0
-------------------------------------------------------------------------------
Total: 2
Table 11-49 Description of the display mac-address mac-address ap-all command output
Item Description
Item Description
AP ID AP ID.
Format
display mac-address { ap-id ap-id | ap-name ap-name } interface-type interface-number
Parameters
Parameter Description Value
ap-name ap-name Displays all dynamic MAC The AP name must exist.
address entries on wired
interfaces of the AP with the
specified name.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display mac-address { ap-id | ap-name} command to check all dynamic
MAC address entries on an AP's wired interface, including the MAC addresses and VLANs
that the AP learns on specified interfaces.
Example
# Display dynamic MAC address entries on wired interfaces of the AP with ID 1.
<HUAWEI> display mac-address ap-id 1 ethernet 0
----------------------------------------------------------
MAC Address VLAN/VSI Learned-From Type
----------------------------------------------------------
1051-7254-5a80 1/- Ethernet0/0/0 dynamic
----------------------------------------------------------
Total: 1
Table 11-50 Description of the display mac-address ap-id ap-id interface-type interface-
number command output
Item Description
Related Topics
11.1.224 reset mac-address { ap-id | ap-name }
Function
The display port-link-profile command displays reference and configuration information
about an AP wired port link profile.
Format
display port-link-profile { all | name profile-name }
Parameters
Parameter Description Value
name profile- Displays information about a specified AP The AP wired port link
name wired port link profile. profile must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display port-link-profile command to view configuration and reference
information about an AP wired port link profile.
Example
# Display information about all AP wired port link profiles.
<HUAWEI> display port-link-profile all
----------------------------------------------------------
Profile name Reference
----------------------------------------------------------
default 1
port-link-profile-1 0
----------------------------------------------------------
Total: 2
CRC error alarm Whether the alarm function for CRC errors
is enabled on an AP's wired interface.
To configure the parameter, run the 11.1.75
crc-alarm enable command.
Item Description
CRC error high threshold(%) Alarm threshold for CRC errors on an AP's
wired interface.
To configure the parameter, run the 11.1.75
crc-alarm enable command.
CRC error Low threshold(%) Clear alarm threshold for CRC errors on an
AP's wired interface.
To configure the parameter, run the 11.1.75
crc-alarm enable command.
Related Topics
11.1.75 crc-alarm enable
11.1.176 lldp enable
Format
display provision-ap parameter-list
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Before running the commit command to deliver the AP provisioning parameters configured
in the AP provisioning view, you can run the display provision-ap parameter-list command
to check whether the parameters are correct and complete.
If a parameter is displayed as - in the command output, the parameter of the APs is not
changed after the configuration is committed.
Example
# Display AP provisioning parameters in the AP provisioning view.
<HUAWEI> display provision-ap parameter-list
--------------------------------------------------------------------------------
AP name : -
AP group : -
AP address mode : -
IPv4 address : -
IPv4 mask address : -
IPv4 gateway address : -
IPv4 AC list : -
--------------------------------------------------------------------------------
AP name AP name.
To set this parameter, run the 11.1.39 ap-
name (AP provisioning view) command.
Related Topics
11.1.4 ac-list
11.1.6 address-mode (AP provisioning view)
11.1.34 ap-group (AP provisioning view)
11.1.39 ap-name (AP provisioning view)
11.1.167 ip-address (AP provisioning view)
Format
display radio { all | ap-group ap-group-name | ap-name ap-name | ap-id ap-id }
Parameters
Parameter Description Value
ap-group ap- Displays radio information about all APs in a The AP group must
group-name specified AP group. exist.
ap-name ap- Displays radio information about the AP with The AP name must
name a specified name. exist.
ap-id ap-id Displays radio information about the AP with The AP ID must exist.
a specified ID.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display radio command to view current working status of an AP radio.
Example
# Display radio information about all APs.
<HUAWEI> display radio all
CH/BW:Channel/Bandwidth
CE:Current EIRP (dBm)
ME:Max EIRP (dBm)
CU:Channel utilization
ST:Status
------------------------------------------------------------------------
AP ID Name RfID Band Type ST CH/BW CE/ME STA CU
------------------------------------------------------------------------
0 L1_003 0 2.4G bgn on 6/20M 27/27 0 71%
0 L1_003 1 5G an on 149/20M 28/28 0 39%
------------------------------------------------------------------------
Total:2
AP ID AP ID.
Name AP name.
Item Description
CU Channel usage.
When the working mode of an AP radio is
the monitor mode, this parameter is
displayed as -.
l In the AC+central AP+RU networking:
RUs do not proactively report the
channel usage to the AC. To query the
channel usage of RUs, enable the RU
data buffer function on the AC.
NOTE
The ap data-collection enable command
enables the RU data buffer function on the
AC. After this command is executed, a large
data buffer occupies the device memory and
affects device performance. It is
recommended that the undo ap data-
collection enable command be executed to
disable data buffer after the query.
l In the AC+Fit AP networking:
A Fit AP periodically reports the channel
usage to the AC. Therefore, the AC does
not need to query the channel usage of
APs.
Format
display radio-2g-profile { all | name profile-name }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display radio-2g-profile command to view configuration and reference
information about a 2G radio profile.
Example
# Display information about all 2G radio profiles.
<HUAWEI> display radio-2g-profile all
----------------------------------------------------------
Profile name Reference
----------------------------------------------------------
default 1
----------------------------------------------------------
Total: 1
Item Description
Item Description
Item Description
Item Description
Function
The display radio-5g-profile command displays configuration and reference information
about a 5G radio profile.
Format
display radio-5g-profile { all | name profile-name }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display radio-5g-profile command to view configuration and reference
information about a 5G radio profile.
Example
# Display information about all 5G radio profiles.
<HUAWEI> display radio-5g-profile all
----------------------------------------------------------
Profile name Reference
----------------------------------------------------------
default 1
----------------------------------------------------------
Total: 1
Item Description
Item Description
VHT A-MSDU Max frame number Maximum number of subframes that can be
aggregated into an A-MSDU.
To configure the parameter, run the 11.1.260
vht a-msdu max-frame-num command.
Item Description
Item Description
Item Description
Function
The display references ap-system-profile command displays reference information about an
AP system profile.
Format
display references ap-system-profile name profile-name
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references ap-system-profile command to view reference
information about an AP system profile.
Example
# Display reference information of the AP system profile default.
<HUAWEI> display references ap-system-profile name default
--------------------------------------------------------------------------
Reference type Reference name
--------------------------------------------------------------------------
AP group ap-group1
--------------------------------------------------------------------------
Total: 1
Format
display references port-link-profile name profile-name
Parameters
Parameter Description Value
name profile- Displays reference information about a The AP wired port link
name specified AP wired port link profile. profile must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references port-link-profile command to view reference
information about an AP wired port link profile.
Example
# Display reference information about the AP wired port link profile default.
<HUAWEI> display references port-link-profile name default
-------------------------------------------------------------------
Reference type Reference name
-------------------------------------------------------------------
AP wiredport profile wired-port1
-------------------------------------------------------------------
Total:1
Format
display references radio-2g-profile name profile-name
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references radio-2g-profile command to view reference information
about a 2G radio profile.
Example
# Display reference information about the 2G radio profile default.
<HUAWEI> display references radio-2g-profile name default
-------------------------------------------------------------------
Reference type Reference name
-------------------------------------------------------------------
AP-group ap-group1
-------------------------------------------------------------------
Total:1
Format
display references radio-5g-profile name profile-name
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references radio-5g-profile command to view reference information
about a 5G radio profile.
Example
# Display reference information about the 5G radio profile default.
<HUAWEI> display references radio-5g-profile name default
-------------------------------------------------------------------
Reference type Reference name
-------------------------------------------------------------------
AP-group ap-group1
-------------------------------------------------------------------
Total:1
Format
display references regulatory-domain-profile name profile-name
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references regulatory-domain-profile command to view reference
information about a regulatory domain profile.
Example
# Display reference information about the regulatory domain profile default.
<HUAWEI> display references regulatory-domain-profile name default
------------------------------------------------------------
Reference type Reference name
------------------------------------------------------------
AP-group default
AP-group hw
------------------------------------------------------------
Total: 2
Format
display references ssid-profile name profile-name
Parameters
Parameter Description Value
name profile- Displays reference information about a The SSID profile must
name specified SSID profile. exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references ssid-profile command to view reference information
about an SSID profile.
Example
# Display reference information about the SSID profile default.
<HUAWEI> display references ssid-profile name default
-------------------------------------------------------------------
Reference type Reference name
-------------------------------------------------------------------
VAP profile vap-profile1
-------------------------------------------------------------------
Total:1
Format
display references vap-profile name profile-name
Parameters
Parameter Description Value
name profile- Displays reference information about a The VAP profile must
name specified VAP profile. exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references vap-profile command to view reference information
about a VAP profile.
Example
# Display reference information about the VAP profile default.
<HUAWEI> display references vap-profile name default
--------------------------------------------------------------------------------
Reference type Reference name Reference radio WLAN ID
--------------------------------------------------------------------------------
AP group group1 Radio-0 1
--------------------------------------------------------------------------------
Total: 1
Format
display references vlan pool pool-name
Parameters
Parameter Description Value
pool-name Displays reference information about a specified The VLAN pool must exist.
VLAN pool.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references vlan pool command to view profiles by which a VLAN
pool is referenced.
Example
# Display reference information about the VLAN pool pool1.
<HUAWEI> display references vlan pool pool1
--------------------------------------------------------------------------------
Reference type Reference name
--------------------------------------------------------------------------------
vap-profile vap1
--------------------------------------------------------------------------------
Total: 1
Table 11-66 Description of the display references vlan pool command output
Item Description
Related Topics
11.1.235 service-vlan
Format
display references wired-port-profile name profile-name
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references wired-port-profile command to view reference
information about an AP wired port profile.
Example
# Display reference information about the AP wired port profile default.
<HUAWEI> display references wired-port-profile name default
----------------------------------------------------------------------------
Reference type Reference name Reference port
----------------------------------------------------------------------------
AP group default Ethernet0
AP group default Ethernet1
AP group default Ethernet2
AP group default Ethernet3
AP group default GigabitEthernet0
AP group default GigabitEthernet1
AP group default GigabitEthernet2
AP group default GigabitEthernet3
AP group default GigabitEthernet4
AP group default GigabitEthernet5
AP group default GigabitEthernet6
AP group default GigabitEthernet7
AP group default GigabitEthernet8
Format
display regulatory-domain-profile { all | name profile-name }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display regulatory-domain-profile command to view configuration and
reference information about a regulatory domain profile.
Example
# Display information about all regulatory profiles.
<HUAWEI> display regulatory-domain-profile all
------------------------------------------------------------
Profile name Reference
------------------------------------------------------------
default 6
------------------------------------------------------------
Total: 1
Item Description
Item Description
Item Description
Related Topics
11.1.72 country-code
11.2.16 dca-channel bandwidth
11.2.17 dca-channel channel-set
Function
The display snmp-agent trap feature-name wlan all command displays the status of all
traps on the WLAN module.
Format
display snmp-agent trap feature-name wlan all
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After the trap function of a specified feature is enabled, you can run the display snmp-agent
trap feature-name wlan all command to check the status of all traps of WLAN. You can use
the 11.1.239 snmp-agent trap enable feature-name wlan command to enable the trap
function of WLAN.
Prerequisites
SNMP has been enabled. See snmp-agent.
Example
# Display all the traps of the WLAN module.
<HUAWEI>display snmp-agent trap feature-name wlan all
------------------------------------------------------------------------------
Feature name: WLAN
Trap number : 121
------------------------------------------------------------------------------
Trap name Default switch status Current switch status
hwApFaultNotify on on
hwApNormalNotify on on
hwApTypeNotMatchNotify on on
hwApPingResultNotify on on
hwApUpdateBeginNotify on on
......
hwApVersionMismatchNotify on on
Table 11-70 Description of the display snmp-agent trap feature-name wlan all command
output
Item Specification
Feature name Name of the module that the trap belongs to.
Related Topics
11.1.239 snmp-agent trap enable feature-name wlan
Format
display ssid-profile { all | name profile-name }
Parameters
Parameter Description Value
name profile- Displays information about a specified SSID The SSID profile must
name profile. exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display ssid-profile command to view configuration and reference
information about an SSID profile.
Example
# Display information about all SSID profiles.
<HUAWEI> display ssid-profile all
----------------------------------------------------------
Profile name Reference
----------------------------------------------------------
default 1
ssid-profile-1 0
----------------------------------------------------------
Total: 2
Reach max STA SSID hide Whether to automatically hide SSIDs when
the number of users reaches the maximum.
To configure the parameter, run the 11.1.215
reach-max-sta hide-ssid disable command.
Item Description
QOS CAR inbound CIR(kbit/s) CIR in the QoS CAR profile applied to the
inbound direction of an interface, which is
the allowed rate at which traffic can pass
through.
To configure the parameter, run the 11.5.11
qos car (SSID profile view) command.
QOS CAR inbound PIR(kbit/s) PIR in the QoS CAR profile applied to the
inbound direction of an interface, which is
the maximum rate of traffic that can pass
through an interface.
To configure the parameter, run the 11.5.11
qos car (SSID profile view) command.
QOS CAR inbound CBS(byte) CBS in the QoS CAR profile applied to the
inbound direction of an interface, which is
the average volume of burst traffic that can
pass through an interface.
To configure the parameter, run the 11.5.11
qos car (SSID profile view) command.
QOS CAR inbound PBS(byte) PBS in the QoS CAR profile applied to the
inbound direction of an interface, which is
the maximum volume of burst traffic that
can pass through an interface.
To configure the parameter, run the 11.5.11
qos car (SSID profile view) command.
Item Description
Item Description
Function
The display station command displays STA access information.
Format
display station { ap-group ap-group-name | ap-name ap-name | ap-id ap-id | ssid ssid | sta-
mac sta-mac-address | vlan vlan-id | all }
Parameters
Parameter Description Value
ap-group ap- Displays STA access information about a The AP group must
group-name specified AP group. exist.
ap-name ap- Displays STA access information of the AP The AP name must
name with a specified name. exist.
ap-id ap-id Displays STA access information of the AP The AP ID must exist.
with a specified ID.
ssid ssid Displays STA access information about a The SSID must exist.
specified SSID.
sta-mac sta- Displays access information about a STA with The STA's MAC
mac-address the specified MAC address. address must exist.
vlan vlan-id Displays STA access information about a The VLAN ID must
specified VLAN. exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display station command to view STA access information.
Example
# Display access information about all STAs.
<HUAWEI> display station all
Rf/WLAN: Radio ID/WLAN ID
Rx/Tx: link receive rate/link transmit rate(Mbps)
----------------------------------------------------------------------------------
------------------
STA MAC AP ID Ap name Rf/WLAN Band Type Rx/Tx RSSI
VLAN IP address SSID
----------------------------------------------------------------------------------
------------------
14cf-9208-9abf 0 1047-8007-6f80 0/2 2.4G 11n 3/8 -70
10 10.10.10.253 tap1
----------------------------------------------------------------------------------
------------------
Total: 1 2.4G: 1 5G: 0
AP ID AP ID.
Ap name AP name.
-------------------------------------------------------
------------------------------------------------------------------------------
Table 11-74 Description of the display station sta-mac sta-mac-address command output
Item Description
Power save mode enabled Whether the power saving mode is enabled
on a STA.
Item Description
Item Description
Trigger aimless roam while sticky Whether a STA is forced to roam aimlessly.
Item Description
Format
display station assoc-info ap-offline-record { all | { ap-name ap-name | ap-id ap-id }
[ radio radio-id ] }
Parameters
Parameter Description Value
ap-name ap- Displays information about STAs that go The AP name must
name online on the AP with a specified name in fault exist.
state.
ap-id ap-id Displays information about STAs that go The AP ID must exist.
online on the AP with a specified ID in fault
state.
radio radio-id Displays information about STAs that connect The radio ID must
to a specified radio of an AP in fault state. exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
When link faults occur between the APs and AC, the APs in fault state allow access of new
STAs and log the STA information. When the link between the APs and AC is re-established,
the APs disconnect these STAs and send the STA information to the AC. You can run the
Prerequisite
The APs in fault state have been enabled to allow access of new STAs using the 11.1.169
keep-service enable allow new-access command.
Example
# Display information about STAs that connect to all APs in fault state.
<HUAWEI> display station assoc-info ap-offline-record all
Offline Station information list:
------------------------------------------------------------------------------
STA MAC AP name RADIO ID SSID
------------------------------------------------------------------------------
286E-D488-B74F Huawei 0 SSID_MYWLAN
------------------------------------------------------------------------------
Total: 1
Table 11-75 Description of the display station assoc-info ap-offline-record command output
Item Description
Related Topics
11.1.169 keep-service enable allow new-access
11.1.225 reset station assoc-info ap-offline-record
Function
The display station online-fail-record command displays STA online failure records.
Format
display station online-fail-record { all | ap-name ap-name | ap-id ap-id | sta-mac sta-mac-
address }
Parameters
Parameter Description Value
ap-name ap- Displays online failure records of STAs on the The AP name must
name AP with a specified name. exist.
ap-id ap-id Displays online failure records of STAs on the The AP ID must exist.
AP with a specified ID.
sta-mac sta- Displays online failure records of the STA The STA's MAC
mac-address with the specified MAC address. address must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
If a STA fails to go online, you can run the command to check the failure reason, which helps
locate the fault.
After the number of STA online failure records reaches the maximum that can be stored, new
records overwrite existing ones.
Example
# Displays online failure records of all STAs.
<HUAWEI> display station online-fail-record all
Rf/WLAN: Radio ID/WLAN ID
------------------------------------------------------------------------------
STA MAC AP ID Ap name Rf/WLAN Last record time
Reason
------------------------------------------------------------------------------
14cf-9202-13dc 0 area_11 0/1 2015-03-11/15:53:18
The STA is in the VAP's blacklist.
------------------------------------------------------------------------------
Total stations: 1 Total records: 1
Item Description
Item Description
Related Topics
11.1.227 reset station online-fail-record
Function
The display station offline-record command displays STA offline records.
Format
display station offline-record { all | ap-name ap-name | ap-id ap-id | sta-mac sta-mac }
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After a STA goes offline, you can use this command to check the reason why the STA goes
offline.
Example
# Display all STA offline records.
<HUAWEI> display station offline-record all
Rf/WLAN: Radio ID/WLAN ID
------------------------------------------------------------------------------
STA MAC AP ID Ap name Rf/WLAN Last record time
Reason
------------------------------------------------------------------------------
14cf-9208-9abf 0 area_1 0/2 2015-09-18/09:38:50
The VAP goes down because the configuration is modified.
14cf-9202-13dc 1 60de-4474-9640 0/1 2015-09-18/09:28:52
The VAP goes down because the configuration is modified.
------------------------------------------------------------------------------
Total stations: 2 Total records: 2
AP ID AP ID.
Ap name AP name.
Last record time Time when the STA went offline last time.
Related Topics
11.1.226 reset station offline-record
Format
display station statistics [ sta-mac sta-mac-address | ap-name ap-name | ap-id ap-id ]
Parameters
Parameter Description Value
sta-mac sta- Displays statistics information about a STA The STA's MAC
mac-address with a specified MAC address. address must exist.
ap-name ap- Displays statistics information about STAs on The AP name must
name the AP with a specified name. exist.
ap-id ap-id Displays statistics information about STAs on The AP ID must exist.
the AP with a specified ID.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run this command to view statistics information about STAs.
l If no parameter is specified, statistics information about all STAs associated with the AC
is displayed.
l If an AP is specified, the number of STAs associated with, disassociated from, and
reassociated with the AP is displayed.
l If a STA is specified, the number of packets and packet transmission rate between the
STA and an AP are displayed.
Prerequisites
l To view statistics information about a specified STA, ensure that the STA has been
associated with an AP.
l To view statistics information about STAs associated with a specified AP, ensure that the
AP has been added to the AC and is in normal state.
Example
# Display statistics information about all STAs.
<HUAWEI> display station statistics
------------------------------------------------------------------------------
AC auth successful :0
AC roaming :0
AC auth failed because of password error :0
AC auth failed because of invalid calc :0
AC auth failed because of timeout :0
AC auth failed because of being refused :0
AC auth failed because of other reasons :0
Sticky clients detected :0
Trigger sticky clients roam total :0
Trigger sticky clients roam success :0
Item Description
AC auth failed because of password error Number of authentication failures due to the
incorrect password.
AC auth failed because of invalid calc Number of authentication failures due to the
invalid authentication algorithm.
Trigger sticky clients roam total Total number of the triggered smart roaming
times.
Trigger sticky clients roam success Number of the successfully triggered smart
roaming times.
Trigger sticky clients roam success rate(%) Success rate of triggered smart roaming.
Stations supporting dual band Number of STAs that support only dual
bands.
Item Description
Stations associated with 2.4G band Number of STAs associated with the 2.4
GHz band.
Stations associated with 5G band Number of STAs associated with the 5 GHz
band.
Table 11-79 Description of the display station statistics sta-mac sta-mac-address command
output
Item Description
Packets received from the station Number of packets sent by the STA.
Bytes received from the station Number of bytes sent by the STA.
Wireless data rate sent to the station(kbps) Rate at which packets are sent to the STA,
in kbit/s.
Wireless data rate received from the Rate at which packets are received from the
station(kbps) STA, in kbit/s.
Table 11-80 Description of the display station statistics ap-name ap-name command output
Item Description
Item Description
Stations work in power save mode Number of STAs working in power saving
mode.
Stations only support 2.4G band Number of STAs that support only the 2.4
GHz frequency band.
Stations only support 5G band Number of STAs that support only the 5
GHz frequency band.
Stations support dual band Number of STAs that support both 2.4 and 5
GHz frequency bands.
Stations associated with 2.4G band Number of STAs that associate with the 2.4
GHz frequency band.
Stations associated with 5G band Number of STAs that associate with the 5
GHz frequency band.
Load balancing status between dual band Status of load balancing between the 2.4
and 5 GHz frequency bands.
Item Description
Function
The display vap command displays information about service VAPs.
Format
display vap { ap-group ap-group-name | { ap-name ap-name | ap-id ap-id } [ radio radio-
id ] } [ ssid ssid ]
Parameters
Parameter Description Value
ap-group ap- Displays information about all service VAPs in The AP group must
group-name a specified AP group. exist.
ap-name ap- Displays information about service VAPs on The AP name must
name the AP with a specified name. exist.
ap-id ap-id Displays information about service VAPs on The AP ID must exist.
the AP with a specified ID.
radio radio-id Displays information about service VAPs of a The value is an integer
specified AP radio. that ranges from 0 to 2.
Only the AP4030TN
supports three radios.
ssid ssid Displays information about service VAPs of a The SSID must exist.
specified SSID.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display vap command to view information about service VAPs.
Example
# Display information about all service VAPs.
<HUAWEI> display vap all
WID : WLAN ID
-----------------------------------------------------------------------------
AP ID AP name RfID WID BSSID Status Auth type STA SSID
-----------------------------------------------------------------------------
3 ap1 0 1 0023-0024-0080 ON Open 0 ag
-----------------------------------------------------------------------------
Total: 1
AP ID AP ID.
AP name AP name.
Format
display vap create-fail-record { ap-mac ap-mac | all }
Parameters
Parameter Description Value
ap-mac ap- Displays records about VAP creation failures The specified MAC
mac on an AP with the specified MAC address. address must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display vap create-fail-record all command to check records about VAP
creation failures.
Example
# Display all records about VAP creation failures.
<HUAWEI> display vap create-fail-record all
Rf/WLAN: Radio ID/WLAN ID
-------------------------------------------------------------------------------
AP MAC Rf/WLAN Profile Name Source Type
VAP Type Reason
-------------------------------------------------------------------------------
e468-a350-8a60 0/4 1 ap-group
Service Preshared key is not configured.
e468-a350-8a60 1/4 1 ap-group
Service Preshared key is not configured.
e468-a350-8a60 0/6 1 ap-group
Service Preshared key is not configured.
e468-a350-8a60 1/6 1 ap-group
Service Preshared key is not configured.
-------------------------------------------------------------------------------
Total records: 4
Table 11-82 Description of the display vap create-fail-record all command output
Item Description
Item Description
Function
The display vap-profile command displays configuration and reference information about a
VAP profile.
Format
display vap-profile { all | name profile-name }
Parameters
Parameter Description Value
name profile- Displays information about a specified VAP The VAP profile must
name profile. exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display vap-profile command to view configuration and reference
information about a VAP profile.
Example
# Display information about all VAP profiles.
<HUAWEI> display vap-profile all
----------------------------------------------------------
Profile name Reference
----------------------------------------------------------
default 1
vap-profile-1 0
----------------------------------------------------------
Total: 2
Item Description
Item Description
Item Description
Related Topics
11.1.256 vap-profile (WLAN view)
Function
The display vlan pool command displays configuration information about a VLAN pool.
Format
display vlan pool { name pool-name | all [ verbose ] }
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display vlan pool command to view configuration information about VLAN
pools, which facilitates VLAN pool management and maintenance.
Example
# Display brief configuration information about all VLAN pools.
<HUAWEI> display vlan pool all
--------------------------------------------------------------------------------
Name Assignment VLAN total
--------------------------------------------------------------------------------
pool1 hash 2
pool2 hash 0
--------------------------------------------------------------------------------
Total: 2
Item Description
Related Topics
11.1.48 assignment
11.1.262 vlan pool
11.1.263 vlan (VLAN pool view)
Function
The display wired-port-profile command displays reference and configuration information
about an AP wired port profile.
Format
display wired-port-profile { all | name profile-name }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display wired-port-profile command to view configuration and reference
information about an AP wired port profile.
Example
# Display information about all AP wired port profiles.
<HUAWEI> display wired-port-profile all
----------------------------------------------------------
Profile name Reference
----------------------------------------------------------
default 1
wired-port-profile-1 0
----------------------------------------------------------
Total: 2
Item Description
# Display information about the AP wired port profile default (Eth-trunk is not configured).
<HUAWEI> display wired-port-profile name default
----------------------------------------------------------------------------
Port link profile : default
Description :
STP : disable
Port work mode : -
Port Tagged VLAN : -
Port untagged VLAN : 1
Port PVID VLAN : -
User isolate mode : disable
Traffic filter inbound(IPv4) : -
Traffic filter outbound(IPv4) : -
DHCP trust port : enable
IPSG switch : disable
DAI switch : disable
STP auto shutdown switch : disable
Auto shutdown recovery time : 600
Learn client address switch : disable
Traffic optimize broadcast suppression(pps) : -
Traffic optimize unicast suppression(pps) : -
Traffic optimize multicast suppression(pps) : -
----------------------------------------------------------------------------
Item Description
Item Description
Traffic optimize broadcast suppression(pps) Maximum broadcast traffic volume that can
be received on an AP's wired interface.
To configure the parameter, run the 11.1.251
traffic-optimize (AP wired port profile
view) command.
Item Description
Traffic optimize multicast suppression(pps) Maximum multicast traffic volume that can
be received on an AP's wired interface.
To configure the parameter, run the 11.1.251
traffic-optimize (AP wired port profile
view) command.
Related Topics
11.1.265 wired-port-profile (WLAN view)
Function
The display wlan config-errors command displays WLAN configuration errors.
Format
display wlan config-errors
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to check WLAN configuration errors.
Example
# Display WLAN configuration errors.
<HUAWEI> display wlan config-errors
--------------------------------------------------------------------------------
Profile Error
--------------------------------------------------------------------------------
vap-profile 1 The authentication type specifie
d in the authentication-profile 1 does not match that in the security-profile 1.
--------------------------------------------------------------------------------
Total: 1
Item Description
Function
The dot11a basic-rate command configures a basic rate set of the 802.11a protocol in a 5G
radio profile.
The undo dot11a basic-rate command restores the default basic rate set of the 802.11a
protocol in a 5G radio profile.
By default, a basic rate set of the 802.11a protocol in a 5G radio profile includes rates 6 Mbps,
12 Mbps, and 24 Mbps.
Format
dot11a basic-rate { dot11a-rate-value &<1-8> | all }
Parameters
Parameter Description Value
Views
5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The rates specified in the basic rate set must be supported by both the AP and STA; otherwise,
the STA cannot associate with the AP. For example, if you configure the basic rate set to
contain rates 6 Mbps and 9 Mbps and deliver the configuration to an AP, only STAs
supporting the two rates can associate with the AP. The AP and STA select a rate from the
basic rate set or the supported rate set to transmit packets.
After you run this command to configure a basic rate set in a radio profile, bind the radio
profile to an AP or AP group. If a STA associates with the AP in 802.11a mode, the STA must
support all rates specified by the basic rate set; otherwise, the STA cannot associate with the
AP.
Precautions
This configuration applies only to STAs associated with an AP in 802.11a mode but does not
take effect on STAs associated with the AP in other modes.
The basic rate set and supported rate set cannot be empty simultaneously.
Example
# Configure the 802.11a basic rate set to contain rates 6 Mbps and 9 Mbps in the 5G radio
profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-5g-profile name default
[HUAWEI-wlan-radio-5g-prof-default] dot11a basic-rate 6 9
Related Topics
11.1.123 display radio-5g-profile
11.1.148 dot11a supported-rate
Format
dot11a supported-rate { dot11a-rate-value &<1-8> | all }
Parameters
Parameter Description Value
Views
5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The supported rate set contains rates supported by the AP except the basic rates. The AP and
STA can transmit data at all rates specified by the supported rate set. The AP and STA select a
rate from the basic rate set or the supported rate set to transmit packets.
When a STA supports rates specified in the basic rate set, the STA can associate with the AP
regardless of whether the STA supports rates specified in the supported rate set. In this case,
the AP and STA can only select a rate from the basic rate set to transmit packets. For
example, assume that you configure the basic rate set to contain rates 6 Mbps and 9 Mbps and
the supported rate set to contain rates 48 Mbps and 54 Mbps. After you deliver the
configurations to an AP, the STA supporting 6 Mbps and 9 Mbps can associate with the AP,
and select either of the two rates to transmit packets with the AP. However, if the STA
supports 6 Mbps, 9 Mbps, and 54 Mbps, the STA and AP select any of the three rates to
transmit packets after the STA associates with the AP.
After you run this command to configure a supported rate set in a radio profile, bind the radio
profile to an AP or AP group. If a STA associates with the AP in 802.11a mode, the AP and
STA select a rate from the basic rate set or supported rate set to transmit packets.
Precautions
This configuration applies only to STAs associated with an AP in 802.11a mode but does not
take effect on STAs associated with the AP in other modes.
The basic rate set and supported rate set cannot be empty simultaneously.
Example
# Configure the 802.11a supported rate set to contain rates 6 Mbps and 9 Mbps in the 5G
radio profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-5g-profile name default
[HUAWEI-wlan-radio-5g-prof-default] dot11a supported-rate 6 9
Related Topics
11.1.123 display radio-5g-profile
11.1.147 dot11a basic-rate
Format
dot11bg basic-rate { dot11bg-rate-value &<1-12> | all }
undo dot11bg basic-rate
Parameters
Parameter Description Value
Views
2G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The rates specified in the basic rate set must be supported by both the AP and STA; otherwise,
the STA cannot associate with the AP. For example, if you configure the basic rate set to
contain rates 6 Mbps and 9 Mbps and deliver the configuration to an AP, only STAs
supporting the two rates can associate with the AP. The AP and STA select a rate from the
basic rate set or the supported rate set to transmit packets.
After you run this command to configure a basic rate set in a radio profile, bind the radio
profile to an AP or AP group. If a STA associates with the AP in 802.11bg mode, the STA
must support all rates specified by the basic rate set; otherwise, the STA cannot associate with
the AP.
Precautions
This configuration applies only to STAs associated with an AP in 802.11bg mode but does not
take effect on STAs associated with the AP in other modes.
The basic rate set and supported rate set cannot be empty simultaneously.
Example
# Configure the 802.11bg basic rate set to contain rates 6 Mbps and 9 Mbps in the 2G radio
profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] dot11bg basic-rate 6 9
Related Topics
11.1.122 display radio-2g-profile
11.1.150 dot11bg supported-rate
Format
dot11bg supported-rate { dot11bg-rate-value &<1-12> | all }
undo dot11bg supported-rate
Parameters
Parameter Description Value
Views
2G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The supported rate set contains rates supported by the AP except the basic rates. The AP and
STA can transmit data at all rates specified by the supported rate set. The AP and STA select a
rate from the basic rate set or the supported rate set to transmit packets.
When a STA supports rates specified in the basic rate set, the STA can associate with the AP
regardless of whether the STA supports rates specified in the supported rate set. In this case,
the AP and STA can only select a rate from the basic rate set to transmit packets. For
example, assume that you configure the basic rate set to contain rates 6 Mbps and 9 Mbps and
the supported rate set to contain rates 48 Mbps and 54 Mbps. After you deliver the
configurations to an AP, the STA supporting 6 Mbps and 9 Mbps can associate with the AP,
and select either of the two rates to transmit packets with the AP. However, if the STA
supports 6 Mbps, 9 Mbps, and 54 Mbps, the STA and AP select any of the three rates to
transmit packets after the STA associates with the AP.
After you run this command to configure a supported rate set in a radio profile, bind the radio
profile to an AP or AP group. If a STA associates with the AP in 802.11bg mode, the AP and
STA select a rate from the basic rate set or supported rate set to transmit packets.
Precautions
This configuration applies only to STAs associated with an AP in 802.11bg mode but does not
take effect on STAs associated with the AP in other modes.
The basic rate set and supported rate set cannot be empty simultaneously.
Example
# Configure the 802.11bg supported rate set to contain rates 6 Mbps and 9 Mbps in the 2G
radio profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] dot11bg supported-rate 6 9
Related Topics
11.1.122 display radio-2g-profile
11.1.149 dot11bg basic-rate
11.1.151 dtim-interval
Function
The dtim-interval command sets the delivery traffic indication map (DTIM) interval in an
SSID profile.
The undo dtim-interval command restores the default DTIM interval in an SSID profile.
By default, the DTIM interval is 1.
Format
dtim-interval dtim-interval
undo dtim-interval
Parameters
Parameter Description Value
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
DTIM refers to delivery traffic indication map. After a STA enters the dormancy mode, the
associated AP saves the broadcast and multicast frames for the STA. When a Beacon frame
sent to the STA by the AP contains DTIM, the saved broadcast and multicast frames will be
transmitted to the STA. The DTIM interval refers to the number of Beacon frames sent before
the Beacon frame that contains the DTIM. To set the interval for sending Beacon frames in an
SSID profile, run the beacon-interval command.
l When the STA is in the dormancy status, the AP saves data transmitted to the STA and
notifies the STA with a bit in broadcast Beacon frames. The STA receives data according
to this bit. You can run this command to set the DTIM interval in the specified SSID
profile.
l The DTIM interval specifies how many Beacon frames are sent before the Beacon frame
that contains the DITM. A long DTIM interval lengthens the dormancy time of the STA
and saves power, but degrades the transmission capability of the STA. A short interval
helps transmitting data in a timely manner, but the STA is waken up frequently, causing
high power consumption.
Example
# Set the DTIM interval to 5 in the SSID profile ssid1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] dtim-interval 5
Related Topics
11.1.135 display ssid-profile
Format
eapol-response dest-address transform-condition { always | equal-bssid }
undo eapol-response dest-address transform-condition
Parameters
Parameter Description Value
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
The destination MAC addresses of the EAPOL-response packets sent by some STAs are APs'
BSSIDs, but the destination MAC addresses of the EAPOL-response packets sent by other
STAs are not APs' BSSIDs. You need to run this command to specify the EAPOL-response
packets to be encapsulated.
Example
# Configure the AP to encapsulate all EAPOL-response packets.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] eapol-response dest-address transform-
condition always
Related Topics
11.1.112 display ap-system-profile
Function
The eapol-response dest-address transform-to command configures an AP to encapsulate
EAPOL-response packets into broadcast, multicast, or unicast packets.
The undo eapol-response dest-address transform-to command restores the default settings.
Format
eapol-response dest-address transform-to { broadcast | multicast | mac mac-address |
learning }
Parameters
Parameter Description Value
broadcast Configures an AP to -
encapsulate EAPOL-
response packets into
broadcast packets.
multicast Configures an AP to -
encapsulate EAPOL-
response packets into
multicast packets.
learning Configures an AP to -
encapsulate EAPOL-
response packets into
unicast packets and actively
learn the destination MAC
address.
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
l If the authentication server can only process EAP multicast packets, configure the AP to
encapsulate EAPOL-response packets into multicast packets.
l If the authentication server can only process EAP broadcast packets, configure the AP to
encapsulate EAPOL-response packets into broadcast packets.
l If the authentication server can only process EAP unicast packets, configure the AP to
encapsulate EAPOL-response packets into unicast packets. When the AP is configured to
encapsulate EAPOL-response packets into unicast packets, a unicast MAC address must
be configured.
Example
# Configure an AP to encapsulate EAPOL-response packets into broadcast packets.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] eapol-response dest-address transform-to
broadcast
Related Topics
11.1.112 display ap-system-profile
Function
The eapol-start dest-address transform-condition command specifies the EAPOL-start
packets to be encapsulated by an AP.
By default, an AP encapsulates only the EAPOL-start packets with the destination MAC
addresses being the AP's BSSID.
Format
eapol-start dest-address transform-condition { always | equal-bssid }
Parameters
Parameter Description Value
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The destination MAC addresses of the EAPOL-start packets sent by some STAs are APs'
BSSIDs, but the destination MAC addresses of the EAPOL-start packets sent by other STAs
are not APs' BSSIDs. You need to run this command to specify the EAPOL-start packets to be
encapsulated.
Precautions
Example
# Configure the AP to encapsulate all EAPOL-start packets.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] eapol-start dest-address transform-
condition always
Related Topics
11.1.112 display ap-system-profile
Function
The eapol-start dest-address transform-to command configures an AP to encapsulate
EAPOL-start packets into broadcast, multicast, or unicast packets.
The undo eapol-start dest-address transform-to command restores the default settings.
Format
eapol-start dest-address transform-to { broadcast | multicast | mac mac-address }
Parameters
Parameter Description Value
broadcast Configures an AP to -
encapsulate EAPOL-start
packets into broadcast
packets.
multicast Configures an AP to -
encapsulate EAPOL-start
packets into multicast
packets.
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
l If the authentication server can only process EAP multicast packets, configure the AP to
encapsulate EAPOL-start packets into multicast packets.
l If the authentication server can only process EAP broadcast packets, configure the AP to
encapsulate EAPOL-start packets into broadcast packets.
l If the authentication server can only process EAP unicast packets, configure the AP to
encapsulate EAPOL-start packets into unicast packets. When the AP is configured to
encapsulate EAPOL-start packets into unicast packets, a unicast MAC address must be
configured.
Example
# Configure an AP to encapsulate EAPOL-start packets into broadcast packets.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] eapol-start dest-address transform-to
broadcast
Related Topics
11.1.112 display ap-system-profile
11.1.156 eirp
Function
(AP group radio view) The eirp command configures the transmit power for all specified
radios in an AP group.
(AP group radio view) The undo eirp command restores the default transmit power for all
specified radios in an AP group.
(AP radio view) The eirp command configures the transmit power for an AP radio.
(AP radio view) The undo eirp command cancels the configuration of the transmit power on
an AP radio. The transmit power on the AP radio is then determined by that configured in the
AP group radio view.
By default, the transmit power of a radio is 127 dBm. The transmit power that takes effect on
APs is related to the AP type, country code, channel, and channel bandwidth. It is the
maximum transmit power that the AP radio supports under the current configuration. Run the
display radio { ap-name ap-name | ap-id ap-id } command to check the maximum value.
Format
eirp eirp
undo eirp
Parameters
Parameter Description Value
Views
AP radio view, AP group radio view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can configure the transmit power for a radio based on actual network environments,
enabling radios to provide the required signal strength and improving signal quality on
WLANs.
Precautions
Example
# Set the transmit power to 30 dBm for radio 0 of AP 1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-id 1
[HUAWEI-wlan-ap-1] radio 0
[HUAWEI-wlan-radio-1/0] eirp 30
Info: The EIRP value takes effect only when automatic transmit power selection i
s disabled, and the value depends on the AP specifications and local laws and re
gulations.
Related Topics
11.1.87 display ap config-info
11.1.121 display radio
Format
eth-trunk trunk-id
undo eth-trunk
Parameters
Parameter Description Value
Views
AP wired port profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To improve the connection reliability and increase the bandwidth, you can run this command
to bind multiple interfaces into an Eth-Trunk.
Prerequisite
The physical interface to be added to an Eth-Trunk cannot have other configurations. Before
adding a physical interface to an Eth-Trunk, clear all configurations on it except the interface
status, descriptions, LLDP function, and alarm function for CRC errors.
Precautions
APs that have only one physical uplink network interface do not support this command.
NOTE
This command takes effect only on the AP8130DN-W, AP5030DN, AP5130DN, AP8030DN, AP8130DN,
AP7030DE, AP9330DN, AD9430DN-24, AD9430DN-12, AP4030TN, AP4050DN-E, AP4050DN-HD,
AP6050DN, AP6150DN, and AP7050DN-E.
Example
# Add the AP interface to Eth-Trunk 0.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wired-port-profile name wired-port1
[HUAWEI-wlan-wired-port-wired-port1] eth-trunk 0
Related Topics
11.1.145 display wired-port-profile
11.1.158 forward-mode
Function
The forward-mode command sets the data forwarding mode in a VAP profile.
The undo forward-mode command restores the default data forwarding mode in a VAP
profile.
Format
forward-mode { direct-forward | tunnel }
undo forward-mode
Parameters
Parameter Description Value
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
You can run the forward-mode command to configure the forwarding mode in a VAP profile.
The forwarding modes of VAP profiles can be different.
Example
# Create the VAP profile vap1 and set the forwarding mode to tunnel forwarding in the
profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] forward-mode tunnel
Warning: This action may cause service interruption. Continue?[Y/N]y
Related Topics
11.1.143 display vap-profile
11.1.159 fragmentation-threshold
Function
The fragmentation-threshold command sets the fragmentation threshold in a radio profile.
The undo fragmentation-threshold command restores the default fragmentation threshold in
a radio profile.
By default, the packet fragmentation threshold is 2346 bytes.
Format
fragmentation-threshold fragmentation-threshold
undo fragmentation-threshold
Parameters
Parameter Description Value
fragmentation- Specifies the fragment threshold. If the length The value is an integer
threshold of a frame to be sent by the MAC layer that ranges from 256 to
exceeds this threshold, the frame is fragmented 2346, in bytes. It must
before being sent. be an integral multiple
of 2.
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A proper packet fragmentation threshold can improve channel bandwidth usage. Set the
fragmentation threshold as required. A large threshold is recommended.
Precautions
When the packet fragmentation threshold is too small, packets are fragmented into smaller
frames. These frames are transmitted at a high extra cost, resulting in low channel efficiency.
When the packet fragmentation threshold is too large, long packets are usually not
fragmented, which increases the transmission time and error probability. If an error occurs,
packets are retransmitted, resulting in a waste of channel bandwidth.
Example
# Set the fragmentation threshold to 1500 bytes in the 2G radio profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] fragmentation-threshold 1500
Related Topics
11.1.122 display radio-2g-profile
11.1.123 display radio-5g-profile
11.1.160 frequency
Function
(AP group radio view) The frequency command sets the working frequency of radios for all
APs in an AP group.
(AP group radio view) The undo frequency command restores the default working frequency
of radios for all APs in an AP group.
(AP radio view) The frequency command sets the working frequency of radios for an AP.
(AP radio view) The undo frequency command restores the working frequency of the radio
on an AP to the working frequency configured in the AP group radio view.
By default, radio 0 works on the 2.4 GHz frequency band, and radio 2 works on the 5 GHz
frequency band.
Format
frequency { 2.4g | 5g }
undo frequency
Parameters
None.
Views
AP radio view, AP group radio view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Radio 0s of the AP2010DN and AP8130DN support 2.4 GHz and 5 GHz frequency bands but
they can work on one frequency band at a time. You can configure the working frequency
band of the AP based on the frequency band of STAs.
Precautions
The configuration of the 5 GHz frequency band for radio 0 takes effect only on the
AP2010DN, AP4030TN supporting three radios, and AP8130DN.
Changing the working frequency of radio 0 and radio 2 will delete the channel, power, and
antenna gain configurations on radio 0 and radio 2. If an AP uses an external antenna, run the
antenna-gain antenna-gain command to reconfigure the antenna gain to be consistent with
the gain of the external antenna connected to the AP.
The configuration in the AP radio view has a higher priority than that in the AP group radio
view.
Example
# Set the working frequency to the 5 GHz frequency band for radio 0 of AP 1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-id 1
[HUAWEI-wlan-ap-1] radio 0
[HUAWEI-wlan-radio-1/0] frequency 5g
Related Topics
11.1.112 display ap-system-profile
11.1.161 guard-interval-mode
Function
The guard-interval-mode command configures the guard interval (GI) mode.
Format
guard-interval-mode { short | normal }
undo guard-interval-mode
Parameters
Parameter Description Value
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
During data transmission, the receive and transmit ends do not receive and send data at all
times. There is an interval between the first and second data receiving or transmission or
among multiple transmissions. The interval is called Guard Interval (GI) and can improve the
transmission effect.
The GI mode consists of the short interval and common interval. The common interval is 800
ns whereas the short interval is 400 ns. The short interval is applicable to 802.11n and
802.11ac specifications, which can raise the transmission rate of 802.11n and 802.11ac
packets.
Example
# Set the GI mode to short.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] guard-interval-mode short
Related Topics
11.1.122 display radio-2g-profile
11.1.123 display radio-5g-profile
Function
The high-temperature threshold command sets the upper temperature alarm threshold for
APs.
The undo high-temperature threshold command restores the default upper temperature
alarm threshold for APs.
AP5030DN/AP5130DN 87
AP6010SN-GN 85
AP6010DN-AGN 102
AP6310SN-GN 94
AP6510DN-AGN 88
AP6510DN-AGN-US 81
AP6610DN-AGN 104
AP6610DN-AGN-US 100
AP7110SN 76
AP7110DN 89
AP7030DE/AP8030DN/AP8130DN/ 83
AP9330DN
AP9131DN/AP9132DN 84
AD9430DN-24 71
AD9430DN-12 83
R230D/R240D 40
AP6050DN 86
AP7050DE 88
AP7050DN-E 89
AP4030TN/AP4050DN-E/AP4050DN-HD/ 50
AP6150DN
NOTE
Format
high-temperature threshold threshold
Parameters
Parameter Description Value
threshold Specifies the upper The value is an integer that ranges from 20
temperature alarm to 110, in °C.
threshold.
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
You can run this command to set the upper temperature alarm threshold for an AP. When an
AP's temperature exceeds the upper threshold, the AP generates an alarm and a log, and
notifies the AC of the high temperature.
Example
# Set the upper temperature alarm threshold for APs to 65°C.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] high-temperature threshold 65
Related Topics
11.1.112 display ap-system-profile
Format
ht a-mpdu disable
undo ht a-mpdu disable
Parameters
None
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
To reduce cost, 802.11n uses frame aggregation technology that aggregates two or more
frames into an A-MPDU to transmit.
Example
# Disable aggregation of MPDUs.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] ht a-mpdu disable
Related Topics
11.1.122 display radio-2g-profile
11.1.123 display radio-5g-profile
Format
ht a-mpdu max-length-exponent max-length-exponent-index
undo ht a-mpdu max-length-exponent
Parameters
Parameter Description Value
max-length- Indicates the index for the maximum length of The value is an integer
exponent-index the A-MPDU. that ranges from 0 to 3.
l 0: indicates that the
maximum length of
the A-MPDU is
8191 bytes.
l 1: indicates that the
maximum length of
the A-MPDU is
16383 bytes.
l 2: indicates that the
maximum length of
the A-MPDU is
32767 bytes.
l 3: indicates that the
maximum length of
the A-MPDU is
65535 bytes.
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
To reduce costs, 802.11n uses frame aggregation technology that aggregates two or more
frames into an A-MPDU to transmit.
Example
# Set the index of the maximum length of the A-MPDU to 2 in the 2G radio profile default.
The index 2 corresponds to a maximum length of 32767 bytes.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] ht a-mpdu max-length-exponent 2
Related Topics
11.1.122 display radio-2g-profile
11.1.123 display radio-5g-profile
Format
ip source check user-bind enable
undo ip source check user-bind enable
Parameters
None
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Users can configure static IP addresses for their clients and connect to the Internet after
passing 802.1x authentication. To defend against source IP address spoofing attacks, you need
to enable IP source guard on APs.
To prevent IP packets of unauthorized users from entering external networks through an AP,
enable IP source guard in a VAP profile and bind the VAP profile to an AP or AP group. The
IP source guard function can filter incoming packets on an AP radio interface, preventing
unauthorized packets from passing through the AP.
If STA address learning is enabled on an AP using the undo learn-client-address disable
command, DHCP users are allowed to access the AP. Before the users who are assigned IP
addresses statically access an AP, the administrator needs to manually configure static binding
entries for the users. That is, the administrator configures an IP network segment and binds it
to the MAC addresses of the users so that the users can access the AP.
Example
# Enable IP source guard on APs.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] ip source check user-bind enable
Related Topics
11.1.143 display vap-profile
Function
The ipsg enable command enables IP source guard (IPSG) on an AP's wired interface.
The undo ipsg enable command disables IPSG on an AP's wired interface.
Format
ipsg enable
Parameters
None
Views
AP wired port profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Attackers often use packets with the source IP addresses or MAC addresses of authorized
users to access or attack networks. As a result, authorized users cannot obtain stable and
secure network services. You can enable the IPSG function to prevent the situation.
Prerequisites
Terminal address learning has been enabled on the AP's wired interface using the learn-
client-address enable command.
Follow-up Procedure
Precautions
This command takes effect only on IP packets transmitted on an AP's wired interface.
The AP wired interfaces added to an Eth-trunk interface do not support this function.
Example
# Enable IPSG on an AP's wired interface.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wired-port-profile name wire1
[HUAWEI-wlan-wired-port-wire1] ipsg enable
Related Topics
11.1.145 display wired-port-profile
Function
The ip-address command configures a static IPv4 address and gateway for an AP.
The undo ip-address command restores the default static IPv4 address and gateway for an
AP.
By default, no static IPv4 address and gateway are configured for an AP.
Format
ip-address ip-address { mask-length | mask } [ gateway gateway ]
undo ip-address
Parameters
Parameter Description Value
ip-address Specifies the static IPv4 address for The value is in dotted decimal
an AP. notation.
mask Specifies the IPv4 address mask for The value is in dotted decimal
an AP. notation.
mask-length Specifies the IPv4 address mask The value is an integer that ranges
length for an AP. from 0 to 32.
gateway gateway Specifies the egress gateway for AP The value is in dotted decimal
routes. notation.
Views
AP provisioning view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Prerequisites
The AP has been configured to obtain an IP address in static mode using the 11.1.6 address-
mode (AP provisioning view) command.
Follow-up Procedure
Run the commit command to deliver configuration to APs and restart the APs to make the
configuration take effect.
Precautions
Ensure that there are reachable routes between the configured IPv4 address and the AC source
address for an AP to go online. Otherwise, the AP may fail to go online.
If the AP and AC are connected through a Layer-3 network, the egress gateway for AP routes
must be configured.
Example
# Set the static IPv4 address of the AP to 10.1.1.1/24.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] provision-ap
[HUAWEI-wlan-provision-ap] address-mode static
[HUAWEI-wlan-provision-ap] ip-address 10.1.1.1 24
Related Topics
11.1.120 display provision-ap parameter-list
11.1.68 commit (AP provisioning view)
Function
The keep-service enable command configures the AP to continue providing data services
after the CAPWAP link between the AP and AC is disconnected.
By default, all services on the AP are interrupted after the CAPWAP link between the AP and
AC is disconnected.
Format
keep-service enable
Parameters
None
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In direct forwarding mode, you can run the keep-service enable command to configure the
AP to continue providing data services after the CAPWAP link between the AP and AC is
disconnected. The data services then no longer depend on the CAPWAP link, which enhances
service forwarding robustness.
Precautions
The command does not take effect on a WDS network.
The offline management VAP function and service holding upon CAPWAP link disconnection
are mutually exclusive. When the two functions are configured at the same time, the offline
management VAP function cannot take effect.
After this command is executed, if the wids device detect enable and wids contain enable
commands are configured to enable rogue device detection and containment, the AP will
continue providing data services after going offline. However, the AC considers the AP as a
rogue device and adds it to the containment list. The containment mechanism will disconnect
STAs from the AP. Therefore, service holding upon CAPWAP link disconnection does not
take effect in this case.
Example
# Configure the AP to continue providing data services after the CAPWAP link between the
AP and AC is disconnected.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] keep-service enable
Related Topics
11.1.112 display ap-system-profile
The undo keep-service enable command disables the APs in fault state from allowing access
of new STAs.
By default, the APs in fault state are disabled from allowing access of new STAs.
Format
keep-service enable allow new-access
Parameters
None
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The networks with low security requirements, which apply to hospitals or warehouses, require
that the APs in fault state still allow access of new STAs when link faults occur between the
APs and AC. After the keep-service enable allow new-access command is run, new STAs
can still connect to the APs in fault state when the CAPWAP link between the APs and AC is
disconnected.
Prerequisites
Precautions
After this command is executed, if the wids device detect enable and wids contain enable
commands are configured to enable rogue device detection and containment, the AP will
continue providing data services after going offline. However, the AC considers the AP as a
rogue device and adds it to the containment list. The containment mechanism will disable the
AP from allowing access of new STAs. Therefore, the function of enabling an offline AP to
allow access of new STAs does not take effect in this case.
Example
# Enable the APs in fault state to allow access of new STAs.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] keep-service enable allow new-access
Function
The learn-client-address dhcp-strict command enables strict STA IP address learning
through DHCP.
The undo learn-client-address dhcp-strict command disables strict STA IP address learning
through DHCP.
Format
learn-client-address dhcp-strict [ blacklist enable ]
Parameters
Parameter Description Value
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a STA associates with an AP, the following situation occurs after strict STA IP address
learning through DHCP is enabled:
l If the STA obtains an IP address through DHCP, the AP will automatically report the IP
address to the AC. The STA IP address can be used to maintain the mapping between
STA IP addresses and MAC addresses.
l For a STA using a static IP address:If blacklist enable is specified, the STA will be
added to a dynamic blacklist of the AP and cannot associate with the AP before the
blacklist entry ages.If blacklist enable is not specified, the STA can associate with the
AP but the AP does not learn the IP address of the STA.
Prerequisites
STA address learning has been enabled using the undo learn-client-address disable
command.
Precautions
After strict STA IP address learning is enabled, it is recommended that you run the 11.1.165
ip source check user-bind enable and 11.1.47 arp anti-attack check user-bind enable
commands to enable IP source guard and dynamic ARP inspection so that STAs cannot
communicate with the network before obtaining an IP address through DHCP.
Example
# Enable strict STA IP address learning through DHCP.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] learn-client-address dhcp-strict
Related Topics
11.1.47 arp anti-attack check user-bind enable
11.1.143 display vap-profile
11.1.165 ip source check user-bind enable
Format
learn-client-address disable
undo learn-client-address disable
Parameters
None
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If a STA associates with an AP that has STA address learning enabled and obtains an IP
address, the AP automatically reports the STA IP address to the AC to maintain the STA' IP
address and MAC address binding entry
Precautions
l Before disabling STA address learning, run the undo learn-client-address dhcp-strict
command to disable strict STA IP address learning through DHCP.
l If a bridging device functions as a STA to connect to an AP enabled with STA address
learning, the AP cannot learn IP addresses of users connected to the bridging device;
therefore, the users cannot communicate with the network. In this situation, disable STA
address learning.
Example
# Disable STA address learning.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] learn-client-address disable
Related Topics
11.1.143 display vap-profile
Function
The learn-client-address enable command enables terminal address learning on an AP's
wired interface.
Format
learn-client-address enable
Parameters
None
Views
AP wired port profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After terminal address learning is enabled on an AP's wired interface, if a wired terminal
connected to the AP wired interface successfully obtains an IP address, the AP automatically
reports the IP address of the terminal to the AC, helping to maintain the IP address and MAC
address binding entries of wired terminals.
Prerequisites
The DCHP trusted interface has been enabled using the undo dhcp trust port command in
the AP wired port profile view.
Follow-up Procedure
Bind the AP wired port profile to an AP group or AP.
Precautions
The AP wired interfaces added to an Eth-trunk interface do not support this function.
If a bridging device functions as a STA to connect to an AP enabled with STA address
learning, the AP cannot learn IP addresses of users connected to the bridging device;
therefore, the users cannot communicate with the network. In this situation, disable STA
address learning.
Example
# Enable terminal address learning on an AP's wired interface.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wired-port-profile name wire1
[HUAWEI-wlan-wired-port-wire1] learn-client-address enable
Related Topics
11.1.145 display wired-port-profile
Format
led off
undo led off
Parameters
None.
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Blinking indicators of indoor APs deployed in hospitals and hotels may affect people's
nighttime rest. To prevent this, run the led off command to configured AP indicators to turn
off.
If you need to locate AP faults by observing AP indicator status, run the undo led off
command to allow the AP indicators to turn on.
Example
# Configure AP indicators to turn off.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] led off
Related Topics
11.1.112 display ap-system-profile
Function
The legacy-station disable command denies access of non-HT STAs.
Format
legacy-stationdisable
Parameters
None.
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Non-HT STAs support only 802.11a/b/g and provide a data transmission rate far smaller than
the rate of 802.11n/ac STAs. If the non-HT STAs access the wireless network, the data
transmission rate of 802.11n/ac STAs will be reduced. To prevent the transmission rate of
802.11n/ac STAs from being affected, you can run the legacy-stationdisable command to
deny access of non-HT STAs.
Configuration Impact
After the legacy-station disable command is run, non-HT STAs supporting only 802.11a/b/g
cannot access the wireless network.
Precautions
Example
# Deny access of non-HT STAs.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] legacy-station disable
Related Topics
11.1.135 display ssid-profile
Format
lldp admin-status { rx | tx | txrx }
undo lldp admin-status
Parameters
Parameter Description Value
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
You can configure the LLDP operation mode for an AP based on the site requirements. For
example, if you set the LLDP operation mode of an AP to Tx, the AP sends LLDP packets but
cannot receive LLDP packets from neighbors. In this situation, the AP cannot discover
neighbors.
Example
# Set the LLDP operation mode of an AP to Tx.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] lldp admin-status tx
Related Topics
11.1.112 display ap-system-profile
Format
lldp enable
Parameters
None.
Views
AP wired port link profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
AP wired interfaces can exchange LLDP packets with neighbors to obtain neighbor status and
transmit AP status to neighbors. The AP and neighbors save the received information to the
Management Information Base (MIB) for an AC to query and determine the link status.
Prerequisite
The LLDP function has been enabled in the WLAN view using the 11.1.17 ap lldp enable
command.
Example
# Enable LLDP on the AP wired interface.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap lldp enable
[HUAWEI-wlan-view] port-link-profile name port-link1
[HUAWEI-wlan-port-link-prof-port-link1] lldp enable
Related Topics
11.1.17 ap lldp enable
11.1.119 display port-link-profile
Function
The lldp message-transmission delay command sets the LLDP packet transmission delay.
The undo lldp message-transmission delay command restores the default LLDP packet
transmission delay.
The default LLDP packet transmission delay is 2 seconds.
Format
lldp message-transmission delay delay
undo lldp message-transmission delay
Parameters
Parameter Description Value
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
There is a delay before the AP sends an LLDP packet to the neighbor when the device status
changes frequently.
If the AP status changes frequently, extend the delay in preventing the AP from frequently
sending packets to the neighbors. A delay suppresses the network topology flapping.
Configuration Impact
The LLDP packet transmission delay must be set properly and adjusted according to network
loads.
l A large value reduces the LLDP packet transmission frequency when the local device
status frequently changes. This helps save system resources. However, if the value is too
large, the device cannot notify neighbors of its status in a timely manner, and the NMS
cannot discover the network topology changes in real time.
l A small value increases the LLDP packet transmission frequency and enables the NMS
to discover network topology changes in real time when the local device status
frequently changes. However, if the value is too small, LLDP packets are exchanged
frequently. This increases the system load and wastes resources.
l The default value is recommended.
Precautions
Consider the value of interval when adjusting the value of delay because it is restricted by the
value of interval.
l Decreasing the value of delay is not restricted by the value of interval. delay can be any
number from 1 to 8192.
l The delay value must be smaller than or equal to a quarter of the interval value.
Therefore, if you want to set delay to be greater than a quarter of interval, first increase
the interval value to at least four times the new delay value, and then increase the delay
value.
NOTE
If the interval value is smaller than four times the delay value, the system displays an error message
when you run the undo lldp message-transmission delay command. To run the undo lldp message-
transmission delay command, increase the interval value to at least four times the delay value first.
Example
# Set the LLDP packet transmission delay to 10 seconds.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] lldp message-transmission delay 10
Related Topics
11.1.112 display ap-system-profile
11.1.179 lldp message-transmission interval (AP system profile view)
Function
The lldp message-transmission hold-multiplier command sets the hold time multiplier of
device information stored on neighbors.
The undo lldp message-transmission hold-multiplier command restores the default hold
time multiplier of device information stored on neighbors.
Format
lldp message-transmission hold-multiplier hold
Parameters
Parameter Description Value
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The time multiplier is used to calculate how long a packet can be saved on a neighboring
node. After receiving an LLDP packet, a neighbor updates the aging time of the device
information from the sender based on the TTL.
The storage time calculation formula is: TTL = Min (65535, (interval x hold)).
TTL is the device information storage time. It is the smaller value between 65535 and
(interval x hold).
interval indicates the interval at which the device sends LLDP packets to neighbors. This
parameter is set by the lldp message-transmission interval command. hold indicates the
hold time multiplier of device information stored on neighbors.
After the LLDP function is disabled on the device, its neighbors wait until the TTL of the
device information expires, and then delete the device information. This prevents network
topology flapping.
Configuration Impact
The hold time multiplier of device information stored on neighbors must be set to a proper
value.
l A large value of delay prevents network topology flapping. However, if the value is too
large, the device cannot notify neighbors of its status in a timely manner, and the NMS
cannot discover the network topology changes in real time.
l A small value of delay enables the NMS to discover topology change in time. However,
if the value is too small, the neighbors update device information too frequently. This
increases the load on the system and wastes resources.
l The default value is recommended.
Example
# Set the hold time multiplier of AP information stored on neighbors to 5.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] lldp message-transmission hold-multiplier
5
Related Topics
11.1.112 display ap-system-profile
11.1.179 lldp message-transmission interval (AP system profile view)
Format
lldp message-transmission interval interval
undo lldp message-transmission interval
Parameters
Parameter Description Value
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When the LLDP status of the AP keeps unchanged or the AP does not discover new
neighbors, the AP sends LLDP packets to the neighbors at a specified interval.
If you want to change the network topology detection frequency, run the lldp message-
transmission interval command to change the LLDP packet transmission interval.
Configuration Impact
The LLDP transmission interval must be set properly and adjusted according to network
loads.
l A large value reduces the LLDP packet transmission frequency. This helps save system
resources. However, if the value is too large, the device cannot notify neighbors of its
status in a timely manner, and the NMS cannot discover the network topology changes in
real time.
l A short interval increases the LLDP packet transmission frequency and enables the NMS
to discover network topology changes in real time. If the delay is too short, LLDP
packets are exchanged frequently. This increases the system load and wastes resources.
l The default value is recommended.
Precautions
Consider the value of delay when adjusting the value of interval because it is restricted by the
value of interval.
l Increasing the value of interval is not restricted by the value of delay. interval can be any
number from 5 to 32768.
l The interval value must be larger than or equal to four times the delay value. Therefore,
if you want to set interval to be smaller than four times the value of delay, first reduce
the delay value to be smaller than or equal to a quarter of the new interval value, and
then reduce the interval value.
NOTE
If the delay value is larger than a quarter of the interval value, the system displays an error message
when you run the undo lldp message-transmission interval command. To run the undo lldp message-
transmission interval command, reduce the delay value to be smaller than or equal to a quarter of the
interval value first.
Example
# Set the LLDP packet transmission interval to 60 second.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] lldp message-transmission interval 60
Related Topics
11.1.112 display ap-system-profile
Function
The lldp report-interval command sets the interval at which an AP reports LLDP neighbor
information to an AC.
The undo lldp report-interval command restores the default interval at which an AP reports
LLDP neighbor information to an AC.
Format
lldp report-interval interval-time
Parameters
Parameter Description Value
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
You can run the lldp report-interval command to adjust the interval at which an AP reports
LLDP neighbor information to an AC. This prevents LLDP neighbor information from being
frequently reported.
Example
# Set the interval at which an AP reports LLDP neighbor information to an AC to 20 seconds.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] lldp report-interval 20
Related Topics
11.1.112 display ap-system-profile
Function
The lldp restart-delay command sets the delay in re-enabling LLDP on an AP.
The undo lldp restart-delay command restores the default LLDP operation mode for an AP.
Format
lldp restart-delay delay-time
Parameters
Parameter Description Value
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
When the LLDP status of an AP changes, the AP reports LLDP neighbor information to the
connected AC. Setting the delay in re-enabling LLDP on the AP prevents the AP from
frequently reporting LLDP neighboring information to the AC when the LLDP status of the
AP frequently changes. This reduces the load on the AC and saves resources.
Example
# Set the delay in re-enabling LLDP on an AP to 1 second.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] lldp restart-delay 1
Related Topics
11.1.112 display ap-system-profile
Function
The lldp tlv-enable command specifies the types of TLVs that an AP wired interface.
The undo lldp tlv-enable command specifies the types of TLVs that an AP wired interface
advertises is prohibited from advertising.
Format
lldp tlv-enable basic-tlv { all | management-address | port-description | system-capability
| system-description | system-name }
Parameters
Parameter Description Value
Views
AP wired port link profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In LLDP, all device information is encapsulated in Link Layer Discovery Protocol data units
(LLDPDUs), which are then sent to neighbors. An LLDPDU contains a variety of TLVs. In a
TLV, T indicates the information type, L indicates the information length, and V indicates the
value or the content to be sent.
Devices exchange LLDPDUs carrying TLVs to obtain neighbor information. The TLVs that
can be encapsulated in an LLDP packet include basic TLVs, TLVs in the IEEE 802.1 format,
TLVs in the IEEE 802.3 format.
Basic TLVs are essential for managing network devices. The TLVs in the IEEE 802.1 format,
TLVs in the IEEE 802.3 format are defined by standardization organizations and other
organizations, which are used to enhance the network device management. You can determine
whether to advertise the IEEE 802.1 format, TLVs in the IEEE 802.3 format.
Devices on both ends can have different TLV types configured. You only need to configure
TLV types according to networking requirements.
Prerequisites
The LLDP function is enabled globally and on interfaces.
Precautions
When the supported TLVs are basic TLVs, TLVs in the IEEE 802.1 format, and TLVs in the
IEEE 802.3 format, the lldp tlv-enable command with the all parameter advertises all TLVs.
If the all parameter is not specified, only one type of TLV can be advertised. To advertise
multiple types of TLVs, run this command multiple times.
Example
# Configure the wired interface of AP to advertise Management-address TLVs.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap lldp enable
[HUAWEI-wlan-view] port-link-profile name port-link1
[HUAWEI-wlan-port-link-prof-port-link1] lldp tlv-enable basic-tlv management-
address
Related Topics
11.1.17 ap lldp enable
11.1.176 lldp enable
11.1.183 log-record-level
Function
The log-record-level command configures the level for AP logs that need to be backed up.
The undo log-record-level command restores the default level of AP logs that need to be
backed up.
By default, the level of AP logs that need to be backed up is info.
Format
log-record-level { alert | critical | debug | emergency | error | info | notice | warning }
undo log-record-level
Parameters
Parameter Description Value
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
An AP periodically backs up logs to the log server. However, not all the logs need to be
backed up. You can run the log-record-level command to configure the level of logs to be
periodically backed up.
Precautions
The preference order of log levels is emergency, alert, critical, error, warning, notice, info, and
debug.
After you specify the level for AP logs that need to be backed up, all logs of the specified
level or a higher level will be backed up. For example, if you set the level of AP logs that
need to be backed up to critical, the logs of the levels emergency, alert, and critical will be
backed up.
Example
# Set the level of logs that need to be backed up as alert.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] log-record-level alert
Related Topics
11.1.112 display ap-system-profile
11.1.184 log-server
Function
The log-server command configures the log server IP address in the AP system profile and
enables log backup on the AP.
The undo log-server command restores the default configurations.
By default, the log server IP address is not configured in an AP system profile and log backup
is disabled on an AP.
Format
log-server ip-address server-ip-address
undo log-server
Parameters
Parameter Description Value
ip-address Specifies the IPv4 address of the log server. The value is in dotted
server-ip- decimal notation.
address
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
You can run the command to configure the log server IP address in the AP system profile and
enable log backup on the AP. After log backup is enabled, the AP automatically sends logs to
the log server with the specified IP address.
NOTICE
Modifying the attributes of an AP profile changes configurations of all APs using this profile.
Example
# Set the IP address of the log server to 10.0.0.1 and enable log backup on the AP.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] log-server ip-address 10.0.0.1
Function
The low-temperature threshold command sets the lower temperature alarm threshold for
APs.
The undo low-temperature threshold command restores the default lower temperature alarm
threshold for APs.
AP6010SN-GN/AP6010DN-AGN/ -13
AP6310SN-GN/AP7110DN-AGN/
AP7110SN-GN/AP9330DN
AP6510DN-AGN/AP6610DN-AGN/ -43
AP6510DN-AGN-US/AP6610DN-AGN-
US/AP8030DN/AP8130DN/AP9131DN/
AP9132DN
AP5030DN/AP5130DN -28
AP7030DE -23
AD9430DN-24 -3
AD9430DN-12 -13
R230D/R240D 0
AP6050DN/AP7050DE/AP7050DN-E -13
AP4030TN/AP4050DN-E/AP4050DN-HD/ -10
AP6150DN
NOTE
Format
low-temperature threshold threshold
undo low-temperature threshold
Parameters
Parameter Description Value
threshold Specifies the lower The value is an integer that ranges from -70
temperature alarm to 10, in °C.
threshold.
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
You can run this command to set the lower temperature alarm threshold for an AP. When an
AP's temperature exceeds the lower threshold, the AP generates an alarm and a log, and
notifies the AC of the low temperature.
Example
# Set the lower temperature alarm threshold for APs to 5°C.
<HUAWEI> system-view
[HUAWEI] wlan
Related Topics
11.1.112 display ap-system-profile
11.1.186 management-vlan
Function
The management-vlan command configures CAPWAP packets sent from an AP wired
interface to carry a management VLAN tag.
The undo management-vlan command cancels the management VLAN configuration for
CAPWAP packets sent from an AP wired interface.
By default, CAPWAP packets sent from an AP wired interface do not carry a management
VLAN tag.
Format
management-vlan vlan-id
undo management-vlan
Parameters
Parameter Description Value
vlan-id Specifies a management VLAN ID. The value is an integer that ranges
from 1 to 4094.
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
By default, CAPWAP packets sent from an AP wired interface do not carry a management
VLAN tag. In most cases, the access switch interface directly connected to the AP adds the
PVID to the CAPWAP packets as the management VLAN ID.
If the PVID of the access device has been used for other purposes (for example, as the default
VLAN ID of wired users), the PVID cannot be configured as the management VLAN ID on
the access device interface. In this case, configure CAPWAP packets sent from an AP wired
interface to carry the management VLAN tag. The AP then adds the management VLAN ID
to the CAPWAP packets sent to the AC. You only need to configure the access device to
allow the packets carrying the management VLAN ID to pass.
Precautions
On a Mesh network, ensure that CAPWAP packets sent from all APs carry the same
management VLAN. Otherwise, MPs cannot go online.
In the following precautions, packets sent from an AP wired interface refer to CAPWAP
packets.
Example
# Configure CAPWAP packets sent from an AP wired interface to carry management VLAN
2 in the AP system profile view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] management-vlan 2
Warning: This operation will cause AP reset. Continue? [Y/N]:y
Related Topics
11.1.112 display ap-system-profile
11.8.15 vlan pvid (AP wired port profile view)
11.8.17 vlan (AP wired port profile view)
Function
The max-sta-number command sets the maximum number of successfully associated STAs
on a VAP.
The undo max-sta-number command restores the default maximum number of successfully
associated STAs on a VAP.
Format
max-sta-number max-sta-number
undo max-sta-number
Parameters
Parameter Description Value
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
More access users on a VAP indicate fewer network resources that each user can occupy. To
ensure Internet experience of users, you can run the max-sta-number command to set a
proper maximum number of successfully associated STAs on a VAP.
Configuration Impact
After the number of successfully associated STAs on a VAP reaches the maximum, new users
cannot connect to the VAP.
Precautions
The maximum number of successfully associated STAs on a specified VAP refers to the
maximum number of successfully associated STAs on a VAP of a single AP.
Example
# Set the maximum number of successfully associated STAs on a VAP to 50.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] max-sta-number 50
Warning: This action may cause service interruption. Continue?[Y/N]y
Function
The mdns centralized-control enable command enables tunnel forwarding for MDNS
packets.
The undo mdns centralized-control enable command disables tunnel forwarding for MDNS
packets.
Format
mdns centralized-control enable
Parameters
None
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
MDNS packets are encapsulated into Layer 2 packets before they are forwarded. When Layer
3 networking is deployed between APs and the AC, and direct forwarding is configured on
the APs, the MDNS packets cannot be forwarded at Layer 3. You can run the mdns
centralized-control enable command to enable the function of forwarding MDNS packets
over tunnels, so that the APs forward MDNS packets over tunnels to the AC.
Precautions
By default, tunnel forwarding for HTTP, EAP, and WAI packets is enabled. The default
setting cannot be modified.
Example
# Enable tunnel forwarding for MDNS packets.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] mdns centralized-control enable
Related Topics
11.1.143 display vap-profile
Function
The memory-usage threshold command configures a memory usage alarm threshold for
APs.
The undo memory-usage threshold command restores the default memory usage alarm
threshold.
By default, the memory usage alarm threshold on an AP is 80.
Format
memory-usage threshold threshold
undo memory-usage threshold
Parameters
Parameter Description Value
threshold Specifies the memory usage alarm threshold of The value is an integer
an AP. that ranges from 30 to
100.
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
You can run the memory-usage threshold command to configure the memory usage alarm
threshold in the AP system profile view. The configuration is delivered to all APs using the
profile.
l When the memory usage of an AP exceeds the alarm threshold, the AP sends an alarm
message to the AC, and the AC displays the alarm information.
l When the memory usage of an AP falls below the alarm threshold, the AP sends a clear
alarm message to the AC, and the AC displays the clear alarm information.
Example
# Set the memory usage alarm threshold of AP 0 to 60.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] memory-usage threshold 60
Related Topics
11.1.112 display ap-system-profile
11.1.190 mtu
Function
The mtu command sets the maximum transmission unit (MTU) value for the management
VLANIF on an AP.
The undo mtu command restores the default MTU value for the management VLANIF on an
AP.
By default, the MTU value of the management VLANIF on an AP is 1500 bytes.
Format
mtu mtu-value
undo mtu
Parameters
Parameter Description Value
mtu-value Specifies the maximum size of packets sent The value is an integer
and received on the management VLANIF. that ranges from 1500
to 1700, in bytes.
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
The MTU value is the maximum size of packets sent and received on the management
VLANIF of an AP.
NOTICE
Modifying the attributes of an AP system profile changes configurations of all APs using this
profile.
Precautions
l DHCP packets cannot be fragmented. When the MTU value set using the mtu command
is smaller than the DHCP packet length, DHCP packets cannot be forwarded. Therefore,
set a larger MTU value.
l If the MTU value is smaller than the DHCP packet length, the AP may be disconnected.
In this case, restart the AP.
Example
# Set the MTU value of the management VLANIF on an AP to 1700 bytes.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] mtu 1700
Related Topics
11.1.112 display ap-system-profile
Format
mu-mimo enable
undo mu-mimo enable
Parameters
None
Views
SSID profile view, WDS profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Carrier sense multiple access with collision avoidance (CSMA-CA) allows an air interface
channel to be occupied only by one STA, and other STAs need to back off. After MU-MIMO
is enabled, STAs supporting MU-MIMO can form an MU group to simultaneously receive
downlink data from the same air interface channel, improving channel efficiency and overall
downlink throughput.
Precautions
l VAPs of only the AP4050DN-E, AP4050DN-HD, AP6050DN, AP6150DN, AP7050DE,
and AP7050DN-E support MU-MIMO on 5 GHz radios.
l In WDS scenarios, ensure that the number of spatial streams on STA VAPs is smaller
than that on AP VAPs. Otherwise, MU-MIMO cannot take effect. For example, if STA
VAPs and AP VAPs are both configured with three spatial streams, an AP VAP can
communicate with only one STA VAP even if MU-MIMO has been enabled.
l MU-MIMO is not supported on a Mesh network.
l The smart antenna function cannot take effect if beamforming or MU-MIMO has been
configured.
Example
# Enable MU-MIMO.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name test
[HUAWEI-wlan-ssid-prof-test] mu-mimo enable
Related Topics
11.1.261 vht mcs-map
11.1.192 multicast-rate
Function
The multicast-rate command configures the multicast rate of wireless packets in a radio
profile.
The undo multicast-rate command restores the default multicast rate of wireless packets in a
radio profile.
By default, the multicast rate of wireless packets is 11 Mbps in a 2G radio profile and 6 Mbps
in a 5G radio profile.
Format
multicast-rate multicast-rate
undo multicast-rate
Parameters
Parameter Description Value
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
After this command is run, the multicast rate of wireless packets is the configured value and
irrelevant to the STA access mode.
If the configured multicast rate is not in the basic rate set and the STA does not support this
rate, the STA cannot receive multicast data.
If you run the radio-type dot11b command in the 2G radio profile view to set the radio type
to dot11b, and the 2G radio profile is applied to an AP, multicast-rate that takes effect on the
2 GHz radio of the AP is fixed as 1 Mbps, and multicast-rate configured in the 2G radio
profile view does not take effect on the AP.
Example
# Set the multicast rate of wireless packets to 54 Mbps in the 2G radio profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] multicast-rate 54
Related Topics
11.1.122 display radio-2g-profile
11.1.123 display radio-5g-profile
11.1.213 radio-type (2G radio profile view)
Format
poe af-inrush enable
undo poe af-inrush enable
Parameters
None.
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenarios
The AP that conforms to IEEE 802.3at cannot power non-IEEE standard PDs that do not
support inrush current. To power these PDs, configure the AP to provide power in
conformance to IEEE 802.3af. When all PDs connected to the AP are IEEE standard-
compliant PDs, run the undo poe af-inrush enable command to cancel the configuration.
Precautions
l The poe af-inrush enable command does not take effect on an interface if the 11.1.195
poe force-power (AP wired port link profile view) command has been executed on the
interface.
l After this command is configured, the AP cannot provide power for IEEE 802.3at-
compliant PDs.
l This command takes effect only on the AD9430DN-24, and AD9430DN-12.
Configuration Impact
After running the poe af-inrush enable command, remove the non-IEEE 802.3at PDs and
then install them so that the PDs can be powered on.
Example
# Set the PoE power supply standard to IEEE 802.3 af for a AP.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name apsys1
[HUAWEI-wlan-ap-system-prof-apsys1] poe af-inrush enable
Related Topics
11.1.112 display ap-system-profile
Format
poe disable
undo poe disable
Parameters
None
Views
AP wired port link profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenarios
Before using a AP to provide power for PDs connected to its interfaces, ensure that the PoE
function is enabled on the interfaces. To enable the PoE function on an interface, run the undo
poe disable command.
The power-on and power-off of interfaces is determined by the PoE power and interface
power priority. When the PoE power is sufficient, the device does not power off one interface.
To stop providing power for one PD, run the poe disable command.
Precautions
The AP only supports PoE power supply on downlink interfaces and does not support PoE
power supply on uplink interfaces.
Example
# Disable the PoE function on a AP's interface.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] port-link-profile name port-link1
[HUAWEI-wlan-port-link-prof-port-link1] poe disable
Related Topics
11.1.119 display port-link-profile
Function
The poe force-power command enables forcible PoE power supply on an interface.
The undo poe force-power command disables forcible PoE power supply on an interface.
Format
poe force-power
Parameters
None
Views
AP wired port link profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If the power of the system is sufficient, you can run the poe force-power command on the
interface connected to PDs when the PSE cannot detect the PDs.
Precautions
Example
# Enable forcible PoE power supply on a AP's interface.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] port-link-profile name port-link1
[HUAWEI-wlan-port-link-prof-port-link1] poe force-power
Related Topics
11.1.119 display port-link-profile
Function
The poe high-inrush enable command configures an interface to allow high inrush current
during power-on.
The undo poe high-inrush enable command configures an interface not to allow high inrush
current during power-on.
Format
poe high-inrush enable
Parameters
None.
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
High inrush current is generated when a non-standard PD is powered on. In this case, the PSE
cuts off the power of the PD to protect itself. If the PSE is required to provide power for the
PD, the PSE must allow high inrush current.
Precautions
Example
# Enable the AP to allow high inrush current during power-on.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name apsys1
[HUAWEI-wlan-ap-system-prof-apsys1] poe high-inrush enable
Related Topics
11.1.112 display ap-system-profile
11.1.197 poe legacy enable (AP wired port link profile view)
Function
The poe legacy enable command enables a AP to check compatibility of the connected PDs.
The undo poe legacy enable command disables a AP from checking compatibility of the
connected PDs.
Format
poe legacy enable
Parameters
None
Views
AP wired port link profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When compatibility check is enabled, a AP (PSE) can detect and provide power for the PDs
incompliant with IEEE 802.3af or 802.3at. If compatibility check is disabled, the AP does not
identify or provide power for these PDs.
Precautions
Example
# Enable a AP to check compatibility of the connected PDs.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] port-link-profile name port-link1
[HUAWEI-wlan-port-link-prof-port-link1] poe legacy enable
Related Topics
11.1.119 display port-link-profile
Function
The poe max-power command sets the maximum output power of a AP.
The undo poe max-power command restores the maximum output power of a AP to the
default value.
By default, the maximum output power of the AP is the total power that the PoE power
supply provides for PDs.
Format
poe max-power max-power
Parameters
Parameter Description Value
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenarios
By default, the system automatically obtains the maximum PoE power supported by the AP.
You can run the poe max-power command to set the maximum output power to ensure stable
PoE power supply when the total power of the AP is insufficient.
Precautions
If the maximum output power that you set is smaller than the total power required by PDs,
PDs with lower priority are powered off.
The configured maximum output power must be smaller than the total power that the PoE
power supply provides for PDs.
This command takes effect only on the AD9430DN-24, and AD9430DN-12.
Example
# Set the maximum output power of a AP to 20000 mW.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name apsys1
[HUAWEI-wlan-ap-system-prof-apsys1] poe max-power 20000
Related Topics
11.1.112 display ap-system-profile
Function
The poe power-reserved command configures the percentage of the reserved PoE power
against the total PoE power on a AP.
The undo poe power-reserved command restores the default percentage of the reserved PoE
power against the total PoE power on a AP.
By default, the percentage of the reserved PoE power against the total PoE power on a AP is
0%.
Format
poe power-reserved power-reserved
undo poe power-reserved
Parameters
Parameter Description Value
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenarios
The AP can dynamically allocate power to each interface according to the power consumption
of each interface. The power consumption of a PD keeps changing when the PD is running.
The system periodically calculates the total power consumption of all the PDs. If the total
power consumption exceeds the upper threshold of the AP, the system cuts off the power of
the PDs on the interfaces of low priority to ensure that other PDs can run normally.
Sometimes, however, the power consumption increases sharply and the available power of the
system cannot support the burst increase of power. At this time, the system has not calculated
and found that the total power consumption exceeded the upper threshold; therefore, the
system does not cut off power low-priority interfaces in time. As a result, the PoE power
supply is shut down for overload protection, and all PDs are powered off.
This problem can be solved by running the poe power-reserved command to set proper
reserved power. When there is a burst increase in power consumption, the reserved power can
support the system running. Then the system has time to power off interfaces of low priority
to ensure stable running of other PDs.
Precautions
You can set the maximum output power of a AP using the 11.1.198 poe max-power (AP
system profile view) command. The available PoE power is the configured maximum output
power. If no maximum output power is configured, the available PoE power is the total power
provided by the PoE power supply.
Example
# Set the percentage of reserved PoE power to the total PoE power to 10%.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name apsys1
[HUAWEI-wlan-ap-system-prof-apsys1] poe power-reserved 10
Related Topics
11.1.112 display ap-system-profile
11.1.198 poe max-power (AP system profile view)
Function
The poe power-threshold command sets the alarm threshold of the PoE power consumption
percentage.
The undo poe power-threshold command restores the default alarm threshold of the PoE
power consumption percentage.
By default, the alarm threshold is 100%. That is, an alarm is generated when the consumed
power accounts for 100% of the total power.
Format
poe power-threshold threshold-value
undo poe power-threshold
Parameters
Parameter Description Value
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The poe power-threshold command sets the alarm threshold of the PoE power consumption
percentage. If the total PoE power is 369.6 W and the alarm threshold is 90%, an alarm is
generated when the power consumption is greater than 332.64 W. When the power
consumption falls below 332.64 W, the alarm is cleared.
Precautions
Example
# Set the alarm threshold of the PoE power consumption percentage to 80%.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name apsys1
[HUAWEI-wlan-ap-system-prof-apsys1] poe power-threshold 80
Related Topics
11.1.112 display ap-system-profile
Function
The poe power-off time-range command makes a configured PoE power-off time range
effective on an interface.
The undo poe power-off time-range command makes a configured PoE power-off time
range ineffective on an interface.
Format
poe power-off time-range time-range-name
Parameters
Parameter Description Value
Views
AP wired port link profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The poe power-off time-range command makes a PoE power-off time range set in the
system view effective on an interface. If the current time is within the specified time range,
the PD connected to the interface cannot be powered on.
The undo poe power-off time-range command cancels the configuration. The time range
does not take effect on the PD connected to the interface; however, the configuration of the
time range is still saved.
Pre-configuration Tasks
Before running the poe power-off time-range command, you must ensure a PoE power-off
time range has been configured through running the time-range command in the system view.
Precautions
Example
# Set a PoE power-off time range from 10:00 am to 11:00 am.
<HUAWEI> system-view
[HUAWEI] time-range PoE 10:00 to 11:00 daily
[HUAWEI] wlan
[HUAWEI-wlan-view] port-link-profile name port-link1
[HUAWEI-wlan-port-link-prof-port-link1] poe power-off time-range PoE
Related Topics
11.1.119 display port-link-profile
Function
The poe priority command sets the power priority of a PoE interface.
The undo poe priority command restores the default power priority of a PoE interface.
Format
poe priority { critical | high | low }
Parameters
Parameter Description Value
Views
AP wired port link profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When the output power of a device is insufficient, the device provides power for the
interfaces of the higher power supply priorities first and cuts off power of the interfaces of the
lower power supply priorities. If all the interfaces are of the same priority, the power supply
priority of the interface with a smaller interface number is higher.
Precautions
This command takes effect only on the AD9430DN-24, and AD9430DN-12.
Example
# Set the power priority of a AP's interface to Critical.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] port-link-profile name port-link1
[HUAWEI-wlan-port-link-prof-port-link1] poe priority critical
Related Topics
11.1.119 display port-link-profile
Format
port-link-profile name profile-name
undo port-link-profile { name profile-name | all }
Parameters
Parameter Description Value
name profile- Specifies the name of an AP wired port link The value is a string of
name profile. 1 to 35 case-insensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
An AP wired port link profile offers link-layer management and configuration on AP's wired
interfaces.
Follow-up Procedure
After you create an AP wired port link profile, run the 11.1.204 port-link-profile (AP wired
port profile view) command to bind it to an AP wired port profile and then run the 11.1.266
wired-port-profile (AP group view and view) command to bind the AP wired port profile to
an AP or AP group. In this way, the AP wired port link profile can take effect.
Precautions
Example
# Create the AP wired port link profile port-link1 and display the AP wired port link profile
view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] port-link-profile name port-link1
[HUAWEI-wlan-port-link-prof-port-link1]
Related Topics
11.1.119 display port-link-profile
11.1.204 port-link-profile (AP wired port profile view)
Function
The port-link-profile command binds an AP wired port link profile to an AP wired port
profile.
The undo port-link-profile command unbinds an AP wired port link profile from an AP
wired port profile.
By default, the AP wired port link profile default is bound to an AP wired port profile.
Format
port-link-profile profile-name
undo port-link-profile
Parameters
Parameter Description Value
profile-name Specifies the name of an AP wired port link The AP wired port link
profile. profile must exist.
Views
AP wired port profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After you create an AP wired port link profile using the 11.1.203 port-link-profile (WLAN
view) command, bind it to an AP wired port profile so that the AP wired port link profile can
take effect.
Precautions
After an AP wired port link profile is bound to an AP wired port profile, parameter settings in
the AP wired port link profile apply to specified interfaces of all APs using the AP wired port
profile.
Example
# Create the AP wired port link profile port-link1 and bind it to the AP wired port profile
wired-port1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] port-link-profile name port-link1
[HUAWEI-wlan-port-link-prof-port-link1] quit
[HUAWEI-wlan-view] wired-port-profile name wired-port1
[HUAWEI-wlan-wired-port-wired-port1] port-link-profile port-link1
Related Topics
11.1.125 display references port-link-profile
11.1.145 display wired-port-profile
11.1.203 port-link-profile (WLAN view)
11.1.205 probe-response-retry
Function
The probe-response-retry command sets the number of times Probe Response packets are
retransmitted.
The undo probe-response-retry command restores the default number of times Probe
Response packets are retransmitted.
Format
probe-response-retry retry-time
undo probe-response-retry
Parameters
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In high-density wireless scenarios, too many Probe Response frames occupy a large number
of wireless resources. To reduce wireless resource occupation of the frames and , you can run
the probe-response-retry command to set a small number of or forbid Probe Response
packet retransmissions.
Precautions
A small number of Probe Response packet retransmissions may reduce the channel scan
efficiency of some STAs while a large number of Probe Response packet retransmissions may
lower the wireless network performance.
Example
# Set the number of times Probe Response packets are retransmitted to 0.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] probe-response-retry 0
Related Topics
11.1.135 display ssid-profile
11.1.206 provision-ap
Function
The provision-ap command displays the AP provisioning view.
Format
provision-ap
Parameters
None
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
In the AP provisioning view, you can configure provisioning parameters of APs, including the
management VLAN, static IP address, gateway, and AC list, which facilitates remote AP
management on the AC.
Example
# Display the AP provisioning view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] provision-ap
[HUAWEI-wlan-provision-ap]
Related Topics
11.1.120 display provision-ap parameter-list
11.1.207 radio
Function
The radio command displays the radio view.
Format
radio radio-id
Parameters
Parameter Description Value
Views
AP group view, AP view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The radio configuration in the AP group view or AP view takes effect on all radios at the
same time. To perform configuration only on radio 0 or radio 1, enter the view of the
corresponding radio to configure the radio parameters.
Precautions
After running the radio radio-id command in the AP group view to enter the radio view, you
can perform configurations on all specified radios in the AP group; after running the radio
radio-id command in the AP view to enter the radio view, you can perform configurations on
the specified AP radio.
Example
# Display the view of radio 0 on the AP with the ID 0
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-id 0
[HUAWEI-wlan-ap-0] radio 0
[HUAWEI-wlan-radio-0/0]
Related Topics
11.1.83 display ap
Format
radio disable
undo radio disable
Parameters
None
Views
AP radio view, AP group radio view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run this command to enable or disable a specified radio.
If radio calibration is enabled on the AP, coverage hole filling will be triggered after the radio
is disabled for 5 minutes, to fill coverage holes left by the disabled radio.
Precautions
The configuration in the AP radio view has a higher priority than that in the AP group radio
view.
Example
# Disable radio 0 of AP 1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-id 1
[HUAWEI-wlan-ap-1] radio 0
[HUAWEI-wlan-radio-1/0] radio disable
Warning: This action may cause service interruption. Continue?[Y/N]y
Function
The radio-2g-profile command creates a 2G radio profile and displays the 2G radio profile
view, or displays the view of an existing 2G radio profile.
Format
radio-2g-profile name profile-name
Parameters
Parameter Description Value
name profile- Specifies the name of a 2G radio profile. The value is a string of
name 1 to 35 case-insensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A 2G radio profile is used to configure and optimize the 2G radio of an AP, but does not take
effect on the 5G radio. Create a proper radio profile and apply it in the AP view, AP group
view, AP radio view, or AP group radio view. In this way, the AP provides better radio signal
transmit and receive capabilities.
Follow-up Procedure
Run the 11.1.210 radio-2g-profile command to apply the 2G radio profile in the AP view, AP
group view, AP radio view, or AP group radio view so that the 2G radio profile can take
effect.
Precautions
l The 2G radio profile default cannot be deleted.
l The 2G radio profile referenced in the AP view, AP group view, AP radio view, or AP
group radio view cannot be deleted. To delete the 2G radio profile, unbind it in the AP
view, AP group view, AP radio view, or AP group radio view first.
You can run the 11.1.160 frequency command to change the working mode of an AP radio.
Generally, radio 0 of an AP works on the 2.4 GHz frequency band, radio 1 works on the 5
GHz frequency band, and radio 2 of the AP4030TN generally works on the 5 GHz frequency
band. Radio 0 of the AP2010DN, AP4030TN, AP8130DN, and AP8130DN-W can work on
either the 2.4 GHz or 5 GHz frequency band. Radio 2 of the AP4030TN can work on either
the 2.4 GHz or 5 GHz frequency band.
Example
# Create the 2G radio profile radio-profile1 and display the view of the profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name radio-profile1
[HUAWEI-wlan-radio-2g-prof-radio-profile1]
Related Topics
11.1.122 display radio-2g-profile
11.1.211 radio-5g-profile (WLAN view)
11.1.210 radio-2g-profile
Function
The radio-2g-profile command binds a 2G radio profile to a 2G radio.
The undo radio-2g-profile command unbinds a 2G radio profile from a 2G radio.
By default, no 2G radio profile is applied in the AP view and AP radio view, but the 2G radio
profile default is applied to the AP group view and AP group radio view.
Format
radio-2g-profile profile-name { radio { radio-id | all } }
undo radio-2g-profile { radio { radio-id | all } }
radio { radio-id | all } is supported only in the AP group view and AP view.
Parameters
Parameter Description Value
Views
AP group view, AP view, AP radio view, AP group radio view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After you create a 2G radio profile using the 11.1.209 radio-2g-profile (WLAN view)
command, bind it to a 2G radio so that the 2G radio profile can take effect.
Precautions
After a 2G radio profile is applied in the AP group view or AP view, the parameter settings in
the profile take effect on all 2G radios in the AP group or the 2G radio of the AP.
The configuration in the AP view and AP radio view has a higher priority than that in the AP
group view and AP group radio view.
Example
# Create the 2G radio profile radio-profile1 and bind it to AP group group1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name radio-profile1
[HUAWEI-wlan-radio-2g-prof-radio-profile1] quit
[HUAWEI-wlan-view] ap-group name group1
[HUAWEI-wlan-ap-group-group1] radio-2g-profile radio-profile1 radio 0
Related Topics
11.1.111 display ap-group
Format
radio-5g-profile name profile-name
undo radio-5g-profile { name profile-name | all }
Parameters
Parameter Description Value
name profile- Specifies the name of a 5G radio profile. The value is a string of
name 1 to 35 case-insensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A 5G radio profile is used to configure and optimize the 5G radio of an AP, but does not take
effect on the 2G radio. Create a proper radio profile and apply it in the AP view, AP group
view, AP radio view, or AP group radio view. In this way, the AP provides better radio signal
transmit and receive capabilities.
Follow-up Procedure
Run the 11.1.212 radio-5g-profile command to apply the 5G radio profile in the AP view, AP
group view, AP radio view, or AP group radio view so that the 5G radio profile can take
effect.
Precautions
l The 5G radio profile default cannot be deleted.
l The 5G radio profile referenced in the AP view, AP group view, AP radio view, or AP
group radio view cannot be deleted. To delete the 5G radio profile, unbind it in the AP
view, AP group view, AP radio view, or AP group radio view first.
You can run the 11.1.160 frequency command to change the working mode of an AP radio.
Generally, radio 0 of an AP works on the 2.4 GHz frequency band, radio 1 works on the 5
GHz frequency band, and radio 2 of the AP4030TN generally works on the 5 GHz frequency
band. Radio 0 of the AP2010DN, AP4030TN, AP8130DN, and AP8130DN-W can work on
either the 2.4 GHz or 5 GHz frequency band. Radio 2 of the AP4030TN can work on either
the 2.4 GHz or 5 GHz frequency band.
Example
# Create the 5G radio profile radio-profile2 and display the view of the profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-5g-profile name radio-profile2
[HUAWEI-wlan-radio-5g-prof-radio-profile2]
Related Topics
11.1.123 display radio-5g-profile
11.1.209 radio-2g-profile (WLAN view)
11.1.212 radio-5g-profile
Function
The radio-5g-profile command binds a 5G radio profile to a 5G radio.
The undo radio-5g-profile command unbinds a 5G radio profile from a 5G radio.
By default, no 5G radio profile is applied in the AP view and AP radio view, but the 5G radio
profile default is applied to the AP group view and AP group radio view.
Format
radio-5g-profile profile-name { radio { id | all } }
undo radio-5g-profile { radio { id | all } }
radio { id | all } is supported only in the AP group view and AP view.
Parameters
Parameter Description Value
Views
AP group view, AP view, AP radio view, AP group radio view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After you create a 5G radio profile using the 11.1.211 radio-5g-profile (WLAN view)
command, bind it to a 5G radio so that the 5G radio profile can take effect.
Precautions
After a 5G radio profile is applied in the AP group view or AP view, the parameter settings in
the profile take effect on all 5G radios in the AP group or the 5G radio of the AP.
The configuration in the AP view and AP radio view has a higher priority than that in the AP
group view and AP group radio view.
Example
# Create the 5G radio profile radio-profile2 and bind it to AP group group1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-5g-profile name radio-profile2
[HUAWEI-wlan-radio-2g-prof-radio-profile2] quit
[HUAWEI-wlan-view] ap-group name group1
[HUAWEI-wlan-ap-group-group1] radio-5g-profile radio-profile2 radio 1
Related Topics
11.1.111 display ap-group
11.1.127 display references radio-5g-profile
11.1.211 radio-5g-profile (WLAN view)
Function
The radio-type command sets the radio type in a 2G radio profile.
The undo radio-type command restores the default radio type in a 2G radio profile.
By default, the radio type in a 2G radio profile is dot11n.
Format
radio-type { dot11b | dot11g | dot11n }
undo radio-type
Parameters
Parameter Description Value
Views
2G radio profile
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run the radio-type command to set the radio type in a radio profile.
Precautions
If a rate in the basic rate set or supported rate set, or the multicast rate is not supported by the
802.11b protocol, the radio type cannot be set to 80211b.
When the radio type is set to dot11b or dot11g, the function of denying access from non-HT
STAs becomes invalid.
If WDS- or Mesh-enabled radios are configured not to support 802.11n/ac, the air interface
backhaul performance will be degraded.
If you run the radio-type dot11b command in the 2G radio profile view to set the radio type
to dot11b, and the 2G radio profile is applied to an AP, the rates of Beacon frames and
multicast packets that take effect on the 2 GHz radio of the AP are fixed as 1 Mbps, and the
Example
# Set the radio type to dot11g in a 2G radio profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] radio-type dot11g
Related Topics
11.1.51 beacon-2g-rate
11.1.122 display radio-2g-profile
11.1.192 multicast-rate
Function
The radio-type command sets the radio type in a 5G radio profile.
The undo radio-type command restores the default radio type in a 5G radio profile.
Format
radio-type { dot11a | dot11ac | dot11n }
undo radio-type
Parameters
Parameter Description Value
Views
5G radio profile
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run the radio-type command to set the radio type in a radio profile.
Precautions
When the radio type is set to dot11a, the function of denying access from non-HT STAs
becomes invalid.
If the configured radio type is not supported by an AP, the actual radio type supported by the
AP takes effect. For example, if you set the 802.11ac radio type for an 802.11n AP, the
802.11n radio type takes effect on the AP.
If WDS- or Mesh-enabled radios are configured not to support 802.11n/ac, the air interface
backhaul performance will be degraded.
Example
# Set the radio type to dot11n in a 5G radio profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-5g-profile name default
[HUAWEI-wlan-radio-5g-prof-default] radio-type dot11n
Related Topics
11.1.123 display radio-5g-profile
Function
The reach-max-sta hide-ssid disable command disables automatic SSID hiding when the
number of users reaches the maximum.
The undo reach-max-sta hide-ssid disable command enables automatic SSID hiding when
the number of users reaches the maximum.
By default, automatic SSID hiding is enabled when the number of users reaches the
maximum.
Format
reach-max-sta hide-ssid disable
undo reach-max-sta hide-ssid disable
Parameters
None
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
After automatic SSID hiding is enabled, SSIDs are automatically hidden when the number of
users connected to the WLAN reaches the maximum, and SSIDs are unavailable for new
users.
Example
# Disable automatic SSID hiding when the number of users reaches the maximum.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] reach-max-sta hide-ssid disable
Related Topics
11.1.135 display ssid-profile
Format
regulatory-domain-profile name profile-name
undo regulatory-domain-profile { name profile-name | all }
Parameters
Parameter Description Value
name profile- Specifies the name of a regulatory domain The value is a string of
name profile. 1 to 35 case-insensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A regulatory domain profile contains settings of the country code, calibration channel, and
calibration bandwidth, which take effect on APs using the regulatory domain profile.
Follow-up Procedure
Run the 11.1.217 regulatory-domain-profile command to bind the regulatory domain profile
to an AP or AP group so that the regulatory domain profile can take effect.
Precautions
l The regulatory domain profile default cannot be deleted.
l The regulatory domain profile referenced by an AP or AP group cannot be deleted. To
delete the regulatory domain profile, unbind it from the AP or AP group first.
Example
# Create the regulatory domain profile domain1 and display the regulatory domain profile
view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] regulatory-domain-profile name domain1
[HUAWEI-wlan-regulate-domain-domain1]
Related Topics
11.1.133 display regulatory-domain-profile
11.1.217 regulatory-domain-profile
11.1.217 regulatory-domain-profile
Function
The regulatory-domain-profile command binds a regulatory domain profile to an AP or AP
group.
The undo regulatory-domain-profile command unbinds a regulatory domain profile from an
AP or AP group.
By default, the regulatory domain profile default is bound to an AP group, but no regulatory
domain profile is bound to an AP.
Format
regulatory-domain-profile profile-name
undo regulatory-domain-profile
Parameters
Parameter Description Value
Views
AP group view, AP view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After you create a regulatory domain profile using the 11.1.216 regulatory-domain-profile
(WLAN view) command, bind it to an AP or AP group so that the regulatory domain profile
can take effect.
Precautions
After a regulatory domain profile is bound to an AP or AP group, parameter settings in the
regulatory domain profile apply to all APs using the profile.
Example
# Create the regulatory domain profile domain1 and bind it to AP group group1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] regulatory-domain-profile name domain1
[HUAWEI-wlan-regulate-domain-domain1] quit
[HUAWEI-wlan-view] ap-group name group1
[HUAWEI-wlan-ap-group-group1] regulatory-domain-profile domain1
Warning: Modifying the country code will clear channel, power and antenna gain
configurations of the radio and reset the AP. Continu
e?[Y/N]:y
Related Topics
11.1.111 display ap-group
11.1.128 display references regulatory-domain-profile
11.1.216 regulatory-domain-profile (WLAN view)
Format
report-disassoc-request disable
undo report-disassoc-request disable
Parameters
None
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
If a large number of STAs disassociate from the network in a certain time, the APs need to
report lots of disassociation request packets to the AC, impacting the AC performance. To
alleviate the impact on the AC, you can disable APs from reporting disassociation request
packets of STAs to the AC.
Example
# Disable an AP from reporting disassociation request packets of STAs to the AC.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ab
[HUAWEI-wlan-ap-system-prof-ab] report-disassoc-request disable
By default, an AC is disabled from reporting information about STA traffic statistics and
online duration on APs.
Format
report-sta-info enable
undo report-sta-info enable
Parameters
None
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
After an AC is enabled to report information about STA traffic statistics and online duration
on APs, the AC collects and reports the information to the eSight when STAs get offline or
roam within the AC, which facilitates data query on the eSight.
Example
# Enable an AC to report information about STA traffic statistics and online duration on APs.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] report-sta-info enable
Format
reset ap offline-record { all | mac mac-address }
Parameters
Parameter Description Value
mac mac- Clears offline records of the AP with specified The AP's MAC
address MAC address. address must exist.
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To re-collect AP offline records, run this command to clear existing records.
Precautions
The cleared records cannot be restored.
Example
# Clear offline records of all APs.
<HUAWEI> reset ap offline-record all
Related Topics
11.1.93 display ap offline-record
Format
reset ap online-fail-record { all | mac mac-address }
Parameters
Parameter Description Value
mac mac- Clears online failure records of the AP with the The AP's MAC
address specified MAC address. address must exist.
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To re-collect records about AP online failures, run this command to clear existing records.
Precautions
Example
# Clear online failure records of all APs.
<HUAWEI> reset ap online-fail-record all
Related Topics
11.1.94 display ap online-fail-record
Function
The reset ap unauthorized record command clears information about unauthenticated APs.
Format
reset ap unauthorized record
Parameters
None
Views
WLAN view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can run this command to clear information about unauthenticated APs so that removed
APs or unauthenticated APs that are physically disconnected from the AC can be cleared.
This facilitates collecting statistics and confirmation of unauthenticated APs.
Precautions
If an AP physically connects to the AC but has not been authenticated, the AP is added in the
unauthenticated AP list after you run the reset ap unauthorized record command.
Example
# Clear information about unauthenticated APs.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] reset ap unauthorized record
Warning: Clear unauthorized AP record, continue?[Y/N]:y
Related Topics
11.1.103 display ap unauthorized record
Function
The reset channel switch-record command deletes channel switching records on a device.
Format
reset channel switch-record all
Parameters
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can use this command to delete existing channel switching records so that the system can
record new channel switching events.
Precautions
Example
# Delete all channel switching records.
<HUAWEI> reset channel switch-record all
Related Topics
11.1.115 display channel switch-record
Function
The reset mac-address { ap-id | ap-name} command clears all dynamic MAC address
entries on an AP's wired interface.
Format
reset mac-address { ap-id ap-id | ap-name ap-name } interface-type interface-number
Parameters
Parameter Description Value
ap-name ap-name Clears all dynamic MAC The AP name must exist.
address entries on wired
interfaces of the AP with the
specified name.
Views
All views
Default Level
3: Management level
Usage Guidelines
You can run the reset mac-address command clears all dynamic MAC address entries on an
AP's wired interface.
Example
# Clear dynamic MAC address entries on wired interfaces of the AP with ID 1.
<HUAWEI> reset mac-address ap-id 1 ethernet 0
Related Topics
11.1.118 display mac-address { ap-id | ap-name }
Format
reset station assoc-info ap-offline-record { all | { ap-name ap-name | ap-id ap-id } [ radio
radio-id ] }
Parameters
Parameter Description Value
ap-name ap- Clears information about STAs that go online The AP name must
name on the AP with a specified name in fault state. exist.
ap-id ap-id Clears information about STAs that go online The AP ID must exist.
on the AP with a specified ID in fault state.
radio radio-id Deletes information about STAs that connect The radio ID must
to the specified radio of the AP in fault state. exist.
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Before collecting statistics on the STAs that connect to the APs in fault state within a specific
period, run the reset station assoc-info ap-offline-record command to delete the original
STA information.
Prerequisites
The APs in fault state have been enabled to allow access of new STAs using the 11.1.169
keep-service enable allow new-access command.
Function
The deleted STA information cannot be restored. Exercise caution when you run the reset
station assoc-info ap-offline-record command.
Example
# Delete information about all STAs that connect to APs in fault state from the AC.
<HUAWEI> reset station assoc-info ap-offline-record all
Related Topics
11.1.169 keep-service enable allow new-access
11.1.137 display station assoc-info ap-offline-record
Function
The reset station offline-record command deletes STA offline records.
Format
reset station offline-record { all | ap-name ap-name | ap-id ap-id | sta-mac sta-mac }
Parameters
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can use this command to delete existing STA offline records so that the system can record
new STA offline events.
Precautions
The deleted STA offline records cannot be restored.
Example
# Delete all STA offline records.
<HUAWEI> reset station offline-record all
Related Topics
11.1.139 display station offline-record
Format
reset station online-fail-record { all | ap-name ap-name | ap-id ap-id | sta-mac sta-mac-
address }
Parameters
Parameter Description Value
ap-name ap- Clears STA online failure records on the AP The AP name must
name with a specified name. exist.
ap-id ap-id Clears STA online failure records on the AP The AP ID must exist.
with a specified ID.
sta-mac sta- Clears online failure records of the STA with The STA's MAC
mac-address the specified MAC address. address must exist.
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To re-collect records about STA online failures, run this command to clear existing records.
Precautions
The cleared records cannot be restored.
Example
# Clear online failure records of all STAs.
<HUAWEI> reset station online-fail-record all
Related Topics
11.1.138 display station online-fail-record
Function
The reset station statistics command deletes statistics about online STAs.
Format
reset station statistics [ sta-mac sta-mac-address ]
Parameters
Parameter Description Value
sta-mac sta- Specifies the MAC address of an online STA. The STA's MAC
mac-address address must exist.
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Before recollecting statistics about online STAs, run the command to clear the existing
statistics.
Precautions
After the command is run, statistics about online STAs are cleared and cannot be restored.
Example
# Delete statistics about the STA with MAC address 286e-d488-b74f.
<HUAWEI> reset station statistics sta-mac 286e-d488-b74f
Related Topics
11.1.140 display station statistics
Format
reset statistics { ap-name ap-name | ap-id ap-id } ssid ssid
Parameters
Parameter Description Value
ap-name ap-name Clears statistics about the The AP name must exist.
AP with the specified name.
Views
WLAN view
Default Level
3: Management level
Usage Guidelines
You can run the reset statistics command to clear device statistics.
Example
# Clear AP statistics.
<HUAWEI> system view
[HUAWEI] wlan
[HUAWEI-wlan-view] reset statistics ap-name area1
11.1.230 rf-ping
Function
The rf-ping command enables an AC to automatically detect wireless link quality.
Format
rf-ping [ -m time | -c number ] * mac-address
Parameters
Parameter Description Value
-m time Specifies the interval for The value is an integer that ranges from 100 to
sending probe data packets. 10000. in milliseconds. The default value is
1000.
-c number Specifies the number of probe The value is an integer that ranges from 1 to
data packets sent by the AC. 1000. The default value is 1.
mac-address MAC address of a STA. The value is in H-H-H format. An H is a
hexadecimal number of 4 digits.
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Use Scenario
This command allows an AC to automatically detect wireless link quality based on link
parameters, including the signal strength, data rate on air port, and delay in packet
transmission.
Prerequisites
Example
# Configure an AC to automatically detect quality of the link between the AP and STA with
the MAC address 14cf-9202-13dc.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rf-ping 14cf-9202-13dc
Tx rate=52.0 Mbps, Reply from 14cf-9202-13dc: RSSI=-58 dBm time < 1 ms
1 packets transmitted, 1 received, 0% packet loss, time < 1 ms, RSSI -58 dBm
11.1.231 rts-cts-mode
Function
The rts-cts-mode command sets the request to send (RTS)-clear to send (CTS) operation
mode in a radio profile.
The undo rts-cts-mode command restores the default RTS-CTS operation mode in a radio
profile.
By default, the RTS-CTS operation mode is cts-to-self.
Format
rts-cts-mode { cts-to-self | disable | rts-cts }
undo rts-cts-mode
Parameters
Parameter Description Value
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
l In rts-cts mode, when an AP needs to send data to a STA, the AP sends an RTS packet to
all STAs associated with it. After receiving the RTS packet, none of the devices within
the AP's coverage area sends data within a specified period. After the destination STA
receives the RTS packet, it sends a CTS packet. After receiving the CTS packet, none of
the devices within the STA's coverage area sends data within a specified period. Using
the rts-cts mode to avoid conflicts requires two packets (RTS and CTS packets),
increasing packet overhead.
l In cts-to-self mode, when an AP needs to send data to STAs, it sends a CTS packet with
its IP address as the source and destination addresses. Then none of the devices within
the AP's coverage area sends data within a specified period. In cts-to-self mode, an AP
only needs to send a CTS packet to avoid channel conflicts in most scenarios. However,
if there is a device within the STA's coverage area but not within the AP's coverage area,
a channel conflict may still occur.
Compared to the rts-cts mode, the cts-to-self mode reduces the number of control packets sent
on the network. In some situations, however, a channel conflict may still occur when hidden
nodes do not receive the CTS packet from the AP. Therefore, the rts-cts mode is more
effective in avoiding channel conflicts than the cts-to-self mode.
To avoid a data transmission failure caused by channel conflicts, run the rts-cts-mode
command to set the RTS-CTS operation mode in a radio profile according to networking
requirements.
Example
# Set the RTS-CTS operation mode to rts-cts in the 2G radio profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] rts-cts-mode rts-cts
Related Topics
11.1.122 display radio-2g-profile
11.1.123 display radio-5g-profile
11.1.232 rts-cts-threshold
Function
The rts-cts-threshold command sets the RTS-CTS threshold in a radio profile.
The undo rts-cts-threshold command restores the default RTS-CTS threshold in a radio
profile.
Format
rts-cts-threshold rts-cts-threshold
undo rts-cts-threshold
Parameters
Parameter Description Value
rts-cts- Specifies the RTS-CTS threshold. If the length The value is an integer
threshold of a frame to be sent by the MAC Layer that ranges from 64 to
exceeds this threshold, an RTS frame needs to 2347, in bytes.
be sent before this frame.
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
The IEEE 802.11 MAC protocol provides an RTS-CTS handshake protocol to prevent
conflicts between channels and failure to transmit data. STA A sends an RTS frame before
sending data to STA B. STA A can send data after receiving a CTS frame from STA B. If
multiple STAs send RTS frames to a STA, only the STA that receives a CTS frame can send
data, and other STAs have channel conflicts by default and must wait and send RTS frames
again.
If STAs implement RTS-CTS handshakes before sending data, the channel bandwidth is
consumed by too much RTS frames. You can set an RTS threshold to specify the length of
frames to be sent. When the length of frames to be sent by the STA is smaller than the RTS
threshold, no RTS/CTS handshake is implemented.
Example
# Set the RTS-CTS threshold to 2300 bytes in the 2G radio profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] rts-cts-threshold 2300
Related Topics
11.1.122 display radio-2g-profile
11.1.123 display radio-5g-profile
11.1.233 sample-time
Function
The sample-time command sets the sampling interval for an AP.
The undo sample-time command restores the default sampling interval of an AP.
The default sampling interval of an AP is 30s.
Format
sample-time sample-time
undo sample-time
Parameters
Parameter Description Value
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
An AP collects statistics on data including AP-based, radio-based, and STA-based data that
can be viewed using the display command at a specified interval.
Example
# Set the sampling interval to 50s.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] sample-time 50
Related Topics
11.1.112 display ap-system-profile
Function
The service-mode disable command disables the service mode of a VAP.
The undo service-mode disable command enables the service mode of a VAP.
Format
service-mode disable
undo service-mode disable
Parameters
None
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
You can run the service-mode disable command to disable the service mode of a VAP. After
the service mode of a VAP is disabled, the VAP is disabled.
l After the service mode of a VAP is enabled, run the 11.1.50 auto-off service command
to enable the scheduled VAP auto-off function. In the scheduled time, the VAP is
disabled. To enable the VAP, run the undo 11.1.50 auto-off service command.
l After the service mode of a VAP is disabled, the scheduled VAP auto-off function does
not take effect.
Example
# Disable the service mode of VAP vap1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] service-mode disable
Related Topics
11.1.141 display vap
11.1.235 service-vlan
Function
The service-vlan command configures a service VLAN for a VAP.
The undo service-vlan command restores the default service VLAN of a VAP.
By default, VLAN 1 is the service VLAN of a VAP.
Format
service-vlan { vlan-id vlan-id | vlan-pool pool-name }
undo service-vlan
Parameters
Parameter Description Value
vlan-id vlan-id Sets the service VLAN of a VAP to a specific The value is an integer
VLAN. that ranges from 1 to
4094.
vlan-pool pool- Sets the service VLANs of a VAP to all The VLAN pool must
name VLANs in a VLAN pool. exist.
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can specify a specific VLAN as the service VLAN of a VAP or all VLANs in a VLAN
pool as the service VLANs of a VAP. Layer 2 data packets delivered from the VAP to an AP
carry the service VLAN IDs.
l When a specific VLAN is configured as the service VLAN of a VAP, STAs connected to
the VAP join the same VLAN.
l When VLANs in a VLAN pool are configured as service VLANs of a VAP, STAs
connected to the VAP join different VLANs. The VLAN assignment algorithm can be
configured using the 11.1.48 assignment command.
Precautions
Modifying the service VLAN of a VAP will interrupt services of STAs connected to the VAP.
Exercise caution when you run the command.
Example
# Set the service VLAN to VLAN2 in the VAP profile vap1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] service-vlan vlan-id 2
Related Topics
11.1.143 display vap-profile
Format
sftp server disable
undo sftp server disable
Parameters
None
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
You do not need to log in to an SFTP-enabled AP from a user terminal for file management.
Instead, you can log in to the SFTP-enabled AP through SFTP to manage files of the AP.
Example
# Disable the SFTP server function on an AP.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] sftp server disable
Related Topics
11.1.112 display ap-system-profile
Format
short-preamble disable
undo short-preamble disable
Parameters
None
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
The preamble is a section of bits in the header of a data frame. It synchronizes signals
transmitted between the sender and receiver. The preamble is classified into the long preamble
and short preamble. The short preamble ensures better synchronization performance and
therefore is recommended. The long preamble is usually used for compatibility with earlier
network adapters of clients.
Example
# Configure the 2G radio profile default to support the short preamble.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] short-preamble disable
Related Topics
11.1.122 display radio-2g-profile
11.1.123 display radio-5g-profile
Format
shutdown
undo shutdown
Parameters
None
Views
AP wired port link profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If malicious users launch attacks to the network through an AP's wired interface, the
administrator can deliver the shutdown command on the AC to shut down the interface.
Precautions
Data frames may be lost if you shut down an interface during data transmission. Exercise
caution when you use the shutdown command.
The shutdown command still takes effect after an AP is restarted.
The shutdown command takes effect only on AP's wired interfaces working in endpoint or
middle mode but not on those working in root mode.
Example
# Shut down the AP's wired interface GE0.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] port-link-profile name port-link1
[HUAWEI-wlan-port-link-prof-port-link1] shutdown
Warning: The AP may become out of management after the port is disabled (if the
port is an uplink port). Continue?[Y/N]:y
Related Topics
11.1.119 display port-link-profile
Format
snmp-agent trap enable feature-name wlan [ trap-name trap-name ]
Parameters
Views
System view
Default Level
2: Configuration level
Usage Guidelines
You can specify trap-name to enable the trap function for one or more events of the WLAN
module.
Example
# Enable the hwapfaulttrap trap.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name wlan trap-name hwapfaulttrap
11.1.240 ssid
Function
The ssid command sets a service set identifier (SSID) for an SSID profile.
Format
ssid ssid
undo ssid
Parameters
Parameter Description Value
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
An SSID specifies a wireless network. When you search for available wireless networks on
your wireless terminal, SSIDs are displayed to identify the available wireless networks.
Precautions
When you configure an SSID containing Chinese characters, do not delete characters by
pressing the Delete button if you want to modify the SSID that has been entered. Otherwise,
the SSID will contain garbled characters after the configuration. In this case, run the ssid
command to reconfigure the SSID.
Example
# Set the SSID to wlan-net in the SSID profile ssid1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] ssid wlan-net
Warning: This action may cause service interruption. Continue?[Y/N]y
Related Topics
11.1.135 display ssid-profile
The undo ssid-hide enable command disables SSID hiding in Beacon frames in an SSID
profile.
By default, SSID hiding in Beacon frames is disabled in an SSID profile.
Format
ssid-hide enable
undo ssid-hide enable
Parameters
None
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A STA listens on the Beacon frames that an AP periodically sends in each channel to obtain
AP information. The STA can obtain SSIDs from Beacon frames that contain the SSIDs.
The STA can actively send a probe frame with a specified SSID, only the AP with the same
SSID will respond to the STA. If the STA broadcasts a probe frame without an SSID, only the
APs on which SSID hiding in Beacon frames is disabled will respond to the STA.
l After the ssid-hide enable command is used, an AP periodically sends Beacon frames
that contain empty SSID character strings and does not reply to the broadcast probe
requests sent from STAs. The STAs can send probe frames with the AP's SSID to
discover the SSID.
l After the undo ssid-hide enable command is used, an AP periodically sends Beacon
frames that contain valid SSID character strings and replies to the broadcast probe
requests sent from STAs. The STAs can send probe frames with the AP's SSID to
discover the SSID.
Precautions
If the ssid-hide enable or undo ssid-hide enable command is run in the SSID profile after
STAs are associated with an SSID, service interruptions may occur for all online STAs.
Example
# Configure SSID hiding in Beacon frames in the SSID profile ssid1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] ssid-hide enable
Related Topics
11.1.135 display ssid-profile
Function
The ssid-profile command creates an SSID profile and displays the SSID profile view, or
displays the view of an existing SSID profile.
The undo ssid-profile command deletes an SSID profile.
By default, the system provides the SSID profile default.
Format
ssid-profile name profile-name
undo ssid-profile { name profile-name | all }
Parameters
Parameter Description Value
name profile- Specifies the name of an SSID profile. The value is a string of
name 1 to 35 case-insensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
An SSID profile is mainly used to configure STA association and access parameters based on
SSIDs, including the SSID name, STA association timeout period, non-HT STA access, and
QoS CAR.
Follow-up Procedure
Run the 11.1.243 ssid-profile (VAP profile view) command to bind the SSID profile to a
VAP profile and run the 11.1.257 vap-profile command to bind the VAP profile to an AP
group, AP, AP radio, or AP group radio so that the SSID profile can take effect.
Precautions
Example
# Create an SSID profile ssid1 and enter the SSID profile view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1]
Related Topics
11.1.143 display vap-profile
11.1.243 ssid-profile (VAP profile view)
Function
The ssid-profile command binds an SSID profile to a VAP profile.
The undo ssid-profile command unbinds an SSID profile from a VAP profile.
Format
ssid-profile profile-name
undo ssid-profile
Parameters
Parameter Description Value
profile-name Specifies the name of an SSID profile. The SSID profile must
exist.
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After you create an SSID profile using the 11.1.242 ssid-profile (WLAN view) command,
bind it to a VAP profile to make the SSID profile take effect.
Precautions
After an SSID profile is bound to a VAP profile, parameter settings in the SSID profile take
effect on all APs using the VAP profile.
Example
# Create the SSID profile ssid1 and bind it to the VAP profile vap1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] quit
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] ssid-profile ssid1
Related Topics
11.1.129 display references ssid-profile
11.1.143 display vap-profile
11.1.242 ssid-profile (WLAN view)
Function
The sta-ipv6-service enable command enables the function of processing STA IPv6 services.
The undo sta-ipv6-service enable command disables the function of processing STA IPv6
services.
Format
sta-ipv6-service enable
Parameters
None
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Currently, IPv4 WLANs are widely deployed. If many IPv6 packets exist on an IPv4 WLAN,
the performance of the WLAN is affected, and the CPU processing capability of devices will
also be degraded. To improve performance of a pure IPv4 network, you can configure devices
on the network to not process IPv6 packets of STAs.
Precautions
The function of processing STA IPv6 services takes effect only when data packets are
forwarded in direct forwarding mode, and the security policy is open authentication.
After the function of processing STA IPv6 services is disabled:
l The AC and APs do not process IPv6 packets of the wireless side.
l You are not allowed to configure IPv6 functions on the wireless side.
l IPv6 functions of the wireless side are disabled even if they are enabled in default
settings.
Running the ipv6 enable command in the interface view only enables the IPv6 function on
the wired-side interface. The command cannot enable the WLAN module to process STA
IPv6 services. To enable the WLAN module to process IPv6 services of STAs, you need to
run the sta-ipv6-service enable command in the WLAN view.
Example
# Enable the function of processing STA IPv6 services.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] sta-ipv6-service enable
Format
stelnet server disable
undo stelnet server disable
Parameters
None
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
You do not need to log in to an STelnet-enabled AP from a user terminal to maintain it locally.
Instead, you can log in to the STelnet-enabled AP through STelnet to remotely configure and
maintain it.
Example
# Disable the STelnet server function on an AP.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] stelnet server disable
Related Topics
11.1.112 display ap-system-profile
Format
stp auto-shutdown enable
undo stp auto-shutdown enable
Parameters
None
Views
AP wired port profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the STP-triggered port shutdown function is enabled, the AP automatically shuts down
the interface when STP detects a loop. The AP will periodically recovers the interface and re-
executes STP detection. If the loop still exists on the interface, the AP shuts down the
interface again. If the loop is removed, the AP reports a clear alarm to the network
management system (NMS).
Prerequisites
STP has been enabled on the AP's wired interface using the 11.8.13 stp enable (AP wired
port profile view) command.
Precautions
The AP wired interfaces added to an Eth-trunk interface do not support this function.
This function is supported only when a loop exists on the network connected to the AP's
wired port, that is, a port receives STP packets sent by itself.
Example
# Disable the STP-triggered port shutdown function on an AP's wired interface.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wired-port-profile name wired
[HUAWEI-wlan-wired-port-wired] stp auto-shutdown enable
Warning: The AP may become out of management after the STP-triggered port
shutdown function is enabled (if the port is an uplink por
t). Continue?[Y/N]:y
Related Topics
11.1.247 stp auto-shutdown recovery-time (AP wired port profile view)
11.1.145 display wired-port-profile
Function
The stp auto-shutdown recovery-time command sets an auto-recovery interval for an AP's
wired interface on which the STP-triggered port shutdown function is enabled.
The undo stp auto-shutdown recovery-time command restores the default auto-recovery
interval for an AP's wired interface on which the STP-triggered port shutdown function is
enabled.
Format
stp auto-shutdown recovery-time recovery-time
undo stp auto-shutdown recovery-time
Parameters
Parameter Description Value
Views
AP wired port profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the STP-triggered port shutdown function is enabled, the AP automatically shuts down
the interface when STP detects a loop. The AP will periodically recovers the interface and re-
executes STP detection. If the loop still exists on the interface, the AP shuts down the
interface again. If the loop is removed, the AP reports a clear alarm to the network
management system (NMS).
Prerequisites
The STP-triggered port shutdown function has been enabled on the AP's wired interface using
the 11.1.246 stp auto-shutdown enable (AP wired port profile view) command.
Precautions
The AP wired interfaces added to an Eth-trunk interface do not support this function.
Example
# Set the auto-recovery interval to 800s for an AP's wired interface on which the STP-
triggered port shutdown function is enabled.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wired-port-profile name wired
[HUAWEI-wlan-wired-port-wired] stp auto-shutdown recovery-time 800
Related Topics
11.1.246 stp auto-shutdown enable (AP wired port profile view)
11.1.145 display wired-port-profile
Function
The telnet enable command enables Telnet on an AP.
Format
telnet enable
Parameters
None
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
You do not need to log in to a Telnet-enabled AP from a user terminal to maintain it locally.
Instead, you can log in to the Telnet-enabled AP through Telnet to remotely configure and
maintain it.
To improve login security, you are advised to run the undo stelnet server disable command
to enable the STelnet server function and log in to the AP through STelnet.
Example
# Enable Telnet on an AP.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] telnet enable
Related Topics
11.1.112 display ap-system-profile
11.1.245 stelnet server disable
Format
temporary-management enable
undo temporary-management enable
Parameters
None
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
l APs are often installed in hidden places or at high positions. When an AP becomes
faulty, it is inconvenient to connect to the AP through a console port or network cable to
troubleshoot faults.
After the offline management VAP function is enabled for an AP, the AP automatically
generates a management VAP when it becomes faulty. The default SSID and password of
the management VAP are hw_manage_xxxx and hw_manage respectively. xxxx
indicates the last four bits of the AP's MAC address. To troubleshoot the AP fault, the
maintenance personnel only need to set the IP address of the maintenance device to
169.254.2.x/16 (except 169.254.2.1), associate the device to the wireless network with
SSID hw_manage_xxxx, and connect to the AP using Telnet. This prevents complex
operations.
l After the antenna alignment VAP function is enabled for an AP, the AP automatically
generates an antenna alignment VAP when it works properly. The default SSID and
password of the management VAP are hw_manage_xxxx and hw_manage respectively.
xxxx indicates the last four bits of the AP's MAC address. You can associate the mobile
phone on which the antenna alignment APP is installed to the wireless network with
SSID hw_manage_xxxx and use the phone to receive packets sent by the antenna
alignment VAP to obtain RSSI information.
Precautions
l After the offline management VAP and antenna alignment VAP functions are enabled,
the administrator needs to change the SSIDs and passwords of the offline management
VAP and antenna alignment VAP. Using the default values brings security threats. Any
wireless user may use the default SSIDs and passwords to log in to the offline AP and
perform unauthorized operations or receive packets sent by the antenna alignment APP.
In actual applications, the maintenance personnel may enable the offline management
VAP and antenna alignment VAP functions to facilitate AP maintenance. Using the
default offline management VAP and antenna alignment VAP is not recommended. To
ensure security, the administrator needs to configure a secure VAP profile, set new SSIDs
and passwords, and run the temporary-management enable command in the VAP
profile view to specify the VAPs generated after the VAP profile is bound to an AP group
or AP as the offline management VAP and antenna alignment VAP to replace the default
offline management VAP and antenna alignment VAP.
l The offline management VAP takes effect only when an AP goes offline unexpectedly.
l The offline management VAP function does not take effect on 4.9 GHz radios.
l Before using the offline management VAP function, ensure that the AP has enabled with
Telnet services.
l The antenna alignment VAP is automatically deleted 24 hours after it is created. If you
want to use an antenna alignment VAP after the deletion, run the undo temporary-
management enable and the temporary-management enable commands in the AP
profile view in succession to create a new antenna alignment VAP.
l After the offline management VAP function is enabled, an RU automatically generates
an offline management VAP when it is disconnected from the central AP. Packets of the
offline management VAP are only processed on the RU and will not be forwarded to the
central AP. If the link between the central AP and AC is disconnected, all online RUs on
the central AP will automatically generate an offline management VAP, and send packets
of the VAPs to the central AP for processing. The central AP does not have radios and
therefore do not generate an offline management VAP.
Example
# Enable the offline management VAP and antenna alignment VAP functions.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name apsys1
[HUAWEI-wlan-ap-system-prof-apsys1] temporary-management enable
Related Topics
11.1.112 display ap-system-profile
11.1.250 temporary-management enable (VAP profile view)
Function
The temporary-management enable command configures a VAP as the offline management
VAP or antenna alignment VAP.
The undo temporary-management enable command restores a VAP to the default setting.
By default, a VAP is a service VAP.
Format
temporary-management enable
undo temporary-management enable
Parameters
None
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
l After the offline management VAP function is enabled using the temporary-
management enable command in the AP system profile view, an AP automatically
generates a management VAP when it becomes faulty. The default SSID and password of
the management VAP are hw_manage_xxxx and hw_manage respectively. xxxx
indicates the last four bits of the AP's MAC address. The maintenance personnel can
associate the maintenance device to the default VAP and log in to the AP using Telnet to
troubleshoot the fault. However, using the default management VAP brings security
risks. Any wireless user may use the default SSID and password to log in to the offline
AP and perform unauthorized operations.
l After the antenna alignment VAP function is enabled using the temporary-management
enable command in the AP system profile view, an AP automatically generates an
antenna alignment VAP when it works properly. The default SSID and password of the
management VAP are hw_manage_xxxx and hw_manage respectively. xxxx indicates
the last four bits of the AP's MAC address. Using the default antenna alignment VAP
also brings security risks.
To improve security of the offline management VAP and antenna alignment VAP, bind a
security profile of a high security level to a VAP profile, set new SSIDs and passwords,
configure the VAPs generated by the VAP profile as the offline management VAP and antenna
alignment VAP, and bind the VAP profile to an AP group or AP to replace the default offline
management VAP and antenna alignment VAP.
Follow-up Procedure
Run the temporary-management enable command to enable the offline management VAP
and antenna alignment VAP functions in the AP system profile view to make the offline
management VAP and antenna alignment VAP in the VAP profile take effect.
Precautions
l If the VAPs are configured as the offline management VAP and antenna alignment VAP
in a VAP profile, the security profile referenced by the VAP profile supports only the
WEP or WPA/WPA2 PSK security policy.
l If the VAPs are configured as the offline management VAP and antenna alignment VAP
in a VAP profile, VAPs generated by the VAP profile cannot be used as service VAPs for
service transmission.
l The offline management VAP and antenna alignment VAP cannot be modified. To
modify the VAPs, delete them first, and then modify the VAP attributes in the VAP
profile view.
l The offline management VAP function does not take effect on 4.9 GHz radios.
l The offline management VAP function and service holding upon CAPWAP link
disconnection are mutually exclusive. When the two functions are configured at the same
time, the offline management VAP function cannot take effect.
Example
# Configure VAPs generated by VAP profile vap1 as the offline management VAP and
antenna alignment VAP.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] temporary-management enable
Related Topics
11.1.112 display ap-system-profile
11.1.249 temporary-management enable (AP system profile view)
Function
The traffic-optimize command sets the maximum volume of broadcast, multicast, or
unknown unicast traffic on an AP's wired interface.
The undo traffic-optimize command restores the default maximum volume of broadcast,
multicast, or unknown unicast traffic on an AP's wired interface.
By default, the volume of broadcast, multicast, or unknown unicast traffic is not suppressed
on an AP's wired interface.
Format
traffic-optimize { broadcast-suppression | multicast-suppression | unicast-suppression }
packets packets-rate
undo traffic-optimize { broadcast-suppression | multicast-suppression | unicast-
suppression }
Parameters
Parameter Description Value
Views
AP wired port profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a large number of broadcast, multicast, and unknown unicast packets are transmitted on
a network, a lot of network resources are occupied, and services on the network are affected.
When the traffic volume of broadcast, multicast, and unknown unicast packets reaches the
maximum on an AP's wired interface, the system discards excess packets to control the traffic
volume in a proper range and prevent flooding attacks.
Follow-up Procedure
Bind the AP wired port profile to an AP group or AP.
Precautions
The uplink interfaces of RUs do not support this command.
Example
# Set the maximum broadcast traffic volume that can be received on an AP's wired interface
to 21600 pps.
<HUAWEI> system-view
[HUAWEI] wlan
Related Topics
11.1.145 display wired-port-profile
Function
The type command sets the type for a VAP.
Format
type { ap-management | service }
undo type
Parameters
Parameter Description Value
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
l If the type of a VAP is set to service, STAs connected to the VAP can only access
network resources but not APs. Service VAPs are used in regular WLAN deployment
scenarios.
l If the type of a VAP is set to ap-management, STAs connected to the VAP can only
access APs but not network resources. AP management VAPs are used in STA access
and AP management scenarios.
Precautions
After the VAP type is configured in the VAP profile view, the VAPs generated by the VAP
profile use the configured VAP type. The new VAP type will overwrite the old one.
If the type of a VAP is AP management, the VAP does not support portal, MAC address and
802.1x authentication using an external server.
After the VAP type is set to management AP, configure an IP address in the same network
segment as the AP for a STA, so that the STA can access the AP.
Example
# Create the VAP profile vap1 and set the VAP type to AP management VAP.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] type ap-management
Related Topics
11.1.143 display vap-profile
Format
u-apsd enable
undo u-apsd enable
Parameters
None
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
U-APSD is a new energy saving mode defined for WMM, which can improve the energy-
saving capability of STAs.
If some STAs on the network do not support the U-APSD function, disable the U-APSD
function.
Precautions
The U-APSD function takes effect only when WMM is enabled.
Example
# Enable the U-APSD function.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] u-apsd enable
Related Topics
11.1.135 display ssid-profile
11.1.254 undo ap
Function
The undo ap command deletes an AP.
Format
undo ap { ap-name ap-name | ap-id ap-list | ap-mac ap-mac | ap-group group-name | all }
Parameters
Parameter Description Value
ap-name ap- Deletes the AP with the specified AP name. The AP name must
name exist.
ap-id ap-list Deletes APs with the specified IDs in a batch. The value is a string of
1 to 255 characters.
When multiple APs are
selected, use commas
(,) or hyphens (-) to
separate AP IDs. For
example, 5,8,10-13,20
indicates the list of
APs with IDs 5, 8, 10,
11, 12, 13, and 20.
ap-mac ap- Deletes the AP with the specified MAC The AP's MAC
mac address. address must exist.
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Application Scenario
If you do not want a specified AP to go online on the AC, run the command to delete the AP
from the AC. After the AP is deleted, the AP goes offline from the AC.
Configuration Impact
Deleting an AP will interrupt services of STAs connected to the AP.
Precautions
If an AP is upgraded, in standby state, or the ap-ping command is executed, the AP cannot be
deleted.
Example
# Delete the AP named Area_1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] undo ap ap-name Area_1
Warning: Deleting the AP will interrupt user services. Continue?[Y/N]:y
Related Topics
11.1.83 display ap
Format
utmost-power disable
undo utmost-power disable
Parameters
None
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The command takes effect only for the country code CN. You can use the command to
configure a radio to send packets at maximum power supported by the radio or maximum
power allowed by the country code. After a radio is disabled from sending packets at
maximum power, the radio uses the maximum power allowed by the country code to send
packets.
Except the country code CN, a radio can only send packets using the maximum power
allowed by the country codes.
Precautions
Only radios of the AD9430DN-24 (including the mapping RUs), AD9430DN-12 (including
the mapping RUs), AP5030DN, AP5130DN, AP8030DN, AP8130DN, AP7030DE,
AP9330DN, AP2030DN, AP4030DN, AP4130DN, AP9131DN, AP9132DN, AP4030TN,
AP4050DN-E, AP4050DN-HD, AP6050DN, AP6150DN, AP7050DN-E, AP7050DE can
send packets at maximum power.
Example
# Disable radios from sending packets at maximum power.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] utmost-power disable
Related Topics
11.1.122 display radio-2g-profile
11.1.123 display radio-5g-profile
Format
vap-profile name profile-name
Parameters
Parameter Description Value
name profile- Specifies the name of a VAP profile. The value is a string of
name 1 to 35 case-insensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a radio profile is applied in the AP group view, AP view, AP radio view, or AP group
radio view, the AP can transmit and receive radio signals. After a VAP profile is applied in the
AP group view, AP view, AP radio view, or AP group radio view, VAPs are generated and
provide wireless access services for STAs. You can configure parameters in the VAP profile to
enable APs to provide different wireless services.
Follow-up Procedure
Run the 11.1.257 vap-profile command to apply the VAP profile in the AP group view, AP
view, AP radio view, or AP group radio view so that the VAP profile can take effect.
Precautions
Example
# Create a VAP profile vap1 and enter the VAP profile view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1]
Related Topics
11.1.143 display vap-profile
11.1.257 vap-profile
11.1.257 vap-profile
Function
The vap-profile command binds a VAP profile to a radio.
The undo vap-profile command unbinds a VAP profile from a radio.
By default, no VAP profile is bound to a radio.
Format
vap-profile profile-name wlan wlan-id { radio { radio-id | all } }
undo vap-profile profile-name wlan wlan-id { radio { radio-id | all } }
radio { radio-id | all } is supported only in the AP group view and AP view.
Parameters
Parameter Description Value
profile-name Specifies the name of a VAP profile. The VAP profile must
exist.
Views
AP group view, AP view, AP radio view, AP group radio view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After you create a VAP profile using the 11.1.256 vap-profile (WLAN view) command, bind
it to a radio so that the VAP profile can take effect.
Precautions
After a VAP profile is bound to a radio, parameter settings in the VAP profile apply to the
radio using the profile.
Example
# Create the VAP profile vap1 and bind it to AP group group1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] quit
[HUAWEI-wlan-view] ap-group name group1
[HUAWEI-wlan-ap-group-group1] vap-profile vap1 wlan 1 radio 0
Related Topics
11.1.111 display ap-group
11.1.130 display references vap-profile
11.1.256 vap-profile (WLAN view)
Function
The vht a-mpdu max-length-exponent command sets the the maximum length of an
aggregated MPDU (A-MPDU) on the 802.11ac radio. MPDU stands for MAC protocol data
unit.
The undo vht a-mpdu max-length-exponent command restores the maximum length of an
A-MPDU on the 802.11ac radio to the default value.
By default, the index for the maximum length of an A-MPDU is 7. The maximum length of
the A-MPDU is 1048575 bytes.
NOTE
Currently, only the AD9430DN-24 (including the mapping RUs), AD9430DN-12 (including the mapping
RUs), AP5030DN, AP5130DN, AP8030DN, AP8130DN, AP7030DE, AP9330DN, AP2030DN, AP4030DN,
AP4130DN, AP9131DN, AP9132DN, AP4030TN, AP4050DN-E, AP4050DN-HD, AP6050DN,
AP6150DN, AP7050DN-E, AP7050DE support 802.11ac.
Format
vht a-mpdu max-length-exponent max-length-exponent-index
Parameters
Parameter Description Value
max-length- Indicates the index for the maximum length of The value is an integer
exponent-index the A-MPDU. that ranges from 0 to 7.
l 0: indicates that the
maximum length of
the A-MPDU is
8191 bytes.
l 1: indicates that the
maximum length of
the A-MPDU is
16383 bytes.
l 2: indicates that the
maximum length of
the A-MPDU is
32767 bytes.
l 3: indicates that the
maximum length of
the A-MPDU is
65535 bytes.
l 4: indicates that the
maximum length of
the A-MPDU is
131071 bytes.
l 5: indicates that the
maximum length of
the A-MPDU is
262143 bytes.
l 6: indicates that the
maximum length of
the A-MPDU is
524287 bytes.
l 7: indicates that the
maximum length of
the A-MPDU is
1048575 bytes.
Views
5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
To reduce costs, 802.11ac uses frame aggregation technology that aggregates two or more
frames into an A-MPDU to transmit.
Example
# Set the index of the maximum length of the A-MPDU to 2 in the 5G radio profile default.
The index 2 corresponds to a maximum length of 32767 bytes.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-5g-profile name default
[HUAWEI-wlan-radio-5g-prof-default] vht a-mpdu max-length-exponent 2
Related Topics
11.1.123 display radio-5g-profile
Function
The vht a-msdu enable command enables the function of sending 802.11 frames in A-MSDU
mode.
The undo vht a-msdu enable command disables the function of sending 802.11 frames in A-
MSDU mode.
NOTE
Currently, only the AD9430DN-24 (including the mapping RUs), AD9430DN-12 (including the mapping
RUs), AP5030DN, AP5130DN, AP8030DN, AP8130DN, AP7030DE, AP9330DN, AP2030DN, AP4030DN,
AP4130DN, AP9131DN, AP9132DN, AP4030TN, AP4050DN-E, AP4050DN-HD, AP6050DN,
AP6150DN, AP7050DN-E, AP7050DE support 802.11ac.
Format
vht a-msdu enable
Parameters
None
Views
5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Aggregated MAC Service Data Unit (A-MSDU) technology aggregates multiple MAC
Service Data Units (MSDU)s into an MAC Protocol Data Unit (MPDU), which reduces MAC
layer costs of the 802.11 packets and improves packet transmission efficiency especially when
short MSDUs are aggregated.
Precautions
The function of sending 802.11 frames in A-MSDU mode can only be enabled on the
802.11ac radio.
Example
# Enable the function of sending 802.11 frames in A-MSDU mode.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-5g-profile name default
[HUAWEI-wlan-radio-5g-prof-default] vht a-msdu enable
Related Topics
11.1.123 display radio-5g-profile
Function
The vht a-msdu max-frame-num command sets the maximum number of subframes that can
be aggregated into an A-MSDU at one time.
The undo vht a-msdu max-frame-num command restores the default maximum number of
subframes that can be aggregated into an A-MSDU at one time.
By default, a maximum of two subframes can be aggregated into an A-MSDU at one time.
NOTE
Currently, only the AD9430DN-24 (including the mapping RUs), AD9430DN-12 (including the mapping
RUs), AP5030DN, AP5130DN, AP8030DN, AP8130DN, AP7030DE, AP9330DN, AP2030DN, AP4030DN,
AP4130DN, AP9131DN, AP9132DN, AP4030TN, AP4050DN-E, AP4050DN-HD, AP6050DN,
AP6150DN, AP7050DN-E, AP7050DE support 802.11ac.
Format
vht a-msdu max-frame-num max-frame-number
Parameters
Parameter Description Value
Views
5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A-MSDU technology aggregates multiple MSDUs into an MPDU, which reduces MAC layer
costs of the 802.11 packets.
l When the wireless network quality is satisfactory, increase the maximum number of
subframes that can be aggregated into an A-MSDU at one time to improve the network
usage efficiency and wireless service performance.
l When the wireless network quality is unsatisfactory or delay-sensitive services, such as
voice services are transmitted, reduce the maximum number of subframes that can be
aggregated into an A-MSDU at one time to minimize the impact of packet loss on
services and reduce packet transmission delay. Some STAs have restrictions on the
number of subframes aggregated into a received A-MSDU. If the number of subframes
sent by the AP exceeds the threshold, the STAs cannot receive the frames properly.
Prerequisite
The function of sending 802.11 frames in A-MSDU mode has been enabled using the
11.1.259 vht a-msdu enable command.
Precautions
The function of sending 802.11 frames in A-MSDU mode can only be enabled on the
802.11ac radio.
Example
# Set the maximum number of subframes that can be aggregated into an A-MSDU at one time
to 3.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-5g-profile name default
[HUAWEI-wlan-radio-5g-prof-default] vht a-msdu max-frame-num 3
Related Topics
11.1.259 vht a-msdu enable
Function
The vht mcs-map command configures the maximum MCS value corresponding to a specific
number of 802.11ac spatial streams in the 5G radio profile.
The undo vht mcs-map command restores the default maximum MCS value corresponding
to a specific number of 802.11ac spatial streams in the 5G radio profile.
By default, the maximum MCS value of the 802.11 ac radios is 9 in the 5G radio profile.
NOTE
Currently, only the AD9430DN-24 (including the mapping RUs), AD9430DN-12 (including the mapping
RUs), AP5030DN, AP5130DN, AP8030DN, AP8130DN, AP7030DE, AP9330DN, AP2030DN, AP4030DN,
AP4130DN, AP9131DN, AP9132DN, AP4030TN, AP4050DN-E, AP4050DN-HD, AP6050DN,
AP6150DN, AP7050DN-E, AP7050DE support 802.11ac.
Format
vht mcs-map nss nss-value max-mcs max-mcs-value
Parameters
Parameter Description Value
Views
5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Rates of 802.11ac radios depend on the index value of Modulation and Coding Scheme
(MCS). A larger MCS value indicates a higher transmission rate.
l If nss-value is equal to or larger than the actual number of spatial streams supported by
an AP, the maximum MCS value corresponding to all spatial streams of the AP is max-
mcs-value.
l If nss-value is smaller than the actual number of spatial streams supported by an AP, only
the maximum MCS value of configured spatial streams is max-mcs-value. The maximum
MCS value of the other spatial streams does not take effect.
For example, if nss-value is 2, and the AP supports 3 spatial streams. Only the maximum
MCS value of spatial stream 1 and spatial stream 2 is max-mcs-value, and that of spatial
stream 3 does not take effect.
Precautions
This configuration applies only to STAs associated with an AP in 802.11ac mode but does not
take effect on STAs associated with the AP in other modes.
l VAPs of only the AP4050DN-E, AP4050DN-HD, AP6050DN, AP6150DN, AP7050DE,
and AP7050DN-E support MU-MIMO on 5 GHz radios.
l In WDS scenarios, ensure that the number of spatial streams on STA VAPs is smaller
than that on AP VAPs. Otherwise, MU-MIMO cannot take effect. For example, if STA
VAPs and AP VAPs are both configured with three spatial streams, an AP VAP can
communicate with only one STA VAP even if MU-MIMO has been enabled.
l MU-MIMO is not supported on a Mesh network.
l The smart antenna function cannot take effect if beamforming or MU-MIMO has been
configured.
Example
# Configure the maximum MCS value 8 for 802.11ac radios with two spatial streams in the
5G radio profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-5g-profile name default
[HUAWEI-wlan-radio-5g-prof-default] vht mcs-map nss 2 max-mcs 8
Related Topics
11.1.123 display radio-5g-profile
Format
vlan pool pool-name
undo vlan pool pool-name
Parameters
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Since WLANs provide flexible access modes, STAs may connect to the same WLAN at the
office entrance or stadium entrance, and then roam to different APs. If each SSID has only
one service VLAN to deliver wireless access to STAs, IP address resources may become
insufficient in areas where many STAs access the WLAN, and IP addresses in the other areas
are wasted.
After a VLAN pool is created, add multiple VLANs to the VLAN pool and configure the
VLANs as service VLANs. In this way, an SSID can use multiple service VLANs to provide
wireless access services. STAs are dynamically assigned to VLANs in the VLAN pool, which
reduces the number of STAs in each VLAN and also the size of the broadcast domain.
Additionally, IP addresses are evenly allocated, preventing IP address waste.
You can also apply the VLAN pool to a user group to plan network segments by user role.
Follow-up Procedure
After a VLAN pool is created, run the vlan command to add VLANs to the VLAN pool. Note
that these VLANs have been created using the vlan batch { vlan-id1 [ to vlan-id2 ] }
&<1-10> command. Otherwise, VLANs in the VLAN pool cannot take effect.
Precautions
l After a VLAN pool is configured to provide service VLANs, VLANs in the VLAN pool
cannot be deleted. To delete the VLAN pool, cancel the service VLAN configuration of
the VLAN pool.
Example
# Create the VLAN pool pool1 and display the VLAN pool view.
<HUAWEI> system-view
[HUAWEI] vlan pool pool1
[HUAWEI-vlan-pool-pool1]
Related Topics
11.1.144 display vlan pool
11.1.263 vlan (VLAN pool view)
Function
The vlan command adds a VLAN to a VLAN pool.
The undo vlan command deletes a VLAN from a VLAN pool.
By default, no VLAN is available in a VLAN pool.
Format
vlan { start-vlan [ to end-vlan ] } &<1-10>
undo vlan { { start-vlan [ to end-vlan ] } &<1-10> | all }
Parameters
Parameter Description Value
start-vlan to end-vlan Specifies a VLAN ID. The value is an integer
that ranges from 1 to
start-vlan and end-vlan determine a VLAN 4094.
range. start-vlan must be smaller than end-
vlan.
Views
VLAN pool view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If service VLANs of a VAP are configured as VLANs in a VLAN pool, STAs connected to
the VAP are dynamically assigned to VLANs in the VLAN pool. This prevents a large
number of STAs from connecting to the same VLAN, resolving the problems of insufficient
IP addresses and large broadcast domain.
Precautions
l A nonexistent VLAN can also be added to a VLAN pool. However, you need to create
the VLAN after adding a nonexistent VLAN to a VLAN pool; otherwise, the VLAN
does not take effect.
Example
# Add VLANs 9, 12, 13, and 14 to the VLAN pool pool1.
<HUAWEI> system-view
[HUAWEI] vlan pool pool1
[HUAWEI-vlan-pool-pool1] vlan 9 12 to 14
Related Topics
11.1.144 display vlan pool
11.1.262 vlan pool
11.1.264 wifi-light
Function
The wifi-light command specifies the parameter reflected by the blinking frequency of the
Wireless LED on an AP.
The undo wifi-light command restores the default parameter reflected by the blinking
frequency of the Wireless LED on an AP.
By default,
l If the Mesh function is enabled on the AP, the blinking frequency of the Wireless LED
reflects the weakest signal strength of all neighboring APs.
l If WDS is enabled on an AP, the blinking frequency of the Wireless LED reflects the
strength of signals received from a WDS AP.
– If the AP works in leaf mode, the blinking frequency of the Wireless LED reflects
the strength of signals received from a middle AP.
– If the AP works in middle mode, the blinking frequency of the Wireless LED
reflects the strength of signals received from a root AP.
– If the AP works in root mode, the blinking frequency of the Wireless LED reflects
the weakest signal strength of middle APs.
l If the WDS and Mesh functions are disabled on an AP, the blinking frequency of the
Wireless LED reflects the service traffic volume on the radio.
NOTE
Format
wifi-light { signal-strength | traffic }
undo wifi-light
Parameters
Parameter Description Value
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
During installation and commissioning of an AP that has the WDS or Mesh function enabled,
you need to adjust AP locations and antenna directions to obtain strong signals. If the blinking
frequency of the Wireless LED shows the signal strength, onsite installation personnel can
know the signal strength in real time. The wifi-light command allows you to specify the
parameter reflected by the blinking frequency of the Wireless LED. For example, you can
specify the parameter to signal strength during installation and service traffic volume after
installation.
Precautions
This command takes effect only when the AP has the WDS or Mesh function enabled. If the
WDS and Mesh functions are disabled on the AP, the Wireless LED always shows service
traffic volume.
Example
# Set the parameter reflected by the blinking frequency of the Wireless LED on an AP to
service traffic volume.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name radio-profile1
[HUAWEI-wlan-radio-2g-prof-radio-profile1] wifi-light traffic
Related Topics
11.1.122 display radio-2g-profile
Format
wired-port-profile name profile-name
undo wired-port-profile { name profile-name | all }
Parameters
Parameter Description Value
name profile- Specifies the name of an AP wired port profile. The value is a string of
name 1 to 35 case-insensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
An AP wired port profile provides convenience for AP wired interface management and
configuration. You can configure AP wired interface parameters in an AP wired port profile to
manage APs.
Follow-up Procedure
Run the 11.1.266 wired-port-profile (AP group view and view) command to bind the AP
wired port profile to an AP or AP group so that the AP wired port profile can take effect.
Precautions
Example
# Create the AP wired port profile wired-port1 and display the AP wired port profile view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wired-port-profile name wired-port1
[HUAWEI-wlan-wired-port-wired-port1]
Related Topics
11.1.145 display wired-port-profile
11.1.266 wired-port-profile (AP group view and view)
Function
The wired-port-profile command binds an AP wired port profile to an AP or AP group.
By default, the AP wired port profile default is bound to an AP group, but no AP wired port
profile is bound to an AP.
Format
wired-port-profile profile-name interface-type interface-number
Parameters
Parameter Description Value
profile-name Specifies the name of an AP wired port profile. The AP wired port
profile must exist.
Views
AP group view, AP view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After you create an AP wired port profile using the 11.1.265 wired-port-profile (WLAN
view) command, bind it to an AP or AP group so that the AP wired port profile can take
effect.
Precautions
After an AP wired port profile is bound to an AP or AP group, parameter settings in the AP
wired port profile apply to specified interfaces of all APs using the AP wired port profile.
Example
# Create the AP wired port profile wired-port1 and bind it to GE0 of APs in AP group
group1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wired-port-profile name wired-port1
[HUAWEI-wlan-wired-port-wired-port1] quit
[HUAWEI-wlan-view] ap-group name group1
[HUAWEI-wlan-ap-group-group1] wired-port-profile wired-port1 gigabitethernet 0
Related Topics
11.1.111 display ap-group
11.1.132 display references wired-port-profile
11.1.265 wired-port-profile (WLAN view)
11.1.267 wlan
Function
The wlan command displays the WLAN view.
Format
wlan
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Before performing WLAN configurations, run the wlan command to enter the WLAN view.
All WLAN configuration commands need to be used in the WLAN view or WLAN sub-view.
Example
# Enter the WLAN view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view]
11.2.1 amc-policy
Function
The amc-policy command configures an adaptive modulation and coding (AMC) algorithm
for a radio.
The undo amc-policy command restores the default AMC algorithm for a radio.
By default, a radio uses the AMC algorithm auto-balance.
Format
amc-policy { auto-balance | high-stability | high-throughput }
undo amc-policy
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Radios need to adjust the AMC algorithm according to different scenarios to deliver the
optimal user experience. Three AMC algorithms are available:
l auto-balance: applicable to most wireless scenarios
l high-stability: applicable to scenarios with continuous interference.
l high-throughput: applicable to scenarios with good wireless signals and non-continuous
interference.
Example
# Set the AMC algorithm of a radio to high-stability.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name huawei
[HUAWEI-wlan-rrm-prof-huawei] amc-policy high-stability
Related Topics
11.2.22 display rrm-profile
11.2.2 air-scan-profile
Function
The air-scan-profile command creates an air scan profile and displays the air scan profile
view.
The undo air-scan-profile command deletes an air scan profile.
By default, the system provides the air scan profile default. You can run the 11.2.19 display
air-scan-profile command to view configuration of the air scan profile default.
Format
air-scan-profile name profile-name
undo air-scan-profile { name profile-name | all }
Parameters
Parameter Description Value
name profile- Specifies the name of an air scan profile. The value is a string of
name 1 to 35 case-insensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
all Deletes all air scan profiles. The air scan profile
default can be
modified but cannot be
deleted.
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After an air scan profile is created using the air-scan-profile command and bound to a radio
profile, and scanning functions are enabled, such as radio calibration, smart roaming,
spectrum analysis, WLAN location, and WIDS, the AP periodically scans surrounding radio
signals and reports the collected information to an AC or a server. The information is used for
radio calibration, smart roaming spectrum analysis, WLAN location, or WIDS data analysis.
Follow-up Procedure
Run the 11.2.3 air-scan-profile (radio profile view) command to bind the air scan profile to a
2G radio profile or 5G radio profile so that the air scan profile can take effect.
Example
# Create the air scan profile air-scan01.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] air-scan-profile name air-scan01
[HUAWEI-wlan-air-scan-prof-air-scan01]
Related Topics
11.2.3 air-scan-profile (radio profile view)
Function
The air-scan-profile command binds an air scan profile to a radio profile.
The undo air-scan-profile command unbinds an air scan profile from a radio profile.
Format
air-scan-profile profile-name
undo air-scan-profile
Parameters
Parameter Description Value
profile-name Specifies the name of an air scan profile. The air scan profile
name must already
exist.
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
After you create an air scan profile using the 11.2.2 air-scan-profile command, bind it to a
radio profile so that the air scan profile can take effect.
Example
# Bind the air scan profile air-scan01 to the radio profile office01.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] air-scan-profile name air-scan01
[HUAWEI-wlan-air-scan-prof-air-scan01] quit
[HUAWEI-wlan-view] radio-2g-profile name office01
[HUAWEI-wlan-radio-2g-prof-office01] air-scan-profile air-scan01
Related Topics
11.2.2 air-scan-profile
Format
band-steer balance gap-threshold gap-threshold
undo band-steer balance gap-threshold
Parameters
Parameter Description Value
gap-threshold Specifies the load difference threshold for load The value is an integer
gap-threshold balancing between radios. that ranges from 1 to
100, in percentage.
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
You can run the undo band-steer disable command to configure the band steering function.
If an AP and STAs connected to the AP can work at both 2.4 and 5 GHz radios, the band
steering function allows radios of the AP to load balance traffic. This helps minimize
interference between STAs and improve user experience.
When a STA requests to connect to an AP radio, the AP enabled with band steering will
collect statistics about access users on each radio.
1. If the number of access users on the AP does not exceed start-threshold specified using
the 11.2.5 band-steer balance start-threshold command, the STA can preferentially
associate with the 5 GHz radio.
2. If the number of access users on the AP exceeds start-threshold, the AP determines the
frequency band to which the STA connects based on radio load difference computed
according to the formula: (Number of access users on the 5 GHz radio – Number of
access users on the 2.4 GHz radio)/Number of access users on the 5 GHz radio * 100%.
For example, if a STA requests to associate with the AP at the 2.4 GHz radio but the number
of access users on the AP has exceeded start-threshold, the AP implements load balancing
between the 2.4 GHz and 5 GHz radios according to their load difference. If the value
obtained based on the formula (Number of access users on the 5 GHz radio – Number of
access users on the 2.4 GHz radio)/Number of access users on the 5 GHz radio * 100% is
greater than gap-threshold, the AP preferentially associates with the STA on the 2.4 GHz
radio; otherwise, the AP preferentially associates with the STA on the 5 GHz radio.
Example
# Set the load difference threshold to 25% in the RRM profile huawei.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name huawei
[HUAWEI-wlan-rrm-prof-huawei] band-steer balance gap-threshold 25
Related Topics
11.2.7 band-steer deny-threshold
11.2.5 band-steer balance start-threshold
Format
band-steer balance start-threshold start-threshold
undo band-steer balance start-threshold
Parameters
Parameter Description Value
start-threshold Specifies the start threshold for load balancing The value is an integer
start-threshold between radios. that ranges from 0 to
100.
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
You can run the undo band-steer disable command to configure the band steering function.
If an AP and STAs connected to the AP support both radios, the band steering function allows
radios of the AP to load balance traffic. This helps minimize interference between STAs and
improve user experience.
When a STA requests to connect to an AP radio, the AP enabled with band steering will
collect statistics about access users on each radio.
1. If the number of access users on the AP does not exceed start-threshold, the STA can
preferentially associate with the 5 GHz radio.
2. If the number of access users on the AP exceeds start-threshold, the AP determines the
frequency band to which the STA connects based on radio load difference computed
according to the formula: (Number of access users on the 5 GHz radio – Number of
access users on the 2.4 GHz radio)/Number of access users on the 5 GHz radio * 100%
For example, if a STA requests to associate with the AP at the 2.4 GHz radio but the number
of access users on the AP has exceeded start-threshold, the AP implements load balancing
between the 2.4 GHz and 5 GHz radios according to their load difference. If the value
obtained based on the formula (Number of access users on the 5 GHz radio – Number of
access users on the 2.4 GHz radio)/Number of access users on the 5 GHz radio * 100% is
greater than gap-threshold configured using the 11.2.4 band-steer balance gap-threshold
command, the AP preferentially associates with the STA on the 2.4 GHz radio; otherwise, the
AP preferentially associates with the STA on the 5 GHz radio.
Example
# Set the start threshold to 20 in the RRM profile huawei.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name huawei
[HUAWEI-wlan-rrm-prof-huawei] band-steer balance start-threshold 20
Related Topics
11.2.4 band-steer balance gap-threshold
11.2.7 band-steer deny-threshold
Function
The band-steer client-band-expire command sets the aging condition for terminal band
information.
The undo band-steer client-band-expire command restores the default aging condition for
terminal band information.
By default, band information of a terminal will be aged out under conditions that an AP has
consecutively received Probe frames of the terminal more than 35 times from the same
frequency band.
Format
band-steer client-band-expire probe-counters
Parameters
Parameter Description Value
probe-counters Sets the aging condition of terminal band The value is an integer
information to the number of times that an AP that ranges from 10 to
has consecutively received Probe frames of a 300.
terminal from the same frequency band.
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the band steering function is enabled on an AP, the AP records frequency band
information of terminals so that the terminals can preferentially access the supported and
lightly loaded frequency band.
Users may change terminals' configurations, which causes the supported frequency band of
terminals to change. Therefore, the AP needs to update frequency band information of
terminals in a timely manner. If the AP keeps receiving Probe frames of a terminal from a
specific frequency band, and the number of receiving times exceeds a certain threshold, the
AP updates the frequency band information of the terminal and considers that the terminal
supports only the frequency band.
For example, the supported frequency bands of a terminal are 2.4 and 5 GHz frequency bands
on an AP. If the AP only receives Probe frames of the terminal from the 2.4 GHz frequency
band, and the number of times that the AP consecutively receives Probe frames from the 2.4
GHz frequency band exceeds the specified threshold, the AP considers that users change the
terminal configuration and the terminal supports only the 2.4 GHz frequency band.
Precautions
If you set the aging condition to a large number of times that an AP consecutively receives
Probe frames of a terminal from the same frequency band, the AP detects terminal band
change more slowly. A smaller number indicates quicker response. Set the aging condition
according to the difference in the number of Probe frames sent from the two frequency bands.
Example
# Configure the supported band information of the terminal huawei to age out when the
number of times that an AP consecutively receives Probe frames from a frequency band
exceeds 80.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name huawei
[HUAWEI-wlan-rrm-prof-huawei] band-steer client-band-expire 80
Function
The band-steer deny-threshold command sets the maximum number of times an AP rejects
association requests of a STA for band steering.
The undo band-steer deny-threshold command restores the default maximum number of
times an AP rejects association requests of a STA for band steering.
Format
band-steer deny-threshold deny-threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
If a STA requests to associate with an AP from the 2.4 GHz frequency band but the AP steers
the STA to the 5 GHz frequency band according to the band steering algorithm, the AP will
reject the association. However, after the number of rejections exceeds the maximum value
specified by the band-steer deny-threshold command, the AP allows the STA to associate
from the 2.4 GHz frequency band.
Example
# Set the maximum number of rejections to 8 for the terminal huawei.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name huawei
[HUAWEI-wlan-rrm-prof-huawei] band-steer deny-threshold 8
Related Topics
11.2.8 band-steer disable
Function
The band-steer disable command disables the band steering function.
The undo band-steer disable command enables the band steering function.
By default, the band steering function is enabled.
Format
band-steer disable
undo band-steer disable
Parameters
None
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Compared with the 2.4 GHz frequency band, the 5 GHz frequency band has less interference
and more available channels, and provides higher access capability.
Most STAs support both 5 GHz and 2.4 GHz frequency bands and usually associate with the
2.4 GHz radio by default when connecting to the Internet. To connect the STAs to the 5 GHz
radio, you must manually select the 5 GHz radio. The band steering function frees you from
the manual selection.
After you enable band steering for a specific SSID on the AC, the AP preferentially associates
the terminals connected to the SSID with the 5 GHz frequency band. After the 5 GHz
frequency band is fully loaded, the AP steers the terminals to the 2.4 GHz frequency band.
Configuration Impact
After the band steering function is enabled, it takes a long time for dual-band terminals to
associate or roam. You are advised to disable band steering for delay-sensitive services.
Precautions
If both radios of an AP use the same VAP profile, the band steering function takes effect on
both radios as long as the function is enabled for an SSID on one radio of the AP. For
example, if band steering is enabled for the SSID huawei on the 2.4 GHz radio but not on the
5 GHz radio, the AP preferentially steers terminals associated with the SSID to the 5 GHz
radio.
Single-radio devices do not support the band steering function.
The AP2010DN does not support the band steering function.
Example
# Disable band steering.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name huawei
[HUAWEI-wlan-vap-prof-huawei] band-steer disable
Related Topics
11.1.143 display vap-profile
Format
calibrate auto-channel-select disable
undo calibrate auto-channel-select disable
Parameters
None
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Two channel selection modes are available:
l Automatic mode (enabling automatic channel selection): An AP automatically selects a
proper channel based on the WLAN radio environment, removing the need to specify
channels manually.
l Fixed mode (disabling automatic channel selection): Channels must be manually
specified.
The automatic mode (automatic channel selection) is recommended because you do not need
to specify a channel for each radio. The fixed mode provides users with an alternative way
when they want to specify channels by themselves or to avoid frequent channel adjustment
(this may cause intermittent service interruption).
If an AP needs radio calibration, automatic channel selection must be enabled in the AP's
RRM profile.
NOTE
When automatic channel selection is enabled, the manually configured channels do not take effect to ensure
that the radio works in the optimal channel environment.
Example
# Disable automatic channel selection in the RRM profile 802.11b.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name 802.11b
[HUAWEI-wlan-rrm-prof-802.11b] calibrate auto-channel-select disable
Function
The calibrate auto-txpower-select disable command disables automatic transmit power
selection.
The undo calibrate auto-txpower-select disable command enables automatic transmit power
selection.
By default, automatic transmit power selection is enabled.
Format
calibrate auto-txpower-select disable
undo calibrate auto-txpower-select disable
Parameters
None
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Two power selection modes are available:
l Automatic mode (enabling automatic transmit power selection): An AP automatically
selects or adjusts the transmit power based on the WLAN radio environment, removing
the need to specify AP power manually.
l Fixed mode (disabling automatic transmit power selection): The transmit power must be
manually specified.
If an AP needs radio calibration, automatic transmit power selection must be enabled in the
AP's RRM profile.
Example
# Disable automatic transmit power selection in the RRM profile 802.11b.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name 802.11b
[HUAWEI-wlan-rrm-prof-802.11b] calibrate auto-txpower-select disable
Function
The calibrate enable { auto | manual | schedule time } command configures the radio
calibration mode.
By default, the radio calibration mode is auto, the radio calibration interval is 1440 minutes,
and the start time for radio calibration is 00:00:00.
Format
calibrate enable { auto [ interval interval-value [ start-time start-time ] ] | manual |
schedule time time-value }
Parameters
start-time Specifies the start time for The value is in the format of hh:mm:ss.
start-time radio calibration in l hh: indicates the hour. The value is an
automatic mode. integer that ranges from 0 to 23.
l mm: indicates the minute. The value is an
integer that ranges from 0 to 59.
l ss: indicates the second. The value is an
integer that ranges from 0 to 59.
time time-value Specifies the time for The value is in the format of hh:mm:ss.
triggering the scheduled l hh: indicates the hour. The value is an
radio calibration. integer that ranges from 0 to 23.
l mm: indicates the minute. The value is an
integer that ranges from 0 to 59.
l ss: indicates the second. The value is an
integer that ranges from 0 to 59.
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
There are three radio calibration modes:
l Auto mode: The device periodically implements radio calibration at certain intervals (the
interval is specified by interval and the default interval is 1440 minutes).
l Manual mode: Radio calibration is not automatically implemented by the device but
manually triggered through the 11.2.13 calibrate manual startup command.
l Schedule mode: The device triggers radio calibration at the time specified by the
parameter time.
The three modes cannot be configured simultaneously. You can choose any of the modes as
required.
In any mode, you can run the calibrate manual startup command to trigger the calibration.
In manual mode, the device implements radio calibration only after the calibrate manual
startup command is executed.
Example
# Set the radio calibration mode to manual.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] calibrate enable manual
# Set the radio calibration mode to schedule and set the time for scheduled radio calibration to
20:30:00.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] calibrate enable schedule time 20:30:00
Related Topics
11.2.13 calibrate manual startup
Function
The calibrate error-rate-threshold command sets the packet error rate (PER) threshold in a
radio profile.
The undo calibrate error-rate-threshold command restores the default PER threshold in a
radio profile.
Format
calibrate error-rate-threshold error-rate-threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
If the MAC layer of a radio does not receive any ACK packet after sending a packet at the
lowest rate, it considers that an error occurs.
The PER threshold determines whether the radio environment is normal. When the PER of a
radio reaches the threshold, the system considers that the radio environment deteriorates.
When this occurs, the system may start radio calibration or take measures to avoid signal
interference.
Example
# Set the PER threshold to 70% in the RRM profile 80211b.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name 80211b
[HUAWEI-wlan-rrm-prof-80211b] calibrate error-rate-threshold 70
Function
The calibrate manual startup command triggers radio calibration.
Format
calibrate manual startup
Parameters
None
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
When you need to implement radio calibration instantly, run the calibrate enable { auto
[ interval interval-value [ start-time start-time ] ] | manual | schedule time time-value }
command to enable radio calibration and then run the calibrate manual startup command to
manually trigger radio calibration.
Example
# Manually trigger radio calibration.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] calibrate enable auto
[HUAWEI-wlan-view] calibrate manual startup
Related Topics
11.2.11 calibrate enable { auto | manual | schedule time }
Function
The calibrate policy command creates a radio calibration policy.
The undo calibrate policy command deletes a radio calibration policy.
By default, no radio calibration policy is created.
Format
calibrate policy { rogue-ap | load | non-wifi }
undo calibrate policy { rogue-ap | load | non-wifi }
Parameters
Parameter Description Value
rogue-ap Indicates the rogue AP mode. -
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Three types of radio calibration policies are available:
l Rogue AP policy: When rogue APs (rogue APs cannot be controlled by an AC) exist on
a network, set the radio calibration policy to rogue-ap. The device then implements
partial radio calibration to minimize the rogue AP interference on the entire network.
l Load policy: When an AP is heavily loaded, set the radio calibration policy to load. The
device then preferentially allocates channels with a little interference to the heavily
loaded APs.
l Non-Wi-Fi policy: When non-Wi-Fi devices exist on a network, set the radio calibration
policy to non-wifi. The device then implements radio calibration to reduce interference
of non-Wi-Fi devices on the network.
The three radio calibration policies can be used together. You can run the command multiple
times to configure different radio calibration policies according to service requirements.
Example
# Set the radio calibration policy to rogue AP.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] calibrate policy rogue-ap
Function
The calibrate sensitivity command configures the radio calibration sensitivity for a device.
The undo calibrate sensitivity command restores the default radio calibration sensitivity.
Format
calibrate sensitivity { low | medium | high }
Parameters
Parameter Description Value
low Indicates low radio calibration sensitivity. -
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Radio calibration sensitivity of a device is described as follows:
l high: The device implements radio calibration when the current spectrum model is not as
good as the estimated spectrum model.
l medium: The device implements radio calibration when the current spectrum model
varies from the estimated spectrum model.
l low: The device implements radio calibration when the current spectrum model differs
greatly from the estimated spectrum model.
The default value is recommended.
Example
# Set the radio calibration sensitivity to high.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] calibrate sensitivity high
Format
dca-channel 5g bandwidth { 20mhz | 40mhz | 80mhz }
undo dca-channel 5g bandwidth
Parameters
Parameter Description Value
Views
Regulatory domain profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The 5 GHz frequency band has richer spectrum resources. In addition to 20 MHz channels,
APs working on the 5 GHz frequency band support 40 MHz and 80 MHz channels. Larger-
bandwidth channels mean higher transmission rates. However, at least three channels are
required in radio calibration to achieve the optimal calibration effect. When configuring the
calibration bandwidth, ensure that enough calibration channels are available for use.
You can use the dca-channel bandwidth command to configure the calibration bandwidth
and the 11.2.17 dca-channel channel-set command to configure calibration channels as
prompted.
Configuration Impact
When the calibration bandwidth is changed, the device recalculates the calibration channels.
Precautions
When configuring 40 MHz or 80 MHz calibration bandwidth, check whether channels of the
corresponding bandwidth exist under the country code.
Example
# Set the calibration bandwidth to 40 MHz.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] regulatory-domain-profile name huawei
[HUAWEI-wlan-regulate-domain-huawei] dca-channel 5g bandwidth 40mhz
Related Topics
11.2.17 dca-channel channel-set
11.1.133 display regulatory-domain-profile
Function
The dca-channel channel-set command configures a calibration channel set.
The undo dca-channel channel-set command restores the default calibration channel set.
By default, a calibration channel set contains channels 1, 6, and 11 on the 2.4G radio and
contains all channels supported by the corresponding country code on the 5G radio. If the
country code is China, the calibration channel set does not contain channels 36 to 64. When
configuring the calibration channels, users can specify channels as prompted.
Format
dca-channel { 2.4g | 5g } channel-set channel-value
undo dca-channel { 2.4g | 5g } channel-set
Parameters
Parameter Description Value
2.4g | 5g Specifies the frequency band on which -
radio calibration is performed.
l 2.4g: Radios work on the 2.4 GHz
frequency band.
l 5g: Radios work on the 5 GHz
frequency band.
Views
Regulatory domain profile view
Default Level
2: Configuration level
Usage Guidelines
The 5 GHz frequency band has richer spectrum resources. In addition to 20 MHz channels,
APs working on the 5 GHz frequency band support 40 MHz and 80 MHz channels. Larger-
bandwidth channels mean higher transmission rates. However, at least three channels are
required in radio calibration to achieve the optimal calibration effect. When configuring the
calibration bandwidth, ensure that enough calibration channels are available for use.
You can run this command to specify a calibration channel set for an AP. The AP selects
channels from the channel set to calibrate. This reduces the burden on the AP.
NOTE
To ensure a good calibration effect, you are advised to configure at least three calibration channels.
To prevent signal interference, ensure that adjacent APs work in non-overlapping channels. The 2.4 GHz
frequency band has overlapping channels. When configuring calibration channels, you are advised to
configure a non-overlapping calibration channel set containing channels 1, 6, and 11 or containing channels 1,
5, 9, and 13.
To specify a 40 MHz calibration channel, you need to specify two consecutive 20 MHz
channels. To specify an 80 MHz calibration channel, you need to specify four consecutive 20
MHz channels. The combinations of 20 MHz channels making up the 40 MHz and 80 MHz
channels are fixed. For details, see “Configuration Guide-WLAN-AC”Radio Calibration in
the Radio Resource Management of the corresponding product version.
You can also use the 11.2.16 dca-channel bandwidth command to configure the calibration
bandwidth and the dca-channel channel-set command to configure calibration channels as
prompted.
If no calibration channel set is configured, the device probes channels based on the calibration
channels corresponding to the country code.
NOTE
Example
# Configure a calibration channel set composed of 40MHz channels 149, 153, 157, and 161
on the 5 GHz frequency band.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] regulatory-domain-profile name huawei
[HUAWEI-wlan-regulate-domain-huawei] dca-channel 5g bandwidth 40mhz
[HUAWEI-wlan-regulate-domain-huawei] dca-channel 5g channel-set 149,153,157,161
Related Topics
11.1.72 country-code
11.2.16 dca-channel bandwidth
11.2.18 deny-threshold
Function
The deny-threshold command configures the maximum number of times an AP rejects
association requests of a STA for a static load balancing group.
The undo deny-threshold command restores the default maximum number of times an AP
rejects association requests of a STA for a static load balancing group.
By default, the maximum number of times an AP rejects association requests of a STA is 3 for
a static load balancing group.
Format
deny-threshold deny-threshold
undo deny-threshold
Parameters
Parameter Description Value
Views
Static load balancing group view
Default Level
2: Configuration level
Usage Guidelines
You can run the deny-threshold command to set the maximum number of times an AP rejects
association requests of a STA for a static load balancing group. When a STA requests to
associate with an AP radio in the static load balancing group, the AP rejects the association
request of the STA if traffic is not balanced among radios in the group. When the number of
consecutive association attempts of the STA exceeds the configured maximum number of
rejection times, the AP allows the STA to associate with it regardless of whether traffic is
balanced.
Example
# Set the maximum number of times an AP rejects association requests of a STA to 8 for the
static load balancing group coco.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] sta-load-balance static-group name coco
[HUAWEI-wlan-sta-lb-static-coco] deny-threshold 8
Related Topics
11.2.56 sta-load-balance static-group
Function
The display air-scan-profile command displays information about air scan profiles.
Format
display air-scan-profile { all | name profile-name }
Parameters
Parameter Description Value
all Displays information about all air scan -
profiles.
name profile-name Displays information about a specified air The air scan profile name
scan profile. must already exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display air-scan-profile command to view information about air scan
profiles.
Example
# Display information about all air scan profiles.
<HUAWEI> display air-scan-profile all
------------------------------------------------------------
Profile name Reference
------------------------------------------------------------
default 2
huawei 1
------------------------------------------------------------
Total: 2
Item Description
Related Topics
11.2.43 scan-period
11.2.42 scan-interval
11.2.41 scan-channel-set
Function
The display references air-scan-profile command displays reference information about an
air scan profile.
Format
display references air-scan-profile name profile-name
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references air-scan-profile command to view reference information
about an air scan profile.
Example
# Display reference information about the air scan profile huawei.
<HUAWEI> display references air-scan-profile name huawei
------------------------------------------------------------
Reference type Reference name
------------------------------------------------------------
radio-2g-profile default
------------------------------------------------------------
Total: 1
Format
display references rrm-profile name profile-name
Parameters
Parameter Description Value
name profile-name Displays reference information about a The RRM profile name must
specified RRM profile. already exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references rrm-profile command to view reference information
about an RRM profile.
Example
# Display reference information about the RRM profile huawei.
<HUAWEI> display references rrm-profile name huawei
------------------------------------------------------------
Reference type Reference name
------------------------------------------------------------
radio-2g-profile radio0
radio-5g-profile radio1
------------------------------------------------------------
Total: 2
Function
The display rrm-profile command displays information about an RRM profile.
Format
display rrm-profile { all | name profile-name }
Parameters
Parameter Description Value
all Displays information about all RRM -
profiles.
name profile-name Displays information about a specified The RRM profile name
RRM profile. must already exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display rrm-profile command to view information about an RRM profile.
Example
# Display information about all RRM profiles.
<HUAWEI> display rrm-profile all
------------------------------------------------------------
Profile name Reference
------------------------------------------------------------
default 2
------------------------------------------------------------
Total:1
PER threshold for trigger channel/power PER threshold for triggering channel or
select(%) power adjustment.
To set the PER threshold, run the 11.2.12
calibrate error-rate-threshold command.
Item Description
UAC check client number Whether to enable user CAC based on the
number of users.
To enable user CAC based on the number of
users, run the 11.2.59 uac { client-number |
channel-utilization } enable command.
UAC client number access threshold User CAC access threshold based on the
number of users.
To configure the user CAC access threshold
based on the number of users, run the
11.2.60 uac client-number threshold
command.
UAC client number roam threshold User CAC roaming threshold based on the
number of users.
To configure the user CAC roaming
threshold based on the number of users, run
the 11.2.60 uac client-number threshold
command.
UAC channel utilization access threshold User CAC access threshold based on
channel usage.
To configure the user CAC access threshold
based on channel usage, run the 11.2.58 uac
channel-utilization threshold command.
UAC channel utilization roam threshold User CAC roaming threshold based on
channel usage.
To configure the user CAC roaming
threshold based on channel usage, run the
11.2.58 uac channel-utilization threshold
command.
Item Description
Band balance start threshold Start threshold for load balancing between
radios.
To configure start threshold for load
balancing between radios, run the 11.2.5
band-steer balance start-threshold
command.
Band balance gap threshold(%) Load difference threshold for load balancing
between radios.
To configure load difference threshold for
load balancing between radios, run the
11.2.4 band-steer balance gap-threshold
command.
Station load balance start threshold Start threshold for load balancing.
To configure the start threshold for load
balancing, run the 11.2.55 sta-load-balance
dynamic start-threshold command.
Station load balance gap threshold(%) Load difference threshold for load
balancing.
To configure the load difference threshold
for load balancing, run the 11.2.54 sta-load-
balance dynamic gap-threshold command.
Item Description
Item Description
Smart-roam high level SNR margin(dB) Higher SNR difference threshold that
triggers terminal roaming.
To set the higher SNR difference threshold
that triggers terminal roaming, run the
11.2.50 smart-roam snr-margin command.
Smart-roam low level SNR margin(dB) Lower SNR difference threshold that
triggers terminal roaming.
To set the lower SNR difference threshold
that triggers terminal roaming, run the
11.2.50 smart-roam snr-margin command.
Smart-roam unable roam client expire Aging time of "unable to roam" record.
time(m) To set the aging time of "unable to roam"
record, run the 11.2.51 smart-roam unable-
roam-client expire-time command.
Related Topics
11.2.9 calibrate auto-channel-select disable
11.2.10 calibrate auto-txpower-select disable
11.5.1 airtime-fair-schedule enable
11.2.30 dynamic-edca enable
11.2.61 uac client-snr enable
11.2.62 uac client-snr threshold
11.2.59 uac { client-number | channel-utilization } enable
11.2.60 uac client-number threshold
11.2.58 uac channel-utilization threshold
11.2.63 uac reach-access-threshold hide-ssid
11.2.7 band-steer deny-threshold
11.2.5 band-steer balance start-threshold
11.2.4 band-steer balance gap-threshold
11.2.6 band-steer client-band-expire
11.2.53 sta-load-balance dynamic enable
11.2.55 sta-load-balance dynamic start-threshold
Format
display sta-load-balance static-group { all | name group-name }
Parameters
Parameter Description Value
all Displays information about all static load -
balancing groups.
name group-name Displays information about a specified The static load balancing
static load balancing group. group must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display sta-load-balance static-group command to view information about
a specified static load balancing group or all static load balancing groups.
Example
# Display information about all static load balancing group.
<HUAWEI> display sta-load-balance static-group all
------------------------------------------------------------
Table 11-98 Description of the display sta-load-balance static-group all command output
Item Description
Index Index.
Item Description
Item Description
Related Topics
11.2.57 start-threshold
11.2.31 gap-threshold
11.2.18 deny-threshold
Function
The display station load-balance sta-mac command displays information about the dynamic
load balancing group based on STAs.
Format
display station load-balance sta-mac mac-address
Parameters
Parameter Description Value
mac-address Displays information about the dynamic load The value is in H-H-H
balancing group based on the STA with the format. An H is a
specified MAC address. hexadecimal number
of 4 digits.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After dynamic load balancing group configuration is complete, run the display station load-
balance sta-mac command to check information about the group based on STAs.
Example
# Display information about the dynamic load balancing group.
<HUAWEI> display station load-balance sta-mac a826-d9e5-6df3
Station load balance status: Balance
------------------------------------------------------------------------------
AP name Radio ID
------------------------------------------------------------------------------
ap1 0
ap3 0
------------------------------------------------------------------------------
Total: 2
Table 11-100 Description of the display station load-balance sta-mac command output
Item Description
Station load balance status Load balancing status in the dynamic load
balancing group:
l Balance: the load is balanced.
l Not balance: the load is unbalanced.
Function
The display station smart-roam unable-roam command displays "unable to roam" records
of STAs.
Format
display station smart-roam unable-roam
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display station smart-roam unable-roam command to check "unable to
roam" records of STAs.
Example
# Display "unable to roam" records of STAs.
<HUAWEI> display station smart-roam unable-roam
-------------------------------------------------------------------------------
STA MAC Left aging time
-------------------------------------------------------------------------------
FCFC-4895-C87E 3h 20m
581F-28FC-7EAD 2h 30m
-------------------------------------------------------------------------------
Total: 2
Table 11-101 Description of the display station smart-roam unable-roam command output
Parameter Description
Function
The display station rssi-rejected statistics command displays information about rejected
STAs by a specified VAP due to weak signal strength.
Format
display station rssi-rejected statistics { ap-name ap-name | ap-id ap-id } radio radio-id
vap-profile profile-name
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After you run the 11.2.61 uac client-snr enable commands, only STAs whose signal strength
is stronger than the threshold can connect to the AP. The display station rssi-rejected
statistics command displays information about rejected STAs due to weak signal strength.
Example
# Display the number of times a STA is rejected due to weak signal strength in the VAP
profile office applied to radio 0 of AP huawei.
<HUAWEI> display station rssi-rejected statistics ap-name huawei radio 0 vap-
profile office
Total station numbers: 2
--------------------------------------------------------------------------------
MAC Times Last reject time
c46a-b72c-4100 2 2012-07-23/09:26:23
38e7-d87c-48c1 478 2012-07-23/10:16:10
--------------------------------------------------------------------------------
Table 11-102 Description of the display station rssi-rejected statistics command output
Item Description
Total station numbers Total number of STAs that are rejected due
to weak signal strength.
Item Description
Last reject time Time when the STA is rejected for the last
time.
Related Topics
11.2.61 uac client-snr enable
Function
The display wlan calibrate channel-set command displays the effective calibration channels
and bandwidth.
Format
display wlan calibrate channel-set ap-group { name ap-group-name | all }
Parameters
Parameter Description Value
ap-group Displays the effective calibration channels and The AP group must
name ap- bandwidth in a specified AP group. exist.
group-name
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After configuring the radio calibration function, you can run the display wlan calibrate
channel-set command to check the effective calibration channels and bandwidth.
Example
# Display the calibration channels and bandwidth that take effect globally.
AP group : mainland
Country code: CN
--------------------------------------------------------------------------------
Radio band Bandwidth Channel Set
--------------------------------------------------------------------------------
2.4G 20MHz 1,6,11
5G 20MHz 149,153,157,161,165
--------------------------------------------------------------------------------
Table 11-103 Description of the display wlan calibrate channel-set command output
Item Description
Related Topics
11.2.16 dca-channel bandwidth
11.2.17 dca-channel channel-set
Function
The display wlan calibrate switch-record command displays channel calibration records.
Format
display wlan calibrate switch-record
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to query channel or power switching records due to calibration to
check the calibration results.
Example
# Display channel calibration records.
<HUAWEI> display wlan calibrate switch-record
PCH : Pre channel
CCH : Current channel
PE : Pre EIRP (dBm)
CE : Current EIRP (dBm)
PR : Pre RSSI (dBm)
CR : Current RSSI (dBm)
RfID: Radio ID
----------------------------------------------------------------------------------
AP ID AP name RfID PCH/CCH PE/CE PR/CR Reason Time
----------------------------------------------------------------------------------
0 AP 0 11/6 27/127 -32/-40 Period recheck 19:30:00 2016/04/11
0 AP 0 6/11 27/127 -40/-48 Bad env 19:21:53 2016/04/11
----------------------------------------------------------------------------------
Total : 2, printed : 2
Table 11-104 Description of the display wlan wrfm calibrate status command output
Item Description
AP ID AP ID.
AP name AP name.
Item Description
Format
display wlan calibrate statistics { ap-name ap-name | ap-id ap-id } radio radio-id
Parameters
Parameter Description Value
ap-name ap- Displays radio calibration statistics on the The AP name must
name specified AP name. The AP name and radio ID already exist.
identify a radio.
radio radio-id Displays radio calibration statistics on the The value is an integer
specified radio. that ranges from 0 to 2.
Only the AP4030TN
supports three radios.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display wlan calibrate statistics command to view radio calibration
statistics, helping check whether the radio environment is stable.
Example
# Display calibration statistics about radio 0 of AP office.
<HUAWEI> display wlan calibrate statistics ap-name office radio 0
-----------------------------------------------------------------------
Table 11-105 Description of the display wlan calibrate statistics command output
Item Description
Related Topics
11.2.38 reset wlan calibrate statistics
Function
The dynamic-edca enable command enables dynamic EDCA parameter adjustment.
The undo dynamic-edca enable command disables dynamic EDCA parameter adjustment.
Format
dynamic-edca enable
Parameters
None
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
A WLAN has only three non-overlapping channels on the 2.4 GHz frequency band. When
APs are deployed densely, multiple APs have to work in the same channel, resulting in co-
channel interference. This interference degrades network performance.
The dynamic EDCA parameter adjustment function allows APs to adjust EDCA parameters
flexibly to reduce the possibility of collision, improve the throughput, and enhance user
experience.
Example
# Enable dynamic EDCA parameter adjustment.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name huawei
[HUAWEI-wlan-rrm-prof-huawei] dynamic-edca enable
Related Topics
11.2.22 display rrm-profile
11.2.31 gap-threshold
Function
The gap-threshold command sets the load difference threshold for a static load balancing
group.
The undo gap-threshold command restores the default load difference threshold for a static
load balancing group.
By default, the load difference threshold of a static load balancing group is 20%.
Format
gap-threshold gap-threshold-value
undo gap-threshold
Parameters
Parameter Description Value
Views
Static load balancing group view
Default Level
2: Configuration level
Usage Guidelines
After the load difference threshold is configured using the gap-threshold command, the AP
implements load balancing based on the difference between the number of users on different
radios. The load balancing algorithm is as follows:
The AC calculates the load percentage of each radio in a load balancing group using the
formula: Load percentage of a radio = (Number of associated STAs on the radio/Maximum
number of STAs allowed on the radio) x 100%. The AC compares load percentages of all
radios in the load balancing group and obtains the smallest load percentage value. When a
STA requests to associate with an AP radio, the AC calculates the difference between the
radio's load percentage and the smallest load percentage value and compares the load
difference with the threshold (configured using the gap-threshold-value command). If the load
difference is smaller than the threshold, the AC allows the STA to associate with the radio. If
not, the AC rejects the association request of the STA. If the STA continues sending
association requests to this AP, the AC allows the STA to associate with the AP when the
number of consecutive association attempts of the STA exceeds the maximum value
configured using the 11.2.18 deny-threshold command.
Example
# Set the load difference threshold to 40% for the static load balancing group coco.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] sta-load-balance static-group name coco
[HUAWEI-wlan-sta-lb-static-coco] gap-threshold 40
Format
interference adjacent-channel threshold threshold-value
undo interference adjacent-channel threshold
Parameters
Parameter Description Value
threshold-value Specifies the alarm threshold, which is the The value is an integer
percentage of the adjacent-channel interference that ranges from 1 to
power against the maximum power. 100, in percentage.
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Two APs with different center frequencies have overlapping areas, resulting in adjacent-
channel interference. When APs are placed too close to each other or have strong signals,
more noise is produced, degrading network performance.
After the 11.2.34 interference detect-enable command is executed to enable interference
detection, an AP can detect adjacent-channel interference. When the AP detects that adjacent-
channel interference exceeds the alarm threshold configured using the interference adjacent-
channel threshold command, the AP sends an alarm to the AC an alarm is generated.
Example
# Set the alarm threshold for adjacent-channel interference to 52%.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name radio0
[HUAWEI-wlan-radio-2g-prof-radio0] interference detect-enable
[HUAWEI-wlan-radio-2g-prof-radio0] interference adjacent-channel threshold 52
Related Topics
11.1.122 display radio-2g-profile
11.1.123 display radio-5g-profile
11.2.34 interference detect-enable
Function
The interference co-channel threshold command configures the alarm threshold for co-
channel interference.
The undo interference co-channel threshold command restores the default alarm threshold
for co-channel interference.
Format
interference co-channel threshold threshold-value
Parameters
Parameter Description Value
threshold-value Specifies the alarm threshold, which is the The value is an integer
percentage of the co-channel interference that ranges from 1 to
power against the maximum power. 100, in percentage.
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Two APs working in the same frequency band interfere with each other. For example, on a
large-scale WLAN (a university campus network), different APs often use the same channel.
When there are overlapping areas among these APs, co-channel interference exists, degrading
network performance.
Example
# Set the alarm threshold for co-channel interference to 60%.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name radio0
[HUAWEI-wlan-radio-2g-prof-radio0] interference detect-enable
[HUAWEI-wlan-radio-2g-prof-radio0] interference co-channel threshold 60
Related Topics
11.1.122 display radio-2g-profile
11.1.123 display radio-5g-profile
11.2.34 interference detect-enable
Format
interference detect-enable
undo interference detect-enable
Parameters
None
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
WLAN wireless channels are vulnerable to interference in surrounding radio environments,
and the service quality is therefore degraded. If interference detection is configured, a monitor
AP can know the radio environment in real time and report alarms to the AC in a timely
manner.
Interference detection enables an AP to detect AP co-channel interference, AP adjacent-
channel interference, and STA interference.
l AP co-channel interference: Two APs working on the same frequency band interfere
with each other. For example, on a large-scale WLAN (a university campus network),
different APs often use the same channel. When there are overlapping areas among these
APs, co-channel interference exists, degrading network performance.
l AP adjacent-channel interference: Two APs with different center frequencies have
overlapping areas, resulting in adjacent-channel interference. Therefore, if APs are
placed too close to each other or they have strong signals, more noise will be produced,
degrading network performance.
l STA interference: If there are many STAs that are managed by other APs around an AP,
services of the STAs managed by the local AP may be affected.
Example
# Enable interference detection.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name radio0
[HUAWEI-wlan-radio-2g-prof-radio0] interference detect-enable
Function
The interference station threshold command configures the alarm threshold for STA
interference.
The undo interference station threshold command restores the default alarm threshold for
STA interference.
Format
interference station threshold threshold-value
Parameters
Parameter Description Value
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
If there are many STAs that are managed by other APs around an AP, services of the STAs
managed by the local AP may be affected.
After the 11.2.34 interference detect-enable command is executed to enable interference
detection, an AP can detect STAs that are managed by other APs. When the AP detects that
the number of such STAs exceeds the alarm threshold configured using the interference
station threshold command, the AP sends an alarm to the AC.
Example
# Set the alarm threshold for STA interference to 50.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name radio0
[HUAWEI-wlan-radio-2g-prof-radio0] interference station threshold 50
Related Topics
11.1.122 display radio-2g-profile
11.1.123 display radio-5g-profile
11.2.34 interference detect-enable
Function
The member command adds an AP radio to a static load balancing group.
The undo member command deletes an AP radio from a load balancing group.
By default, no AP radio is added to a static load balancing group.
Format
member { { ap-name ap-name | ap-id ap-id } [ radio radio-id ] }&<1-16>
undo member { { ap-name ap-name | ap-id ap-id } [ radio radio-id ] }&<1-16>
Parameters
Parameter Description Value
ap-name ap- Specifies the name of an AP. The AP name and The AP name must
name radio ID identify a radio. exist.
ap-id ap-id Specifies the ID of an AP. The AP ID and The AP ID must exist.
radio ID identify a radio.
radio radio-id Specifies a radio ID. The radio ID and AP The value is an integer
name identify a radio. that ranges from 0 to 2.
Only the AP4030TN
supports three radios.
Views
Static load balancing group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can use this command to add an AP radio to or delete an AP radio from a static load
balancing group. When a STA requests to connect to an AP radio in a static load balancing
group, the AC compares the load of the radio and other working radios in the load balancing
group and determines whether to allow the STA to connect to the radio according to a load
balancing algorithm.
Precautions
l If dual-band APs are used, traffic is load balanced among APs working on the same
frequency band.
l Each load balancing group supports a maximum of 16 AP radios.
l Under the agile distributed network architecture composed of the central AP and RUs,
you only need to add radios of the RUs to a static load balancing group.
Example
# Add radio 0 of AP office to the static load balancing group coco.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] sta-load-balance static-group name coco
[HUAWEI-wlan-sta-lb-static-coco] member ap-name office radio 0
Related Topics
11.2.56 sta-load-balance static-group
Function
The power auto-adjust enable command enables signal-strength-based power adjustment for
APs.
Format
power auto-adjust enable
Parameters
None
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The traditional radio power control function sets the power of an AP to a fixed value to keep
the power of all STAs connecting to the AP the same.
You can run the power auto-adjust enable command to enable signal-strength-based power
adjustment. This function enables an AP to detect the signal strength of a STA in a timely
manner. If the AP detects that the signal strength of the STA is strong (for example, the STA
is near the AP), the AP reduces its transmit power when sending packets. If the AP detects
that the signal strength of the STA is weak (for example, the STA is far from the AP), the AP
uses the normal transmit power to send radio signals.
Prerequisites
The power mode has been set to automatic mode using the undo calibrate auto-txpower-
select disable command.
Example
# Enable signal-strength-based power adjustment for APs.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name huawei
[HUAWEI-wlan-radio-2g-prof-huawei] power auto-adjust enable
Related Topics
11.2.10 calibrate auto-txpower-select disable
Function
The reset wlan calibrate statistics command clears radio calibration statistics.
Format
reset wlan calibrate statistics { ap-name ap-name | ap-id ap-id } radio radio-id
Parameters
Parameter Description Value
ap-name ap- Clears radio calibration statistics on the AP The AP name must
name with the specified AP name. The AP name and already exist.
radio ID identify a radio.
radio radio-id Clears calibration statistics about the radio The value is an integer
with the specified radio ID. The radio ID and that ranges from 0 to 2.
AP name identify a radio. Only the AP4030TN
supports three radios.
Views
User view
Default Level
3: Management level
Usage Guidelines
Run the reset wlan calibrate statistics command to clear radio calibration statistics,
including the number of times the radio environment deteriorates and number of times the
radio channel and power are calibrated.
Example
# Clear calibration statistics about radio 0 of AP office.
<HUAWEI> reset wlan calibrate statistics ap-name office radio 0
Related Topics
11.2.29 display wlan calibrate statistics
Function
The rrm-profile command creates an RRM profile and displays the RRM profile view.
The undo rrm-profile command deletes an RRM profile.
By default, the system provides the RRM profile default. You can run the 11.2.22 display
rrm-profile command to view configuration of the RRM profile default.
Format
rrm-profile name profile-name
undo rrm-profile { name profile-name | all }
Parameters
Parameter Description Value
name profile- Specifies the name of an RRM profile. The value is a string of
name 1 to 35 case-insensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
WLAN technology uses radio signals (such as 2.4 GHz or 5 GHz radio waves) as
transmission medium. Radio signals will attenuate when transmitted over the air, degrading
service quality for wireless users. Radio resource management (RRM) enables a WLAN to
adapt to changes in the radio environment by dynamically adjusting radio resources. This
improves service quality for wireless users.
Follow-up Procedure
Run the 11.2.40 rrm-profile (radio profile view) command to bind the RRM profile to a
radio profile so that the RRM profile can take effect.
Example
# Create the RRM profile rrm01.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name rrm01
[HUAWEI-wlan-rrm-prof-rrm01]
Related Topics
11.2.40 rrm-profile (radio profile view)
Format
rrm-profile profile-name
undo rrm-profile
Parameters
Parameter Description Value
profile-name Specifies the name of an RRM profile. The RRM profile name
must already exist.
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
After you create an RRM profile using the 11.2.39 rrm-profile (WLAN view) command,
bind the RRM profile to a radio profile so that the RRM profile can take effect.
Example
# Bind the RRM profile rrm01 to the radio profile office01.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name rrm01
[HUAWEI-wlan-rrm-prof-rrm01] quit
[HUAWEI-wlan-view] radio-2g-profile name office01
[HUAWEI-wlan-radio-2g-prof-office01] rrm-profile rrm01
Related Topics
11.2.39 rrm-profile (WLAN view)
11.2.41 scan-channel-set
Function
The scan-channel-set command configures an air scan channel set.
The undo scan-channel-set command restores the default air scan channel set.
By default, an air scan channel set contains all channels supported by the country code of an
AP.
Format
scan-channel-set { country-channel | dca-channel | work-channel }
undo scan-channel-set
Parameters
Parameter Description Value
Views
Air scan profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After you run the scan-channel-set command to specify an air scan channel set for an AP, the
AP scans channels in the channel set. The collected information is reported to the AC or
server for radio calibration, smart roaming, spectrum analysis, terminal location, or WIDS
data analysis.
Precautions
l If the air scan channel set you specified contains all channels supported by the country
code of the AP, the AP scans data on many channels but the channel scanning lasts for a
long time, which may affect real-time data analysis.
l If you specify a calibration channel set as the air scan channel set, the AP scans data on a
few channels. This reduces the channel scanning time, increases the terminal location
accuracy, and reduces burden on the device.
l If you add only working channels of an AP to the air scan channel set, the AP only scans
the working channels. If the radio working mode is set to monitor, the AP scans all
channels supported by the country code.
Example
# Configure an air scan channel set that contains all calibration channels.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] air-scan-profile name huawei
[HUAWEI-wlan-air-scan-prof-huawei] scan-channel-set dca-channel
Related Topics
11.2.19 display air-scan-profile
11.2.42 scan-interval
Function
The scan-interval command sets an air scan interval.
The undo scan-interval command restores the default air scan profile.
By default, the air scan interval is 60000 ms.
Format
scan-interval scan-time
undo scan-interval
Parameters
Parameter Description Value
Views
Air scan profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After an air scan interval is specified using the scan-interval command, APs scan channels at
the specified intervals.
Precautions
The air scan interval also applies to radio calibration, smart roaming, spectrum analysis,
WLAN location, and WIDS functions.
If the customer has high requirements on real-time data analysis, configure a small air scan
interval using the scan-interval command to improve the scan frequency; however, higher
scan frequency indicates much larger impact on the services.
Example
# Set the air scan interval to 3000 ms for APs.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] air-scan-profile name huawei
[HUAWEI-wlan-air-scan-prof-huawei] scan-interval 3000
Related Topics
11.2.19 display air-scan-profile
11.2.43 scan-period
Function
The scan-period command sets the air scan period.
The undo scan-period command restores the default air scan period.
By default, the air scan period is 60 ms.
Format
scan-period scan-time
undo scan-period
Parameters
Parameter Description Value
Views
Air scan profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the air scan period is configured using the scan-period command, an AP continuously
scans surrounding radio signals in the configured period. After the period expires, the AP
reports the collected information to an AC or server. The information is used for radio
calibration, smart roaming, spectrum analysis, WLAN location, or WIDS data analysis.
Precautions
A longer air scan period indicates more collected data and a more accurate data analysis
result. However, if the air scan period is set too large, WLAN services are affected. You are
advised to use the default value.
Example
# Set the air scan period to 80 ms for APs.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] air-scan-profile name huawei
[HUAWEI-wlan-air-scan-prof-huawei] scan-period 80
Related Topics
11.2.19 display air-scan-profile
Function
The smart-antenna enable command enables the smart antenna function for an AP.
The undo smart-antenna enable command disables the smart antenna function for an AP.
Format
smart-antenna enable
Parameters
None
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the smart antenna function is enabled, an AP can select a proper antenna array based on
STAs' locations, improving signal strength and user experience.
Precautions
Example
# Enable the smart antenna function for an AP.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] smart-antenna enable
Related Topics
11.1.122 display radio-2g-profile
11.1.123 display radio-5g-profile
Function
The smart-roam enable command enables smart roaming.
Format
smart-roam enable
Parameters
None
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a traditional WLAN, when a STA is farther from an AP, the access rate of the STA
becomes lower but the STA still associates with the AP without reinitiating a connection with
the AP or roaming to another AP. This degrades user experience. To prevent this situation,
configure the smart roaming function. When detecting that the SNR or access rate of a STA is
lower than the specified threshold, the AP sends a Disassociation packet to the STA so that
the STA can reconnect or roam to another AP.
Follow-up Procedure
Run the 11.2.47 smart-roam roam-threshold { check-snr | check-rate } command to
configure the trigger mode of smart roaming and the 11.2.48 smart-roam roam-threshold
{ snr | rate } command to configure the smart roaming threshold. After that, APs forcibly
disconnect STAs with SNR or access rate lower than the threshold.
Example
# Enable smart roaming.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name huawei
[HUAWEI-wlan-rrm-prof-huawei] smart-roam enable
Related Topics
11.2.47 smart-roam roam-threshold { check-snr | check-rate }
11.2.48 smart-roam roam-threshold { snr | rate }
Format
smart-roam quick-kickoff-threshold { snr snr-threshold | rate rate-threshold }
Parameters
Parameter Description Value
snr snr- Specifies the SNR-based threshold for quickly The value is an integer
threshold disconnecting STAs. that ranges from 5 to
75, in dB.
rate rate- Specifies the rate-based threshold for quickly The value is an integer
threshold disconnecting STAs. that ranges from 1 to
The rate here refers to the negotiated rate 100, in percentage.
based on the protocol and signal strength when
a STA associates with an AP, instead of the
actual rate of the STA.
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After smart roaming is enabled and the threshold for quickly disconnecting STAs is specified
for an AP using this command, the AP acquires a STA' SNR or rate from data packets sent
from the STA. If the STA' SNR or rate is lower than the specified threshold, the AP forcibly
disconnects the STA so that the STA can reinitiate a connection with the AP or roam to
another AP with strong signals.
l A large threshold may cause STAs to go offline frequently.
l A small threshold may disable STAs from roaming to an AP with stronger signals.
This command is applicable to scenarios that have high requirements on real-time
transmission, such as voice and video scenarios.
Prerequisites
Smart roaming has been enabled using the 11.2.45 smart-roam enable command.
The roaming trigger mode has been set using the 11.2.47 smart-roam roam-threshold
{ check-snr | check-rate } command.
Example
# Set the roaming trigger mode to check-rate and the threshold for quickly disconnecting
STAs to 50%.
<HUAWEI> system-view
[HUAWEI] wlan
Related Topics
11.2.45 smart-roam enable
11.2.48 smart-roam roam-threshold { snr | rate }
Format
smart-roam roam-threshold { check-snr | check-rate }*
undo smart-roam roam-threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the smart roaming function is enabled, the AP forces STAs to log out based on the
configured trigger mode and threshold of smart roaming. When an AP receives a STA's data
packet, the AP learns the STA's SNR or rate from the data packet. If the STA's SNR or rate is
lower than the configured threshold, the AP sends a Disassociation frame to the STA so that
the STA can reinitiate a connection with the AP or roam to another AP with strong signals.
Prerequisites
The smart roaming function has been enabled using the 11.2.45 smart-roam enable
command.
Follow-up Procedure
Run the 11.2.48 smart-roam roam-threshold { snr | rate } command to configure the smart
roaming threshold.
Example
# Set the trigger mode of smart roaming to check-rate.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name huawei
[HUAWEI-wlan-rrm-prof-huawei] smart-roam enable
[HUAWEI-wlan-rrm-prof-huawei] smart-roam roam-threshold check-rate
Related Topics
11.2.45 smart-roam enable
11.2.48 smart-roam roam-threshold { snr | rate }
Format
smart-roam roam-threshold { snr snr-threshold | rate rate-threshold }
undo smart-roam roam-threshold { snr | rate }
Parameters
Parameter Description Value
snr snr- Specifies the SNR threshold for smart The value is an integer
threshold roaming. that ranges from 5 to
If the SNR threshold is 25 dB and noise floor 75, in dB.
is -95 dBm, an STA's SNR is lower than the
threshold when the STA's RSSI is lower than
-70 dBm (25 dB + (-95 dBm) = -70 dBm).
rate rate- Specifies the rate threshold for smart roaming. The value is an integer
threshold The rate here refers to the negotiated rate that ranges from 1 to
based on the protocol and signal strength when 100, in percentage.
a STA associates with an AP, instead of the
actual rate of the STA.
If the maximum capability of the AP and STA
is 54 Mbit/s and the rate threshold is 50%, the
lower rate threshold is considered 27 Mbit/s
(54 Mbit/s x 50% = 27 Mbit/s).
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the smart roaming function is enabled, the AP forces STAs to log out based on the
configured trigger mode and threshold of smart roaming. When an AP receives a STA's data
packet, the AP learns the STA's SNR or rate from the data packet. If the STA's SNR or rate is
lower than the configured threshold, the AP sends a Disassociation frame to the STA so that
the STA can reinitiate a connection with the AP or roam to another AP with strong signals.
l A large threshold may cause STAs to go offline frequently.
l A small threshold may disable STAs from roaming to an AP with stronger signals.
Prerequisites
The smart roaming function has been enabled using the 11.2.45 smart-roam enable
command.
The trigger mode of smart roaming has been configured using the 11.2.47 smart-roam roam-
threshold { check-snr | check-rate } command.
Example
# Set the trigger mode of smart roaming to check-rate and set the smart roaming threshold to
50%.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name huawei
[HUAWEI-wlan-rrm-prof-huawei] smart-roam enable
[HUAWEI-wlan-rrm-prof-huawei] smart-roam roam-threshold check-rate
[HUAWEI-wlan-rrm-prof-huawei] smart-roam roam-threshold rate 50
Related Topics
11.2.45 smart-roam enable
11.2.48 smart-roam roam-threshold { snr | rate }
Function
The smart-roam snr-check-interval command sets a terminal SNR check interval.
The undo smart-roam snr-check-interval command restores the default terminal SNR check
interval.
Format
smart-roam snr-check-interval snr-check-interval
Parameters
Parameter Description Value
snr-check- Specifies the terminal SNR check interval. The value is an integer
interval that ranges from 3 to
30, in seconds.
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After smart roaming is enabled, you can run the smart-roam snr-check-interval command to
set the terminal SNR check interval. If the device detects that a terminal's SNR remains lower
than the threshold in three consecutive intervals, the device triggers terminal roaming or
forcibly disconnects the terminal.
Prerequisites
The smart roaming function has been enabled using the 11.2.45 smart-roam enable
command.
Configuration Impact
The value of smart-roam snr-check-interval affects the device's sensitivity for triggering
terminal roaming or forcible logout of terminals. A smaller check interval indicates a higher
sensitivity, that is, the device detects whether the terminal's SNR falls below the roaming
threshold or offline threshold more easily and triggers terminal roaming more actively. If the
check interval is set too large, the device triggers terminal roaming or forcibly disconnects
terminals only when the terminals' SNR is lower than the threshold for a specified consecutive
count.
Example
# Set the terminal SNR check interval to 5s.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name huawei
[HUAWEI-wlan-rrm-prof-huawei] smart-roam enable
[HUAWEI-wlan-rrm-prof-huawei] smart-roam snr-check-interval 5
Related Topics
11.2.45 smart-roam enable
Function
The smart-roam snr-margin command sets the SNR difference threshold that triggers
terminal roaming.
The undo smart-roam snr-margin command restores the default SNR difference threshold
that triggers terminal roaming.
By default, the higher and lower SNR difference thresholds that trigger terminal roaming is 15
dB and 6 dB, respectively.
Format
smart-roam snr-margin high-level-margin high-level-margin low-level-margin low-level-
margin
Parameters
Parameter Description Value
high-level- Specifies the higher SNR difference threshold The value is an integer
margin high- that triggers terminal roaming. that ranges from 10 to
level-margin 20, in dB.
low-level- Specifies the lower SNR difference threshold The value is an integer
margin low- that triggers terminal roaming. that ranges from 3 to
level-margin 15, in dB.
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After smart roaming is enabled, you can run the smart-roam snr-margin command to set the
SNR difference threshold that triggers terminal roaming. Before roaming, a STA compares the
SNR of the current AP and neighboring AP and roams only when the SNR difference between
the two APs is larger than the specified difference threshold.
There are two thresholds: higher and low SNR difference thresholds applicable to good and
poor radio environments, respectively. A STA actively roams in good radio environments
where the signal strength of the current AP is greater than or equal to 35 dB, and the SNR
difference between the current AP and neighbor AP exceeds high-level-margin. In poor radio
environments, the STA roams when the SNR of the current AP is smaller than 35 dB and the
SNR difference between the current and neighbor APs is larger than low-level-margin.
Prerequisites
The smart roaming function has been enabled using the 11.2.45 smart-roam enable
command.
Example
# Set the higher and lower SNR difference thresholds that trigger terminal roaming to 10 dB
and 6 dB, respectively.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name huawei
[HUAWEI-wlan-rrm-prof-huawei] smart-roam enable
[HUAWEI-wlan-rrm-prof-huawei] smart-roam snr-margin high-level-margin 10 low-
level-margin 6
Related Topics
11.2.45 smart-roam enable
Format
smart-roam unable-roam-client expire-time expire-time
undo smart-roam unable-roam-client expire-time
Parameters
Parameter Description Value
expire-time Specifies the aging time of "unable to roam" The value is an integer
record. that ranges from 30 to
2880, in minutes.
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After smart roaming is enabled, you can run the smart-roam unable-roam-client expire-
time command to set the aging time of "unable to roam" record for terminals. When the AC
requests a terminal to roam but the terminal keeps sending association requests to the original
AP or does not initiate an association request, the AC records the terminal as unable to roam
and does not trigger terminal roaming within the specified time. After the aging time is
reached, "unable to roam" record of the terminal is automatically cleared, and the system can
trigger roaming of the terminal.
A terminal is recorded as unable to roam due to the following reasons:
l Due to different software configurations, some terminals preferentially send association
requests to APs with which they have once associated.
The aging time to configure varies for different reasons. A large aging time is used for the
software configuration reason so that the AP will trigger roaming of the terminals as less as
possible. However, a small aging time is used in other situations so that the AP will attempt to
trigger roaming of the terminals marked unable to roam.
Prerequisites
The smart roaming function has been enabled using the 11.2.45 smart-roam enable
command.
Example
# Set the aging time of "unable to roam" record to 50 minutes.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name huawei
[HUAWEI-wlan-rrm-prof-huawei] smart-roam enable
[HUAWEI-wlan-rrm-prof-huawei] smart-roam unable-roam-client expire-time 50
Related Topics
11.2.45 smart-roam enable
Function
The sta-load-balance dynamic deny-threshold command sets the maximum number of
times an AP rejects association requests of a STA for dynamic load balancing.
Format
sta-load-balance dynamic deny-threshold deny-threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
If a STA requests to associate with an AP enabled with load balancing but the AP forbids the
association according to the dynamic load balancing algorithm, the AP will reject the STA's
request. However, after the number of rejections exceeds the maximum value specified by
sta-load-balance dynamic deny-threshold command, the AP allows the STA to associate.
Example
# Set the maximum number of rejections to 8 for the terminal huawei.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name huawei
[HUAWEI-wlan-rrm-prof-huawei] sta-load-balance dynamic deny-threshold 8
Related Topics
11.2.54 sta-load-balance dynamic gap-threshold
11.2.55 sta-load-balance dynamic start-threshold
Function
The sta-load-balance dynamic enable command enables the dynamic load balancing
function.
The undo sta-load-balance dynamic enable command disables the dynamic load balancing
function.
Format
sta-load-balance dynamic enable
Parameters
None
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Static load balancing limits the maximum number of AP radios to 16 and allows only radios
on the same frequency band to join a load balancing group. Additionally, a load balancing
group needs to be manually specified. Dynamic load balancing overcomes the limitations of
static load balancing.
In dynamic load balancing mode, a STA sends broadcast Probe Request frame to scan
available APs. The APs that receive the Probe Request frame all report the STA information
to the AC. The AC adds these APs to a load balancing group, and then uses a load balancing
algorithm to determine whether to allow access from the STA.
Example
# Enable dynamic load balancing.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name huawei
[HUAWEI-wlan-rrm-prof-huawei] sta-load-balance dynamic enable
Format
sta-load-balance dynamic gap-threshold gap-threshold
undo sta-load-balance dynamic gap-threshold
Parameters
Parameter Description Value
gap-threshold Specifies the load difference threshold for The value is an integer
dynamic load balancing. that ranges from 1 to
100, in percentage.
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
In dynamic load balancing mode, an AC uses a load balancing algorithm to determine
whether to allow a STA to associate with a radio. The load balancing algorithm is as follows:
When a STA requests to connect to an AP, the AP will count the total number of access users
on all radios. If the total number of access users does not exceed start-threshold configured
using the 11.2.55 sta-load-balance dynamic start-threshold command, the AP does not
implement dynamic load balancing. The AP implements dynamic load balancing only when
the total number of access users on all radios exceeds start-threshold.
When implementing dynamic load balancing, the AC calculates the load percentage of each
radio in a load balancing group using the formula: Load percentage of a radio = (Number of
associated STAs on the radio/Maximum number of STAs allowed on the radio) x 100%. The
AC compares load percentages of all radios in the load balancing group and obtains the
smallest load percentage value. When a STA requests to associate with an AP radio, the AC
calculates the difference between the radio's load percentage and the smallest load percentage
value and compares the load difference with the threshold. If the load difference is smaller
than the threshold, the AC allows the STA to associate with the radio. If not, the AC rejects
the association request of the STA. If the STA continues sending association requests to this
AP, the AC allows the STA to associate with the AP when the number of consecutive
association attempts of the STA exceeds the maximum number of rejection times configured
using the 11.2.52 sta-load-balance dynamic deny-threshold command on the AC.
Example
# Set the load difference threshold to 25 in the RRM profile huawei.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name huawei
[HUAWEI-wlan-rrm-prof-huawei] sta-load-balance dynamic gap-threshold 25
Related Topics
11.2.52 sta-load-balance dynamic deny-threshold
11.2.55 sta-load-balance dynamic start-threshold
Function
The sta-load-balance dynamic start-threshold command sets the start threshold for
dynamic load balancing.
The undo sta-load-balance dynamic start-threshold command restores the default start
threshold for dynamic load balancing.
Format
sta-load-balance dynamic start-threshold start-threshold
undo sta-load-balance dynamic start-threshold
Parameters
Parameter Description Value
start-threshold Specifies the start threshold for dynamic load The value is an integer
balancing. that ranges from 1 to
40.
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
When a STA requests to connect to an AP, the AP will count the total number of access users
on all radios. If the number of access users on the requested radio does not exceed start-
threshold, the AP does not implement dynamic load balancing. The AP implements dynamic
load balancing only after the number of access users exceeds start-threshold.
Example
# Set the start threshold to 20 in the RRM profile huawei.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name huawei
[HUAWEI-wlan-rrm-prof-huawei] sta-load-balance dynamic start-threshold 20
Related Topics
11.2.52 sta-load-balance dynamic deny-threshold
11.2.54 sta-load-balance dynamic gap-threshold
Format
sta-load-balance static-group name group-name
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
In static load balancing mode, APs providing the same services are manually added to a load
balancing group. When a STA needs to access a WLAN, it sends an Association Request
packet to an AC through an AP. The AC determines whether to allow access from the STA
according to the load balancing algorithm.
To configure static load balancing, run the sta-load-balance static-group command in the
WLAN view to create a static load balancing group and 11.2.36 member (static load
balancing group view) command to add APs to the group.
Example
# Configure the static load balancing group named new.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] sta-load-balance static-group name new
[HUAWEI-wlan-sta-lb-static-new]
Related Topics
11.2.23 display sta-load-balance static-group
11.2.57 start-threshold
Function
The start-threshold command sets the start threshold for load balancing in a static load
balancing group.
The undo start-threshold command deletes the configured start threshold for load balancing
in a static load balancing group.
By default, the start threshold for load balancing in a static load balancing group is 10.
Format
start-threshold start-threshold-value
undo start-threshold
Parameters
Parameter Description Value
start-threshold- Specifies the start threshold for load balancing The value is an integer
value in a static load balancing group. that ranges from 1 to
40.
Views
Static load balancing group view
Default Level
2: Configuration level
Usage Guidelines
You can use this command to set the start threshold for load balancing in a static load
balancing group. If the load on a radio does not reach the start threshold, the device does not
implement load balancing control on access STAs.
Example
# Set the start threshold for load balancing to 8 for the static load balancing group coco.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] sta-load-balance static-group name coco
[HUAWEI-wlan-sta-lb-static-coco] start-threshold 5
Related Topics
11.2.56 sta-load-balance static-group
Format
uac channel-utilization threshold access access-threshold [ roam roam-threshold ]
undo uac channel-utilization threshold
Parameters
Parameter Description Value
access access- Specifies the user CAC access The value is an integer that ranges
threshold threshold based on channel from 1 to 100, in percentage.
usage.
roam roam- Specifies the user CAC roaming The value is an integer that ranges
threshold threshold based on channel from 1 to 100, in percentage.
usage.
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On WLANs where many users exist, such as WLANs in high density scenarios, users
compete fiercely to occupy the channels as the number of online users increases. As a result,
network quality deteriorates. To ensure network access experience of online users, configure
the user CAC function. The user CAC function allows an AP to control user access based on
the thresholds specified according to the radio channel usage, number of online users, or
terminal SNR, which enables provisioning of high-quality network access services.
l User CAC based on channel usage uses a complex algorithm but is accurately
implemented to ensure service quality. This mode is recommended when service types
and traffic volumes differ greatly among users.
l User CAC based on the number of users is less accurate but uses a simple algorithm.
This mode is recommended when most users have the same type of services and similar
service traffic volumes.
l SNR-based user CAC controls access from weak-signal users, applicable to scenarios
where the WLAN has good signal coverage and weak signals only at the edge of WLAN
coverage areas.
user CAC based on channel usage and user CAC based on the number of access users cannot
be configured simultaneously, but either of them can be configured together with user CAC
based on terminal SNR.
Prerequisites
The user CAC function based on channel usage has been enabled using the 11.2.59 uac
{ client-number | channel-utilization } enable command.
Example
# Set the user CAC access and roaming thresholds both to 50%.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name huawei
[HUAWEI-wlan-rrm-prof-huawei] uac channel-utilization enable
[HUAWEI-wlan-rrm-prof-huawei] uac channel-utilization threshold access 50 roam 50
Related Topics
11.2.59 uac { client-number | channel-utilization } enable
Function
The uac { client-number | channel-utilization } enable command enables user CAC based
on the channel usage or number of users.
The uac { client-number | channel-utilization } enable command disables user CAC based
on the channel usage or number of users.
By default, user CAC based on channel usage and user CAC based on the number of users are
disabled.
Format
uac { client-number | channel-utilization } enable
Parameters
Parameter Description Value
client-number Controls user access based on the number of users. -
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On WLANs where many users exist, such as WLANs in high density scenarios, users
compete fiercely to occupy the channels as the number of online users increases. As a result,
network quality deteriorates. To ensure network access experience of online users, configure
the user CAC function. The user CAC function allows an AP to control user access based on
the thresholds specified according to the radio channel usage, number of online users, or
terminal SNR, which enables provisioning of high-quality network access services.
l User CAC based on channel usage uses a complex algorithm but is accurately
implemented to ensure service quality. This mode is recommended when service types
and traffic volumes differ greatly among users.
l User CAC based on the number of users is less accurate but uses a simple algorithm.
This mode is recommended when most users have the same type of services and similar
service traffic volumes.
l SNR-based user CAC controls access from weak-signal users, applicable to scenarios
where the WLAN has good signal coverage and weak signals only at the edge of WLAN
coverage areas.
user CAC based on channel usage and user CAC based on the number of access users cannot
be configured simultaneously, but either of them can be configured together with user CAC
based on terminal SNR.
Follow-up Procedure
Run the 11.2.60 uac client-number threshold command to configure the user CAC threshold
based on the number of users or run the 11.2.58 uac channel-utilization threshold command
to configure the user CAC threshold based on channel usage.
Run the 11.2.63 uac reach-access-threshold hide-ssid command to configure the AP to
automatically hide its SSID when the number of users reaches the user CAC threshold for
new users.
Example
# Enable user CAC based on the number of users.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name huawei
[HUAWEI-wlan-rrm-prof-huawei] uac client-number enable
Related Topics
11.2.60 uac client-number threshold
11.2.58 uac channel-utilization threshold
11.2.63 uac reach-access-threshold hide-ssid
Format
uac client-number threshold access access-threshold [ roam roam-threshold ]
undo uac client-number threshold
Parameters
Parameter Description Value
access access- Specifies the user CAC access The value is an integer that
threshold threshold based on the number of ranges from 1 to 256.
users.
256
roam roam- Specifies the user CAC roaming The value is an integer that
threshold threshold based on the number of ranges from 1 to 256.
users.
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On WLANs where many users exist, such as WLANs in high density scenarios, users
compete fiercely to occupy the channels as the number of online users increases. As a result,
network quality deteriorates. To ensure network access experience of online users, configure
the user CAC function. The user CAC function allows an AP to control user access based on
the thresholds specified according to the radio channel usage, number of online users, or
terminal SNR, which enables provisioning of high-quality network access services.
NOTE
The user CAC threshold is invalid for roaming users. For example, if the user CAC threshold is 20 and there
are already 20 access users, local users cannot connect to the network but roaming users can still connect to
the network.
l User CAC based on channel usage uses a complex algorithm but is accurately
implemented to ensure service quality. This mode is recommended when service types
and traffic volumes differ greatly among users.
l User CAC based on the number of users is less accurate but uses a simple algorithm.
This mode is recommended when most users have the same type of services and similar
service traffic volumes.
l SNR-based user CAC controls access from weak-signal users, applicable to scenarios
where the WLAN has good signal coverage and weak signals only at the edge of WLAN
coverage areas.
user CAC based on channel usage and user CAC based on the number of access users cannot
be configured simultaneously, but either of them can be configured together with user CAC
based on terminal SNR.
Prerequisites
The user CAC function based on the number of users has been enabled using the 11.2.59 uac
{ client-number | channel-utilization } enable command.
Example
# Set the user CAC access and roaming thresholds based on the number of users both to 50.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name huawei
[HUAWEI-wlan-rrm-prof-huawei] uac client-number enable
[HUAWEI-wlan-rrm-prof-huawei] uac client-number threshold access 50 roam 50
Related Topics
11.2.59 uac { client-number | channel-utilization } enable
Function
The uac client-snr enable command enables user CAC based on terminal SNR.
The undo uac client-snr enable command disables user CAC based on terminal SNR.
By default, user CAC based on terminal SNR is disabled.
Format
uac client-snr enable
Parameters
None
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On WLANs where many users exist, such as WLANs in high density scenarios, users
compete fiercely to occupy the channels as the number of online users increases. As a result,
network quality deteriorates. To ensure network access experience of online users, configure
the user CAC function. The user CAC function allows an AP to control user access based on
the thresholds specified according to the radio channel usage, number of online users, or
terminal SNR, which enables provisioning of high-quality network access services.
l User CAC based on channel usage uses a complex algorithm but is accurately
implemented to ensure service quality. This mode is recommended when service types
and traffic volumes differ greatly among users.
l User CAC based on the number of users is less accurate but uses a simple algorithm.
This mode is recommended when most users have the same type of services and similar
service traffic volumes.
l SNR-based user CAC controls access from weak-signal users, applicable to scenarios
where the WLAN has good signal coverage and weak signals only at the edge of WLAN
coverage areas.
user CAC based on channel usage and user CAC based on the number of access users cannot
be configured simultaneously, but either of them can be configured together with user CAC
based on terminal SNR.
Follow-up Procedure
Run the 11.2.62 uac client-snr threshold command to configure the user CAC threshold
based on the terminal SNR.
Example
# Enable user CAC based on the terminal SNR.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name huawei
[HUAWEI-wlan-rrm-prof-huawei] uac client-snr enable
Related Topics
11.2.62 uac client-snr threshold
Function
The uac client-snr threshold command configures the user CAC threshold based on terminal
SNR.
The undo uac client-snr threshold command restores the default user CAC threshold based
on terminal SNR.
Format
uac client-snr threshold threshold
Parameters
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On WLANs where many users exist, such as WLANs in high density scenarios, users
compete fiercely to occupy the channels as the number of online users increases. As a result,
network quality deteriorates. To ensure network access experience of online users, configure
the user CAC function. The user CAC function allows an AP to control user access based on
the thresholds specified according to the radio channel usage, number of online users, or
terminal SNR, which enables provisioning of high-quality network access services.
l User CAC based on channel usage uses a complex algorithm but is accurately
implemented to ensure service quality. This mode is recommended when service types
and traffic volumes differ greatly among users.
l User CAC based on the number of users is less accurate but uses a simple algorithm.
This mode is recommended when most users have the same type of services and similar
service traffic volumes.
l SNR-based user CAC controls access from weak-signal users, applicable to scenarios
where the WLAN has good signal coverage and weak signals only at the edge of WLAN
coverage areas.
user CAC based on channel usage and user CAC based on the number of access users cannot
be configured simultaneously, but either of them can be configured together with user CAC
based on terminal SNR.
Prerequisites
The user CAC function based on terminal SNR has been enabled using the 11.2.61 uac client-
snr enable command.
Example
# Set the user CAC threshold based on terminal SNR to 50 dB.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name huawei
[HUAWEI-wlan-rrm-prof-huawei] uac client-snr enable
[HUAWEI-wlan-rrm-prof-huawei] uac client-snr threshold 50
Related Topics
11.2.61 uac client-snr enable
Function
The uac reach-access-threshold hide-ssid command configures SSID hiding for user CAC.
Format
uac reach-access-threshold hide-ssid
Parameters
None
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the user CAC function is configured, the AP denies access of new users if the number of
users on the AP reaches the threshold specified for new users. To prevent new users from
discovering the SSID of the AP to continue sending association requests, configure SSID
hiding to disable the AP radio from advertising SSIDs of VAPs.
Prerequisites
The CAC function based on the channel usage or number of users has been enabled using the
uac { client-number | channel-utilization } enable command.
Precautions
The undo uac { client-number | channel-utilization } enable command disables CAC based
on the channel usage or number of users and automatically cancels SSID hiding.
Example
# Enable SSID hiding.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name huawei
[HUAWEI-wlan-rrm-prof-huawei] uac client-number enable
[HUAWEI-wlan-rrm-prof-huawei] uac reach-access-threshold hide-ssid
Related Topics
11.2.59 uac { client-number | channel-utilization } enable
Format
display spectrum-analysis server-reporter
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The display spectrum-analysis server-reporter command displays a list of APs that report
spectrum packets to the spectrum server.
Example
# Display all APs that report spectrum packets to the spectrum server.
<HUAWEI> display spectrum-analysis server-reporter
------------------------------------------------------------
ID AP name Radio ID
------------------------------------------------------------
1 AP_1 0
------------------------------------------------------------
Total: 1
Related Topics
11.3.7 spectrum-report
Function
The display wlan non-wifi-device command displays information about detected non-Wi-Fi
devices.
Format
display wlan non-wifi-device { all | { ap-name ap-name | ap-id ap-id } radio radio-id }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After the function of reporting spectrum data is enabled on an AP radio using the 11.3.7
spectrum-report command, you can run the display wlan non-wifi-device command to
check information about the detected non-Wi-Fi devices.
Example
# Display information about the non-Wi-Fi devices detected by all APs.
<HUAWEI> display wlan non-wifi-device all
----------------------------------------------------------------
Detect AP name : huawei
Detect AP radio ID : 1
Detect AP channel : 44
Non-Wi-Fi device type : 9
Non-Wi-Fi device name : Unknown fix freq device
Non-Wi-Fi device frequency type : Narrow bandwidth
Non-Wi-Fi device channel : 147,148
Non-Wi-Fi device RSSI : -59,-66
Non-Wi-Fi device detect time last Detection time for the non-Wi-Fi device.
Related Topics
11.3.7 spectrum-report
Format
display wlan non-wifi-device history { all | { ap-name ap-name | ap-id ap-id } radio radio-
id }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After the aging time of non-Wi-Fi devices is set on the AC using the 11.3.5 spectrum-
analysis non-wifi-device aging-time command, the AC adds a non-Wi-Fi device to the
historical list if an AP does not send information about the non-Wi-Fi device to the AC again.
Example
# Display information about the non-Wi-Fi devices detected by all APs in the historical list.
<HUAWEI> display wlan non-wifi-device history all
----------------------------------------------------------------
S/No. : 0
Detect AP name : huawei
Detect AP radio ID : 1
Detect AP channel : 44
Non-Wi-Fi device type : 9
Non-Wi-Fi device name : Unknown fix freq device
Non-Wi-Fi device frequency type : Narrow bandwidth
Non-Wi-Fi device channel : 147,148
Non-Wi-Fi device RSSI : -59,-66
Non-Wi-Fi device detect time last : 2014-11-19/17:05:05
Non-Wi-Fi device center frequency(MHz) : 5739
Non-Wi-Fi device bandwidth(KHz) : 2708
Non-Wi-Fi device duty(%) : 79
Non-Wi-Fi device interfere level : 3
----------------------------------------------------------------
Total: 1
Table 11-108 Description of the display wlan non-wifi-device history command output
Item Description
Non-Wi-Fi device detect time last Detection time for the non-Wi-Fi device.
Related Topics
11.3.5 spectrum-analysis non-wifi-device aging-time
Format
spectrum-analysis enable
undo spectrum-analysis enable
Parameters
None
Views
AP radio view, AP group radio view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If interference exists on a WLAN, enable spectrum analysis on some APs of the WLAN to
implement spectrum scanning, sampling, and analysis on the wireless signals. The spectrum
analysis function helps identify non-Wi-Fi interference on the WLAN and locate non-Wi-Fi
devices so that radio calibration can be implemented.
Precautions
If the WDS or Mesh service is configured on a radio, the command cannot be executed in the
radio view.
Example
# Enable spectrum analysis on radio 0 of the AP with ID 1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-id 1
[HUAWEI-wlan-ap-1] radio 0
[HUAWEI-wlan-radio-1/0]spectrum-analysis enable
Function
The spectrum-analysis non-wifi-device aging-time command configures the aging time of
non-Wi-Fi devices on the AC during spectrum analysis.
Format
spectrum-analysis non-wifi-device aging-time aging-time
Parameters
Parameter Description Value
aging-time Specifies the aging time of non-Wi-Fi devices The value is an integer
on the AC. that ranges from 1 to
30, in minutes.
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When the AC is configured as the spectrum analysis server using the 11.3.6 spectrum-
analysis server command, the AC stores information about analyzed non-Wi-Fi devices. If an
AP does not report information about a non-Wi-Fi device to the AC again within the aging
time configured using the spectrum-analysis non-wifi-device aging-time command, the AC
adds the non-Wi-Fi device to the historical list. You can run the 11.3.3 display wlan non-
wifi-device history command to check information about non-Wi-Fi devices in the historical
list.
Precautions
Currently, the AC cannot identify different devices of the same type. For example, when the
AC detects two bluetooth devices: A and B, the AC can only record the devices as a bluetooth
device and update the detection time of the bluetooth device.
Example
# Set the aging time of non-Wi-Fi devices on the AC to 5 minutes.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] spectrum-analysis non-wifi-device aging-
time 5
Related Topics
11.1.112 display ap-system-profile
11.3.3 display wlan non-wifi-device history
11.3.6 spectrum-analysis server
Function
The spectrum-analysis server command specifies the IP address and port number of a
spectrum server.
The undo spectrum-analysis server command deletes the specified IP address and port
number of a spectrum server.
Format
spectrum-analysis server ip-address ip-address port port-number [ via-ac ac-port ac-port-
number ]
Parameters
Parameter Description Value
ip-address ip- Specifies the IPv4 address of a spectrum The value is in dotted
address server. decimal notation.
port port- Specifies the port number (UDP port number) The value is an integer
number of a spectrum server. that ranges from 5000
to 65535.
ac-port ac- Specifies the port number used by the AC to The value is an integer
port-number receive spectrum data (in UDP packets) from that ranges from 5000
the AP. to 65535.
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
After collecting the spectrum data, an AP encapsulates the collected data into UDP packets
and sends the packets to the spectrum server. The spectrum server draws a spectrum and
displays the spectrum information of the detected non-Wi-Fi devices to users through images.
l If the AP uploads the collected data directly to the spectrum server, you do not need to
configure the via-ac ac-port ac-port-number command.
l If the AP uploads the collected data to the spectrum server via the AC, configure the via-
ac ac-port ac-port-number command.
l If no spectrum server is available, to view the spectrum in the web system, specify a
valid IP address and port number for the spectrum server (The specified values do not
take effect.) and configure the via-ac ac-port ac-port-number command.
Example
# Set the IP address and port number of a spectrum server to 10.137.43.4 and 55555.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] spectrum-analysis server ip-address
10.137.43.4 port 55555
Related Topics
11.1.112 display ap-system-profile
11.3.7 spectrum-report
11.3.7 spectrum-report
Function
The spectrum-report command enables the function of reporting spectrum data on an AP
radio.
The undo spectrum-report command disables the function of reporting spectrum data on an
AP radio.
Format
spectrum-report { ap-name ap-name | ap-id ap-id } radio radio-id
undo spectrum-report { { ap-name ap-name | ap-id ap-id } [ radio radio-id ] | all }
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the function of reporting spectrum data is enabled on an AP radio, the AP encapsulates
collected data into UDP packets and send the packets to the spectrum server. After receiving
the data, the spectrum server analyzes the data and then displays radio information of non-Wi-
Fi devices to users through images or tables.
Prerequisites
The spectrum analysis function has been enabled on a radio using the 11.3.4 spectrum-
analysis enable command.
Follow-up Procedure
Run the 11.3.6 spectrum-analysis server command in the spectrum profile view to specify
the IP address and port number of the spectrum server.
Precautions
The spectrum-report command becomes invalid after a restart and needs to be configured
again.
Example
# Enable the function of reporting spectrum data on radio 0 of AP ap-huawei.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] spectrum-report ap-name ap-huawei radio 0
Related Topics
11.3.4 spectrum-analysis enable
11.3.6 spectrum-analysis server
Function
The reset wlan non-wifi-device command clears information about detected non-Wi-Fi
devices.
Format
reset wlan non-wifi-device { all | { ap-name ap-name | ap-id ap-id } radio radio-id }
Parameters
Parameter Description Value
ap-name ap-name Clears information about the The AP name must already
non-Wi-Fi devices detected exist.
by a specified AP name.
radio radio-id Clears information about the The value is an integer that
non-Wi-Fi devices detected ranges from 0 to 2.
by a specified AP radio. Only the AP4030TN
supports three radios.
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Before recollecting information about detected non-Wi-Fi devices in a period, you can run the
reset command to clear existing information so that the AC can recollect information.
Prerequisites
Impact
The cleared non-Wi-Fi device information cannot be restored. Exercise caution when you use
the reset command. After the command is run, you can run the 11.3.3 display wlan non-wifi-
device history command to view related information.
Example
# Clear information about the non-Wi-Fi devices detected by all APs.
<HUAWEI> reset wlan non-wifi-device all
Related Topics
11.3.3 display wlan non-wifi-device history
Function
The reset wlan non-wifi-device history command clears information about non-Wi-Fi
devices in the historical list.
Format
reset wlan non-wifi-device history { all | { ap-name ap-name | ap-id ap-id } radio radio-
id }
Parameters
Parameter Description Value
ap-name ap-name Clears information about the The AP name must exist.
non-Wi-Fi devices detected
by a specified AP name in
the historical list.
radio radio-id Clears information about the The value is an integer that
non-Wi-Fi devices detected ranges from 0 to 2.
by a specified AP radio in Only the AP4030TN
the historical list. supports three radios.
Views
All views
Default Level
3: Management level
Usage Guidelines
The reset wlan non-wifi-device history command clears information about non-Wi-Fi
devices in the historical list.
Example
# Clear information about the non-Wi-Fi devices detected by all APs in the historical list.
<HUAWEI> reset wlan non-wifi-device history all
Related Topics
11.3.2 display wlan non-wifi-device
11.3.3 display wlan non-wifi-device history
Function
The display station roam-track command displays the roaming track of a STA.
Format
display station roam-track sta-mac mac-address
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
During the roaming process of a STA, the AC records the STA's roaming track (that is,
information about the APs that the STA connects to). You can run the display station roam-
track command to view the roaming track of the STA.
Example
# Display the roaming track of the STA with the MAC address 0011-43c7-d73e.
<HUAWEI> display station roam-track sta-mac 0011-43c7-d73e
Access SSID:huawei
Rx/Tx:link receive rate/link transmit rate(Mbps)
------------------------------------------------------------------------------
L2/L3 AC IP AP name Radio ID
BSSID TIME In/Out RSSI Out Rx/Tx
------------------------------------------------------------------------------
-- 192.168.109.1 Huawei1 1
dcd2-fc9d-0bb0 2015/01/12 16:52:58 -51/-48 46/13
L2(r) 192.168.109.1 Huawei2 1
e468-a34d-afb0 2015/01/12 16:55:45 -58/- -/-
------------------------------------------------------------------------------
Number: 1
Item Description
Function
The airtime-fair-schedule enable command enables airtime fair scheduling on an AP radio.
Format
airtime-fair-schedule enable
Parameters
None
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a WLAN, the physical layer rates of users have great differences due to different radio
modes supported by the terminals or radio environment where the terminals reside. If the
users with lower physical layer rates occupy wireless channels for a long period, user
experience of the entire WLAN is affected. Airtime fair scheduling calculates the channel
occupation time of users transmitting the same service and preferentially schedules resources
for the users who occupy the wireless channel for a shorter period. This ensures fairness in
channel usage.
After airtime fair scheduling is enabled, the device collects statistics on the channel
occupation time used by users connected to the same radio for sending packets, creates the
mapping table for the channel occupation time of each user in accumulated mode, and
establishes a sorted link table based on the time in an ascending order. Based on the mapping
table, an AP transmits data with the user who occupies the channel for the shortest time,
ensuring that each user can equally occupy the wireless channels. The data packets of high-
speed users are transmitted quickly, which is not affected by the data transmission time of
low-speed users. This improves the overall user experience.
After WMM is enabled on the device and terminals, user packets are scheduled based on
different types (service types include VI, VO, BE, and BK). For example, voice packets are
scheduled only with other voice packets, and video packets are scheduled only with other
video packets.
Precautions
If the packets of multiple users are of different types, airtime fair scheduling is not performed.
For example, two users perform packet transmission: one transmits voice packets and the
other transmits video packets. In this case, airtime fair scheduling is not performed for the two
users.
When the command is executed, the system displays the message "Warning: This action may
cause service interruption. Continue?[Y/N]", asking you whether you want to continue.
Example
# Enable airtime fair scheduling in RRM profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] airtime-fair-schedule enable
Related Topics
11.2.39 rrm-profile (WLAN view)
Function
The display references traffic-profile command displays the reference information of a
traffic profile.
Format
display references traffic-profile name profile-name
Parameters
Parameter Description Value
name profile- Displays the reference information of a The traffic profile must
name specified traffic profile. exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to check the VAP profiles by which a specified traffic profile is
referenced.
Example
# Display the reference information of the traffic profile p1.
<HUAWEI> display references traffic-profile name p1
----------------------------------------------------
Reference type Reference name
----------------------------------------------------
VAP profile default
VAP profile wlan-vap
VAP profile jsl
VAP profile test
VAP profile wlan-vap1
VAP profile huawei
VAP profile 2
----------------------------------------------------
Total: 7
Item Description
Format
display traffic-profile { all | name profile-name }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display traffic-profile command to check default configurations of a new
traffic profile or configurations of an existing traffic profile.
Example
# Display configuration information about a traffic profile that maps the user priority of
802.11 packets to the DSCP priority of tunnel packets when packets are sent to the AC from
the AP.
<HUAWEI> display traffic-profile name p1
----------------------------------------------------
Profile ID : 1
Priority map downstream trust : DSCP
User isolate mode : disable
Rate limit client up(Kbps) : 4294967295
Rate limit client down(Kbps) : 4294967295
Rate limit VAP up(Kbps) : 4294967295
# Display configuration information about a traffic profile that maps the DSCP priority of
802.11 packets to the DSCP priority of tunnel packets when packets are sent to the AC from
the AP.
<HUAWEI> display traffic-profile name p1
----------------------------------------------------
Profile ID : 1
Priority map downstream trust : DSCP
User isolate mode : disable
Rate limit client up(Kbps) : 4294967295
Rate limit client down(Kbps) : 4294967295
Rate limit VAP up(Kbps) : 4294967295
Rate limit VAP down(Kbps) : 4294967295
Traffic optimize ARP proxy : disable
Traffic optimize ND proxy : disable
Traffic optimize ARP unicast send : enable
Traffic optimize ND unicast send : enable
Traffic optimize DHCP unicast send : disable
Traffic optimize multicast send deny : disable
vIIGMP snooping : enable
IGMP snooping report suppress : disable
Traffic optimize broadcast suppression(pps): -
Traffic optimize multicast suppression(pps): -
Traffic optimize unicast suppression(pps): -
Traffic optimize multicast to unicast: disable
Traffic optimize TCP adjust MSS(bytes): 1380
TTraffic filter inbound ACL : -
Traffic filter outbound ACL : -
Priority map upstream trust : DSCP
WMM priority downstream map mode: DSCP map 802.11e
0-7 map 0
8-15 map 1
16-23 map 2
24-31 map 3
32-39 map 4
40-47 map 5
48-55 map 6
56-63 map 7
priority upstream map mode: DSCP map DSCP
0 map 0
1 map 1
2 map 2
3 map 3
4 map 4
5 map 5
6 map 6
7 map 7
8 map 8
9 map 9
10 map 10
11 map 11
12 map 12
13 map 13
14 map 14
15 map 15
16 map 16
17 map 17
18 map 18
19 map 19
20 map 20
21 map 21
22 map 22
23 map 23
24 map 24
25 map 25
26 map 26
27 map 27
28 map 28
29 map 29
30 map 30
31 map 31
32 map 32
33 map 33
34 map 34
35 map 35
36 map 36
37 map 37
38 map 38
39 map 39
40 map 40
41 map 41
42 map 42
43 map 43
44 map 44
45 map 45
46 map 46
47 map 47
48 map 48
49 map 49
50 map 50
51 map 51
52 map 52
53 map 53
54 map 54
55 map 55
56 map 56
57 map 57
58 map 58
59 map 59
60 map 60
61 map 61
62 map 62
63 map 63
----------------------------------------------------
Priority map downstream trust Mapping from the 802.1p or DSCP priority
of 802.3 packets to the 802.11e user priority
when 802.3 packets are sent to an AP from
upper-layer devices.
To configure the parameter, run the 11.5.7
priority-map downstream trust command.
Rate limit client up(Kbps) Indicates upstream rate limit configured for
STAs.
To configure the parameter, run the 11.5.12
rate-limit command.
Rate limit VAP up(Kbps) Indicates upstream rate limit configured for
VAPs.
To configure the parameter, run the 11.5.12
rate-limit command.
Item Description
Traffic optimize sta bridge forward Function of forbidding STA bridging packet
forwarding.
Item Description
CAPWAP priority upstream map mode Mapping from WMM to the DSCP priority
of the upstream CAPWAP tunnel.
Priority map upstream trust Trusted priority for mapping from 802.11
packets to tunnel packets when packets are
sent to the AC from an AP.
To configure the parameter, run the 11.5.10
priority-map tunnel-upstream trust
command.
WMM priority downstream map mode Mapping from the DSCP priority to the
WMM of downstream packets.
Item Description
Related Topics
11.5.20 traffic-profile (WLAN view)
Function
The igmp-snooping enable command enables IGMP snooping in a traffic profile.
The undo igmp-snooping enable command disables IGMP snooping in a traffic profile.
Format
igmp-snooping enable
undo igmp-snooping enable
Parameters
None
Views
Traffic profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
IGMP snooping is a basic Layer 2 multicast function that forwards and controls multicast
traffic at the data link layer. IGMP snooping runs on a Layer 2 device and analyzes IGMP
messages exchanged between a Layer 3 device and hosts to set up and maintain a Layer 2
multicast forwarding table. The Layer 2 device forwards multicast packets based on the Layer
2 multicast forwarding table.
After you disable IGMP snooping in a traffic profile using the undo igmp-snooping enable
command, all IGMP snooping configurations on the device are deleted. When you run the
igmp-snooping enable command to enable IGMP snooping again, all IGMP snooping
configurations are restored to the default settings on the device.
Prerequisites
The traffic profile has been created using the 11.5.20 traffic-profile (WLAN view)
command.
Example
# Enable IGMP snooping in traffic profile p1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] traffic-profile name p1
[HUAWEI-wlan-traffic-prof-p1] igmp-snooping enable
Format
igmp-snooping report-suppress
undo igmp-snooping report-suppress
Parameters
None
Views
Traffic profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a Layer 2 device receives an IGMP Membership Report message (Report or Leave
message) from a group member, the Layer 2 device forwards the message to the directly
connected Layer 3 device. A group member host sends a Membership Report message in the
following situations:
l When joining a multicast group, a host sends a Report message. When a multicast group
has multiple members in a VLAN, the Layer 3 device receives duplicate Report
messages from the member hosts.
l When receiving an IGMP General Query message, a host sends a Report message. Hosts
use a timer to suppress duplicate Report messages in the same network segment.
However, if the timer values on hosts are the same, the Layer 3 device can still receive
duplicate Report messages.
l A host running IGMPv2 or IGMPv3 sends a Leave message when leaving a multicast
group. When a multicast group has multiple members in a VLAN, the Layer 3 device
receives duplicate Leave messages from the member hosts.
After this function is configured, a Layer 2 device forwards only one IGMP Membership
Report message to the upstream device in the following scenarios: When the first member
joins a multicast group or a host sends a Report message in response to an IGMP Query
message, the Layer 2 device forwards a Report message to the upstream device. The upstream
device then creates or maintains the matching forwarding entry based on the Report message.
When the last member of a group leaves the group, the Layer 2 device forwards a Leave
message to the upstream device. The upstream device then deletes the matching forwarding
entry. This reduces the number of IGMP messages on the network.
Prerequisites
IGMP snooping has been enabled using the igmp-snooping enable (traffic profile view)
command.
Example
# Enable suppression of IGMP Report and Leave message in traffic profile p1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] traffic-profile name p1
[HUAWEI-wlan-traffic-prof-p1] igmp-snooping enable
[HUAWEI-wlan-traffic-prof-p1] igmp-snooping report-suppress
Related Topics
8.8.2 display igmp-snooping
11.5.4 igmp-snooping enable (traffic profile view)
8.8.23 igmp-snooping querier enable
8.8.39 igmp-snooping suppress-time
Table 11-113 Default mapping from the DSCP priority of 802.3 packets to the user priority of
802.11 packets
DSCP UP
0-7 0
8-15 1
16-23 2
24-31 3
32-39 4
40-47 5
48-55 6
56-63 7
Format
priority-map downstream dscp { dscp-value1 [ to dscp-value2 ] } &<1-10> dot11e dot11e-
value
undo priority-map downstream
Parameters
Parameter Description Value
dscp dscp- Specifies the DSCP priority of 802.3 packets. The value is an integer
value1 that ranges from 0 to
63. A larger value
indicates a higher
priority.
to dscp-value2 Specifies the DSCP priority of 802.3 packets. The value is an integer
that ranges from 0 to
63. A larger value
indicates a higher
priority.
The value of dscp-
value2 must be larger
than that of dscp-
value1.
dot11e dot11e- Specifies the user priority of 802.11 packets. The value is an integer
value that ranges from 0 to 7.
A larger value
indicates a higher
priority.
Views
Traffic profile view
Default Level
2: Configuration level
Usage Guidelines
802.3 and 802.11 packets use different fields to identify their priorities. 802.11 packets sent
from a WMM-capable STA carry the user priority (also called the User Priority field), and IP
packets transmitted on an Ethernet carry the DSCP priority (also called the ToS field). When
data packets are forwarded from the central AP or upper-layer network to an RU, the RU
needs to convert the 802.3 packets to 802.11 packets and map the ToS field in the IP packet
header to the UP field of 802.11 packets. You can use the priority-map downstream dscp
command to configure mapping from the DSCP priority of 802.3 packets to the user priority
of 802.11 packets.
Example
# Configure mapping from the DSCP priority of 802.3 packets in traffic profile p1 to the user
priority of 802.11 packets.
<HUAWEI> system-view
[HUAWEI] wlan
Related Topics
11.5.20 traffic-profile (WLAN view)
11.5.3 display traffic-profile
Format
priority-map downstream trust { dot1p | dscp }
undo priority-map downstream trust
Parameters
Parameter Description Value
Views
Traffic profile view
Default Level
2: Configuration level
Usage Guidelines
802.3 and 802.11 packets use different fields to identify their priorities. 802.11 packets sent
from a WMM-capable STA carry the user priority (also called the User Priority field). On a
wired network, VLAN packets carry the 802.1p priority and IP packets carry the DSCP
priority. When data packets are forwarded from the AC or other upper-layer devices to an AP,
the packets must be converted from 802.3 packets to 802.11 packets.
You can run the priority-map downstream trust command to configure a trusted priority
type used in mapping from 802.3 packets to 802.11 packets when packets are sent to an AP
from upper-layer devices.
Example
# In traffic profile p1, configure the 802.1p priority as the trusted priority type used in
mapping from 802.3 packets to 802.11 packets when packets are sent to an AP from upper-
layer devices.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] traffic-profile name p1
[HUAWEI-wlan-traffic-prof-p1] priority-map downstream trust dot1p
Related Topics
11.5.20 traffic-profile (WLAN view)
11.5.3 display traffic-profile
Function
The priority-map tunnel-upstream command configures mapping from the user priority of
802.11 packets to the DSCP priority of tunnel packets when packets are sent to the AC from
an AP.
The undo priority-map tunnel-upstream command restores the default mapping from the
user priority of 802.11 packets to the DSCP priority of tunnel packets when packets are sent
to the AC from an AP.
Table 11-114 describes the default mapping from the user priority of 802.11 packets to the
DSCP priority of tunnel packets.
NOTE
The CAPWAP header refers to the tunnel header.
Table 11-114 Default mapping from the user priority of 802.11 packets to the DSCP priority
in the CAPWAP header
User Priority of 802.11 Packets DSCP Priority in the CAPWAP Header
0 0
1 8
2 16
3 24
4 32
5 40
6 48
7 56
Format
priority-map tunnel-upstream dot11e { dot11e-value1 [ to dot11e-value2 ] } &<1-7> dscp
dscp-value
Parameters
Parameter Description Value
dot11e dot11e- Specifies the user priority of 802.11 packets. The value is an integer
value1 that ranges from 0 to 7.
A larger value
indicates a higher
priority.
to dot11e- Specifies the user priority of 802.11 packets. The value is an integer
value2 that ranges from 0 to 7.
A larger value
indicates a higher
priority.
The value of dot11e-
value2 must be larger
than that of dot11e-
value1.
dscp dscp- Specifies the DSCP priority of tunnel packets. The value is an integer
value that ranges from 0 to
63. A larger value
indicates a higher
priority.
Views
Traffic profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To provide QoS guarantee for data packets of different users when packets are transmitted
over a tunnel, configure a specific tunnel priority or priority mapping.
You can run the priority-map tunnel-upstream dot11e command to configure mapping from
the user priority of 802.11 packets to the DSCP priority of tunnel packets when packets are
sent to the AC from an AP.
Precautions
The tunnel priority mapping is applicable to scenarios where data packets are sent in tunnel
forwarding mode.
Example
# In traffic profile p1, configures mapping from user priority 6 of 802.11 packets to DSCP
priority 1 of tunnel packets when packets are sent to the AC from an AP.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] traffic-profile name p1
[HUAWEI-wlan-traffic-prof-p1] priority-map tunnel-upstream dot11e 6 dscp 1
Related Topics
11.5.3 display traffic-profile
11.5.20 traffic-profile (WLAN view)
Function
The priority-map tunnel-upstream dscp command configures mapping from the DSCP
priority of 802.11 packets to the DSCP priority of tunnel packets when packets are sent to the
AC from an AP.
The undo priority-map tunnel-upstream dscp command restores the default mapping from
the DSCP priority of 802.11 packets to the DSCP priority of tunnel packets when packets are
sent to the AC from an AP.
By default, DSCP priority 1 of 802.11 packets maps DSCP priority 1 of tunnel packets, DSCP
priority 2 of 802.11 packets maps DSCP priority 2 of tunnel packets, and so on. DSCP
priority 63 of 802.11 packets maps DSCP priority 63 of tunnel packets.
Format
priority-map tunnel-upstream dscp { dscp-value [ to dscp-value1 ] } &<1-10> tunnel-dscp
dscp-value2
Parameters
Parameter Description Value
dscp dscp- Specifies the DSCP priority of 802.11 packets. The value is an integer
value that ranges from 0 to
63. A larger value
indicates a higher
priority.
to dscp-value1 Specifies the DSCP priority of 802.11 packets. The value is an integer
that ranges from 0 to
63. A larger value
indicates a higher
priority.
The value of dscp-
value1 must be larger
than that of dscp-value.
tunnel-dscp Specifies the DSCP priority of tunnel packets. The value is an integer
dscp-value2 that ranges from 0 to
63. A larger value
indicates a higher
priority.
Views
Traffic profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To provide QoS guarantee for data packets of different users when packets are transmitted
over a tunnel, configure a specific tunnel priority or priority mapping.
You can run the priority-map tunnel-upstream dscp command to configure mapping from
the DSCP priority of 802.11 packets to the DSCP priority of tunnel packets when packets are
sent to the AC from an AP.
Precautions
The tunnel priority mapping is applicable to scenarios where data packets are sent in tunnel
forwarding mode.
Example
# In traffic profile p1, configures mapping from DSCP priority 6 of 802.11 packets to DSCP
priority 1 of tunnel packets when packets are sent to the AC from an AP.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] traffic-profile name p1
[HUAWEI-wlan-traffic-prof-p1] priority-map tunnel-upstream dscp 6 tunnel-dscp 1
Related Topics
11.5.3 display traffic-profile
11.5.20 traffic-profile (WLAN view)
Format
priority-map tunnel-upstream trust { dot11e | dscp }
undo priority-map tunnel-upstream trust
Parameters
Parameter Description Value
Views
Traffic profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To provide QoS guarantee for data packets of different users when packets are transmitted
over a tunnel, configure a specific tunnel priority or priority mapping.
You can run the priority-map tunnel-upstream trust command to configure a trusted
priority type used in mapping from 802.11 packets to tunnel packets when packets are sent to
the AC from an AP.
Precautions
The tunnel priority mapping is applicable to scenarios where data packets are sent in tunnel
forwarding mode.
Example
# In traffic profile p1, configure the DSCP priority as the trusted priority type used in
mapping from 802.11 packets to tunnel packets when packets are sent to the AC from an AP.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] traffic-profile name p1
[HUAWEI-wlan-traffic-prof-p1] priority-map tunnel-upstream trust dscp
Related Topics
11.5.20 traffic-profile (WLAN view)
11.5.3 display traffic-profile
Function
The qos car command configures QoS CAR parameters.
The undo qos car command deletes the configured QoS CAR parameters.
Format
qos car inbound cir cir-value [ cbs cbs-value [ pbs pbs-value ] | pir pir-value [ cbs cbs-value
pbs pbs-value ] ]
Parameters
Parameter Description Value
cir cir-value Specifies the committed information rate The value is an integer
(CIR), which is the average rate of traffic that that ranges from 64 to
can pass through an interface. 4294967295, in kbit/s.
pir pir-value Specifies the peak information rate (PIR), The value is an integer
which is the maximum rate of traffic that can that ranges from 64 to
pass through. 4294967295, in kbit/s.
The PIR value must be
greater than or equal to
the CIR value.
cbs cbs-value Specifies the committed burst size (CBS), The value is an integer
which is the average volume of burst traffic that ranges from 1500
that can pass through an interface. to 4294967295, in
bytes.
By default:
l If the PIR value is
not set, the CBS
value is 188 times
the CIR value. If
the value 188 times
the CIR exceeds the
maximum value
(4294967295) of
the CBS,
4294967295 is
used.
l If the PIR is set, the
CBS is 125 times
the CIR. If the
value 125 times the
CIR exceeds the
maximum value
(4294967295) of
the CBS,
4294967295 is
used.
pbs pbs-value Specifies the peak burst size (PBS), which is The value is an integer
the maximum volume of burst traffic that can that ranges from 1500
pass through an interface. to 4294967295, in
bytes.
By default, if the PIR
is set , the PBS is 125
times the PIR. If the
value 125 times the
PIR exceeds the
maximum value
(4294967295) of the
PBS, 4294967295 is
used.
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Traffic policing discards excess traffic to limit incoming and outgoing traffic within a proper
range and to protect network resources.
When traffic is transmitted from a high-speed link to a low-speed link, the inbound interface
of the low-speed link is prone to severe data loss. The data traffic rate needs to be limited. To
solve this problem, configure traffic policing for outgoing traffic on the interface of the high-
speed link. The interface then discards the packets whose rate exceeds the traffic policing rate,
limiting the outgoing traffic rate in a proper range. You can also configure traffic policing for
incoming traffic on the interface of the low-speed link. The interface then discards the
received packets whose rate exceeds the traffic policing rate.
The packet color is determined by parameters cbs cbs-value and pbs pbs-value of this
command.
l When the size of a packet is less than the CBS value, the packet is colored green.
l When the size of a packet is greater than or equal to the CBS value but less than the PBS
value, the packet is colored yellow.
l When the size of a packet is greater than or equal to the PBS value, the packet is colored
red.
QoS CAR parameters can be configured in an SSID profile to implement traffic policing on
user traffic on all VAPs to which the user profile is applied. These VAPs share a token bucket,
and more VAPs indicate fewer network resources that each VAP can occupy.
Precautions
QoS CAR parameters configured in an SSID profile are valid only when the service data
forwarding mode is set to tunnel forwarding.
When the traffic policing rate is greater than the maximum rate of an interface, traffic policing
does not take effect on the interface. Set the value of cir-value smaller than the rate of the
interface.
When the CBS value is smaller than the number of bytes in a packet, packets of this type are
discarded.
To ensure that the device correctly identifies packet colors, you are advised to set the PBS
value greater than the CBS value.
Example
# Configure traffic policing parameters for incoming packets.
<HUAWEI> system-view
[HUAWEI] wlan
11.5.12 rate-limit
Function
The rate-limit command configures the rate limit for upstream and downstream packets of all
STAs or each STA on a VAP.
The undo rate-limit command restores the default rate limit for upstream and downstream
packets of all STAs or each STA on a VAP.
By default, the rate limit for upstream and downstream packets of all STAs on a VAP is
4294967295 kbit/s, and that of each STA is 4294967295 kbit/s.
Format
rate-limit { client | vap } { up | down } rate-value
undo rate-limit { client | vap } { up | down }
Parameters
Parameter Description Value
Views
Traffic profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run the rate-limit command to limit the rate of upstream and downstream packets for
all STAs or each STA on a VAP to protect network bandwidth resources.
Precautions
The limited rate of upstream and downstream packets configured for all STAs on a VAP using
the rate-limit vap command must be greater than or equal to that configured for each STA on
a VAP using the rate-limit client command.
The limited rate of upstream and downstream packets configured for each STA on a VAP
using the rate-limit client command cannot exceed that configured for all STAs on a VAP
using the rate-limit vap command.
The limited rate does not take effect for STAs that go online before the rate-limit command is
configured. To make this configuration take effect for a STA, enable the STA to go online
again.
Example
# Set the limited rate of upstream packets to 4294967295 kbit/s for all STAs on a VAP in the
traffic profile p1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] traffic-profile name p1
[HUAWEI-wlan-traffic-prof-p1] rate-limit vap up 4294967295
Related Topics
11.5.20 traffic-profile (WLAN view)
11.5.3 display traffic-profile
Function
The traffic-filter acl command configures ACL-based IPv4 packet filtering in a traffic
profile.
The undo traffic-filter command cancels configuration of ACL-based IPv4 packet filtering in
a traffic profile.
Format
traffic-filter { inbound | outbound } acl { acl-number1 | acl-number2 | name acl-name }
Parameters
Parameter Description Value
acl { acl-number1 | acl- Specifies the number of an The value is an integer that
number2 } ACL. ranges from 3000 to 3031
and from 6000 to 6031.
l 3000 to 3031: advanced
ACLs
l 6000 to 6031: user ACLs
Views
Traffic profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the traffic-filter acl command is executed in the traffic profile view, the device filters
packets matching a specified ACL rule:
l If the action in the ACL rule is deny, the device discards packets matching the rule.
l If the action in the ACL rule is permit, the device forwards packets matching the rule.
l If no rule is matched, packets are allowed to pass through.
Prerequisites
An ACL has been created using the acl (system view) or acl name command.
Precautions
The traffic-filter acl command can reference a numbered ACL (ACL number only) that is
not configured. You can configure the referenced ACL after running this command.
You can only configure packet filtering based on one ACL in one direction. To change the
ACL referenced by the traffic-filter acl command, run the traffic-filter acl command to
cover the configuration of packet filtering based on the existing ACL.
The ACL configured or changed on the AC takes effect only after being delivered to APs
using the commit command.
Example
# Create the traffic profile p1 and configure packet filtering based on the ACL that permits
packets with the source IPv4 address 192.168.0.2/32.
<HUAWEI> system-view
[HUAWEI] acl 3000
[HUAWEI-acl-adv-3000] rule 5 permit ip source 192.168.0.2 0
[HUAWEI-acl-adv-3000] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] traffic-profile name p1
[HUAWEI-wlan-traffic-prof-p1] traffic-filter inbound acl 3000
Related Topics
14.1.3 acl name
Function
The traffic-filter command configures ACL-based packet filtering on an AP's wired
interface.
The undo traffic-filter command cancels ACL-based packet filtering configuration on an
AP's wired interface.
By default, ACL-based packet filtering is not configured on an AP's wired interface.
Format
traffic-filter { inbound | outbound } acl { acl-number | name acl-name }
undo traffic-filter { inbound | outbound }
Parameters
Parameter Description Value
Views
AP wired port profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The rules for an AP's wired interface to filter packets based on ACLs are as follows:
l If the action in an ACL rule is deny, the device discards packets matching the rule.
l If the action in an ACL rule is permit, the device forwards packets matching the rule.
l If no rule is matched, packets are allowed to pass through.
Prerequisites
An ACL rule has been created before this command is run.
l 14.1.4 acl (system view)
l 14.1.3 acl name
Precautions
You can specify an empty ACL in this command, and configure this ACL later.
You can apply only one ACL in one direction to filter packets. Before modifying the ACL
referenced by the traffic-filter (AP wired port profile view) command, run the undo traffic-
filter command to cancel packet filtering based on this ACL.
Example
# Configure the wired interface GE0 of ap-group1 to filter incoming packets based on ACL
3000.
<HUAWEI> system-view
[HUAWEI] wlan
Related Topics
14.1.4 acl (system view)
14.1.3 acl name
Function
The traffic-optimize broadcast-suppression command sets the maximum traffic volume of
broadcast packets that can pass through a traffic profile.
The undo traffic-optimize broadcast-suppression command cancels the limit on the
maximum traffic volume of broadcast packets that can pass through a traffic profile.
By default, broadcast packets are not suppressed on a traffic profile.
Format
traffic-optimize broadcast-suppression packets packets-rate
undo traffic-optimize broadcast-suppression
Parameters
Parameter Description Value
Views
Traffic profile view
Default Level
2: Configuration level
Usage Guidelines
When a large number of broadcast packets are transmitted on a network, a lot of network
resources are occupied, and services on the network are affected.
To prevent broadcast storms, you can run the traffic-optimize broadcast-suppression
command to configure the maximum traffic volume of broadcast packets that can pass
through a traffic profile. When the traffic volume of broadcast packets reaches the maximum
in a traffic profile, the system discards excess broadcast packets to control the traffic volume
in a proper range.
Example
# Set the maximum traffic volume of broadcast packets that can pass through 21600 pps in
traffic profile p1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] traffic-profile name p1
[HUAWEI-wlan-traffic-prof-p1] traffic-optimize broadcast-suppression packets 21600
Function
The traffic-optimize multicast-suppression command sets the maximum traffic volume of
multicast packets in a traffic profile.
The undo traffic-optimize multicast-suppression command cancels the limit on the
maximum traffic volume of multicast packets in a traffic profile.
By default, multicast packets are not suppressed in a traffic profile.
Format
traffic-optimize multicast-suppression packets packets-rate
undo traffic-optimize multicast-suppression
Parameters
Parameter Description Value
Views
Traffic profile view
Default Level
2: Configuration level
Usage Guidelines
When a large number of multicast packets are transmitted on a network, a lot of network
resources are occupied, and services on the network are affected.
To ensure normal service transmission on a network, you can run the traffic-optimize
multicast-suppression command to configure the maximum multicast traffic volume in a
traffic profile. When the traffic volume of multicast packets reaches the maximum, the system
discards excess multicast packets to control the traffic volume in a proper range.
Example
# Set the maximum traffic volume of multicast packets to 21600 pps in the traffic profile p1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] traffic-profile name p1
[HUAWEI-wlan-traffic-prof-p1] traffic-optimize multicast-suppression packets 21600
Function
The traffic-optimize multicast-unicast enable command enables the function of converting
multicast packets to unicast packets in a traffic profile.
Format
traffic-optimize multicast-unicast enable
Parameters
None
Views
Traffic profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can enable the function of converting multicast packets to unicast packets in scenarios
that have high requirements on multicast stream transmission, such as a high-definition video
on-demand scenario.
After the function is enabled, an AP listens on Report and Leave packets to maintain
multicast-to-unicast entries. When sending multicast packets to the client, the AP converts the
multicast packets to unicast packets based on the multicast-to-unicast entries to improve
multicast stream transmission efficiency.
Example
# Enable the function of converting multicast packets to unicast packets in the traffic profile
p1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] traffic-profile name p1
[HUAWEI-wlan-traffic-prof-p1] traffic-optimize multicast-unicast enable
Format
traffic-optimize sta-bridge-forward disable
undo traffic-optimize sta-bridge-forward disable
Parameters
None
Views
Traffic profile view
Default Level
2: Configuration level
Usage Guidelines
Some terminals on the wireless network can provide bridging functions. The terminals
associate with APs with their MAC addresses and connect to multiple Layer 3 wired devices
in the downlink direction. The connected Layer 3 wired devices can also obtain IP addresses
and forward traffic through the APs. The APs consider that the associated terminals have
multiple IP addresses. You can run the command to forbid air interfaces to forward packets to
bridging terminals. This can reduce the number of packets transmitted on the air interfaces
and improve the air interface performance.
Example
# Forbid an air interface to forward packets to bridging terminals in the traffic profile p1.
<HUAWEI> system-view
[HUAWEI] wlan
Function
The traffic-optimize unicast-suppression command sets the maximum traffic volume of
unknown unicast packets in a traffic profile.
The undo traffic-optimize unicast-suppression command cancels the limit on the maximum
traffic volume of unknown unicast packets in a traffic profile.
By default, unknown unicast packets are not suppressed in a traffic profile.
Format
traffic-optimize unicast-suppression packets packets-rate
undo traffic-optimize unicast-suppression
Parameters
Parameter Description Value
Views
Traffic profile view
Default Level
2: Configuration level
Usage Guidelines
When a large number of unknown unicast packets are transmitted on a network, a lot of
network resources are occupied, and services on the network are affected.
To prevent broadcast storms, you can run the traffic-optimize unicast-suppression command
to configure the maximum traffic volume of unknown unicast packets that can pass through
an interface. When the traffic volume of unknown unicast packets reaches the maximum on
an interface, the system discards excess unknown unicast packets to control the traffic volume
in a proper range.
Example
# Set the maximum traffic volume of unknown unicast packets to 21600 pps in the traffic
profile p1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] traffic-profile name p1
[HUAWEI-wlan-traffic-prof-p1] traffic-optimize unicast-suppression packets 21600
Format
traffic-profile name profile-name
undo traffic-profile { all | name profile-name }
Parameters
Parameter Description Value
name profile- Specifies the name of a traffic profile. The value is a string of
name 1 to 35 case-insensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
l The traffic-profile command applies to the following situations:
– To apply priority mapping and traffic suppression functions to a VAP, create a
traffic profile and bind the traffic profile to the VAP profile.
– To change priority mapping and traffic suppression functions of a VAP, enter the
traffic profile view of the VAP to modify the required parameters. When a traffic
profile is not required, delete it.
l After a traffic profile is created, parameters in the profile use default values.
NOTE
Example
# Create traffic profile p1 and enter the traffic profile view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] traffic-profile name p1
[HUAWEI-wlan-traffic-prof-p1]
Related Topics
11.5.3 display traffic-profile
Format
traffic-profile profile-name
undo traffic-profile
Parameters
Parameter Description Value
profile-name Specifies the name of a traffic profile. The traffic profile must
exist.
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can use the traffic-profile command to bind a traffic profile to a VAP profile. The traffic
profile applies to all users using the VAP profile.
Prerequisites
The traffic profile has been created using the 11.5.20 traffic-profile (WLAN view)
command.
Example
# Create VAP profile p1 and bind traffic profile u1 to the VAP profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name p1
[HUAWEI-wlan-vap-prof-p1] traffic-profile u1
Related Topics
11.5.20 traffic-profile (WLAN view)
11.5.3 display traffic-profile
Function
The user-isolate command enables user isolation.
Format
user-isolate l2
undo user-isolate
Parameters
Parameter Description Value
Views
Traffic profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In a traffic profile, user isolation prevents packets of users on a VAP from being forwarded to
each other. That is, users on a VAP cannot communicate with each other after user isolation is
enabled. This improves user communication security and enables the gateway to centrally
forward user traffic, facilitating user management.
You can run the user-isolate command to enable user isolation in a traffic profile.
Example
# Enable Layer 2 user isolation in traffic profile p1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] traffic-profile name p1
[HUAWEI-wlan-traffic-prof-p1] user-isolate l2
Warning: This action may cause service interruption. Continue?[Y/N]y
Function
The wmm edca-ap command sets EDCA parameters and ACK policies for an AP.
The undo wmm edca-ap command restores the default EDCA parameters and ACK policies
for an AP.
Table 11-115 lists the default EDCA parameter settings and ACK policies for APs.
Table 11-115 Default EDCA parameter settings and ACK policies for APs
AC_VO 3 2 1 47 normal
AC_VI 4 3 1 94 normal
AC_BE 6 4 3 0 normal
AC_BK 10 4 7 0 normal
Format
wmm edca-ap { ac-vo | ac-vi | ac-be | ac-bk } { aifsn aifsn-value | ecw ecwmin ecwmin-
value ecwmax ecwmax-value | txoplimit txoplimit-value | ack-policy { normal | noack } } *
Parameters
Parameter Description Value
aifsn aifsn-value Specifies the AIFSN, which determines the The value is an
channel idle time. integer that ranges
from 1 to 15.
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
WMM classifies data packets into the following access categories (ACs): AC_VO, AC_VI,
AC_BE, and AC_BK. A set of EDCA parameters is set for each AC queue. These parameters
determine the capabilities of a queue to occupy a channel. You can set EDCA parameters for
packets of different ACs to provide different priorities to the packets. In this way, APs have
different capabilities to compete for channels and provide differentiated services.
Precautions
l The EDCA parameters configured for the four AC queues take effect only after the
WMM function is enabled. By default, the WMM function is enabled in a 2G or 5G
radio profile.
l By default, queues of AC_VO, AC_VI, AC_BE, and AC_BK are in descending order of
priority. Priorities of the four queues are determined by their EDCA parameters.
l EDCA parameters must be configured properly. The scenarios for the reference EDCA
parameter settings and ACK policies are as follows:
a. Table 11-116 lists the reference EDCA parameter settings and ACK policies for
APs in voice scenarios.
Table 11-116 Reference EDCA parameter settings and ACK policies for APs in
voice scenarios
Packet ECWmax ECWmin AIFSN TXOPLi ACK
Type mit Policy
AC_VO 4 2 2 0 normal
AC_VI 5 3 5 0 normal
AC_BE 10 6 5 0 normal
AC_BK 10 8 12 0 normal
b. Table 11-117 lists the reference EDCA parameter settings and ACK policies for
APs in voice and video scenarios.
Table 11-117 Reference EDCA parameter settings and ACK policies for APs in
voice and video scenarios
Packet ECWmax ECWmin AIFSN TXOPLi ACK
Type mit Policy
AC_VO 4 2 2 0 normal
AC_VI 5 3 5 0 normal
AC_BE 10 6 12 0 normal
AC_BK 10 8 12 0 normal
Example
# Set EDCA parameters and ACK policies for AC_VO packets in 5G radio profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-5g-profile name default
[HUAWEI-wlan-radio-5g-prof-default] wmm edca-ap ac-vo aifsn 7 ecw ecwmin 4 ecwmax
10 txoplimit 0 ack-policy normal
AC_VO 3 2 2 47
AC_VI 4 3 2 94
AC_BE 10 4 3 0
AC_BK 10 4 7 0
Format
wmm edca-client { ac-vo | ac-vi | ac-be | ac-bk } { aifsn aifsn-value | ecw ecwmin ecwmin-
value ecwmax ecwmax-value | txoplimit txoplimit-value } *
Parameters
Parameter Description Value
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
WMM classifies data packets into the following access categories (ACs): AC_VO, AC_VI,
AC_BE, and AC_BK. A set of EDCA parameters is set for each AC queue. These parameters
determine the capabilities of a queue to occupy a channel. You can set EDCA parameters for
packets of different ACs to provide differentiated priorities to the packets and different
capabilities to compete for channels. In this way, differentiated services are implemented.
Parameter Meaning
Arbitration Interframe Spacing The DIFS has a fixed value. WMM provides different
Number (AIFSN) DIFS values for different ACs. A large AIFSN value
means that the STA must wait for a long time and has
a low priority.
Exponent form of CWmin ECWmin specifies the minimum backoff time, and
(ECWmin) and exponent form of ECWmax specifies the maximum backoff time.
CWmax (ECWmax) Together, they determine the average backoff time.
Large ECWmin and ECWmax values mean a long
average backoff time for the STA and a low STA
priority.
Transmission Opportunity Limit After preempting a channel, the STA can occupy the
(TXOPLimit) channel within the period of TXOPLimit. A large
TXOPLimit value means that the STA can occupy the
channel for a long time. If the TXOPLimit value is 0,
the STA can onlysend one data frame every time it
preempts a channel.
Precautions
l The EDCA parameters configured for the four AC queues take effect only after the
WMM function is enabled using the undo wmm disable command.
l By default, queues of AC_VO, AC_VI, AC_BE, and AC_BK are in descending order of
priority. Priorities of the four queues are determined by their EDCA parameters.
l EDCA parameters must be configured properly. The scenarios for the reference EDCA
parameter settings and ACK policies are as follows:
a. Table 11-120 lists the reference EDCA parameter settings and ACK policies for
APs in voice scenarios.
Table 11-120 Reference EDCA parameter settings and ACK policies for APs in
voice scenarios
AC_VO 4 2 2 0 normal
AC_VI 5 3 5 0 normal
AC_BE 10 6 5 0 normal
AC_BK 10 8 12 0 normal
b. Table 11-121 lists the reference EDCA parameter settings and ACK policies for
APs in voice and video scenarios.
Table 11-121 Reference EDCA parameter settings and ACK policies for APs in
voice and video scenarios
Packet ECWmax ECWmin AIFSN TXOPLi ACK
Type mit Policy
AC_VO 4 2 2 0 normal
AC_VI 5 3 5 0 normal
AC_BE 10 6 12 0 normal
AC_BK 10 8 12 0 normal
Example
# Set EDCA parameters for AC_VO packets of STAs in SSID profile p1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name p1
[HUAWEI-wlan-ssid-prof-p1] wmm edca-client ac-vo aifsn 7 ecw ecwmin 4 ecwmax 10
txoplimit 0
Related Topics
11.1.135 display ssid-profile
Function
The wmm disable command disables the Wi-Fi Multimedia (WMM) function in a 2G or 5G
radio profile.
The undo wmm disable command enables the WMM function in a 2G or 5G radio profile.
By default, the WMM function is enabled in a 2G or 5G radio profile.
Format
wmm disable
Parameters
None
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
802.11n and 802.11ac STAs must support WMM. If the WMM function is disabled in a radio,
802.11n and 802.11ac cannot work and STAs can access the network only in 802.11a/b/g
mode.
After the WMM function is enabled in a 2G or 5G radio profile, the AP radio to which the 2G
or 5G radio profile is applied can use the WMM parameters.
Example
# Enable the WMM function in 5G radio profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-5g-profile name default
[HUAWEI-wlan-radio-5g-prof-default] undo wmm disable
Related Topics
11.1.209 radio-2g-profile (WLAN view)
11.1.211 radio-5g-profile (WLAN view)
Function
The wmm mandatory enable disables STAs that do not support WMM from connecting to a
WMM-enabled AP.
The undo wmm mandatory enable allows STAs that do not support WMM to connect to a
WMM-enabled AP.
By default, STAs that do not support WMM are allowed to connect to a WMM-enabled AP.
Format
wmm mandatory enable
Parameters
None
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
On a WLAN, wireless channels are open and all STAs have the same chance to occupy a
channel. You can configure WMM to distinguish high-priority packets and enable the high-
priority packets to preempt channels. You can also disable STAs that do not support WMM
from connecting to a WMM-enabled AP, which prevents those STAs from preempting
channels of WMM-capable STAs.
Example
# Disable STAs that do not support WMM to connect to a WMM-enabled AP.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] wmm mandatory enable
l The AP9330DN does not support the WLAN Tag location function.
l The AP3010DN-AGN, AP6310SN-GN, and AP9330DN do not support the WLAN terminal location
function.
l Only the R250D-E, AP2050DN-E, AP4050DN-E and AP7050DE support the Bluetooth location
function, while only the AP4050DN-E supports the Bluetooth broadcast function.
Function
The aeroscout compound-time command configures the aggregation time of AeroScout tag
and mobile unit (MU) packets on the AC.
The undo aeroscout compound-time command restores the default aggregation time of
AeroScout tag and MU packets.
The default aggregation time of AeroScout tag and MU packets is 6553.5s on the AC.
Format
aeroscout compound-time time-value
Parameters
Views
Location profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
During AeroScout location, the AP does not report the received tag packets immediately to
the upstream device but aggregates the packets. After a specified time, the AP reports the
aggregated packets.
The AeroScout location server delivers an aggregation time of 6553.5s to the APs. The AC
delivers the aggregation time to the APs using the aeroscout compound-time command. The
AP selects a smaller aggregation time. By default, the aggregation time on the APs is 6553.5s.
If the packet aggregation time is set to a large value on the AeroScout location system, it takes
a long time for the AP to report the aggregated packets, resulting in poor real-time
performance and a large delay in the transmission of location packets. You can run the
aeroscout compound-time command to set a small aggregation time to reduce the delay in
location packet transmission.
Precautions
When the size of aggregated packets on an AP reaches 1k bytes, the AP immediately reports
the aggregated packets.
Example
# Set the aggregation time to 10s.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] location-profile name huawei
[HUAWEI-wlan-location-prof-huawei] aeroscout compound-time 100
Related Topics
11.6.5 display location-profile
Format
aeroscout mu-enable
undo aeroscout mu-enable
Parameters
None
Views
Location profile view
Default Level
2: Configuration level
Usage Guidelines
You can run the aeroscout mu-enable command to enable WLAN location of AeroScout
MUs.
Example
# Enable WLAN location of AeroScout MUs.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] location-profile name huawei
[HUAWEI-wlan-location-prof-huawei] aeroscout mu-enable
Related Topics
11.6.5 display location-profile
Format
aeroscout tag-enable
undo aeroscout tag-enable
Parameters
None
Views
Location profile view
Default Level
2: Configuration level
Usage Guidelines
You can run the aeroscout tag-enable command to enable WLAN location of AeroScout
tags.
Example
# Enable WLAN location of AeroScout tags.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] location-profile name huawei
[HUAWEI-wlan-location-prof-huawei] aeroscout tag-enable
Related Topics
11.6.5 display location-profile
Function
The aeroscout server command sets the destination for reporting location packets of
AeroScout tags and Mobile Units (MUs) received by APs and the port number.
The undo aeroscout server command deletes the configured destination for reporting
location packets of AeroScout tags and MUs received by APs and the configured port
number.
By default, the destination for reporting location packets of AeroScout tags and MUs received
by APs and the port number are not configured.
Format
aeroscout server port port-num [ via-ac ac-port ac-port-num ]
undo aeroscout server
Parameters
Parameter Description Value
port port-num Specifies the number of the port through which APs The value is an
report AeroScout tag information. integer that ranges
from 1025 to
65535.
via-ac Indicates that the tag packets received by APs are -
reported to the AC, which then forwards the
packets to the AeroScout location server.
NOTE
If the APs directly report the received tag and MU
packets to the AeroScout location server, the 11.6.6
display wlan location statistics aeroscout command
cannot display location statistics about the Aeroscout tags
and MUs.
ac-port ac-port- Specifies the number of the port through which The value is an
num ACs report AeroScout tag information. integer that ranges
from 1025 to
65535.
Views
Location profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The AeroScout location packets received by APs can be reported to the AC, which then
forwards the packets to the AeroScout location server. The packets can also be directly
reported to the AeroScout location server.
Precautions
You cannot configure a port number that has been occupied by other services; otherwise, the
port configuration fails.
For the same location method, via-ac can be configured only in one profile. If via-ac has been
configured in the current location profile for a specific location method, it cannot be
configured in other profiles for the same location method.
Example
# Set the port number used by the APs to report AeroScout tag packets to 1144.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] location-profile name huawei
[HUAWEI-wlan-location-prof-huawei] aeroscout server port 1144
Related Topics
11.6.5 display location-profile
Format
display location-profile { all | name profile-name }
display references location-profile name profile-name
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view configuration information about a location profile to verify
the configuration.
Example
# Display all location profiles.
<HUAWEI> display location-profile all
----------------------------------------------------------
Profile name Reference
----------------------------------------------------------
default 1
location-profile-1 0
location-profile-2 10
----------------------------------------------------------
Total: 3
Item Description
Table 11-123 Description of the display location-profile name default command output
Item Description
Item Description
Item Description
Related Topics
11.6.3 aeroscout tag-enable
11.6.2 aeroscout mu-enable
11.6.4 aeroscout server
11.6.1 aeroscout compound-time
11.6.10 ekahau tag-enable
11.6.9 ekahau server
11.6.13 private mu-enable
11.6.14 private report-frequency
11.6.15 private server
Format
display wlan location statistics aeroscout
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
l If APs are configured to report AeroScout tag packets to the AeroScout location server
through an AC, the display wlan location statistics aeroscout command can display
location statistics.
l If APs are configured to report AeroScout tag packets to the AeroScout location server
directly but not through an AC, the display wlan location statistics aeroscout command
cannot display location statistics, and all fields are displayed as "0".
Example
# Displays LBS statistics about AeroScout tags and MUs.
<HUAWEI> display wlan location statistics aeroscout
----------------------------------------------------------------
Request protocol version : 0
Request AP status : 0
Set configuration : 0
Set tags mode : 0
Set MU mode : 0
Request debug information : 0
ACK : 0
NACK : 0
Protocol version report : 0
AP status report : 0
Tag report : 0
MU report : 0
AP debug report : 0
Compounded reports message : 0
Generic AP notification : 0
----------------------------------------------------------------
Table 11-125 Description of the display wlan location statistics aeroscout command output
Item Description
Item Description
Format
display wlan location config-info aeroscout { ap-id ap-id | ap-name ap-name }
Parameters
Parameter Description Value
ap-id ap-id Displays LBS configuration of the AP with a The AP ID must exist.
specified AP ID.
ap-name ap-name Displays LBS configuration of the AP with a The AP name must
specified AP name. already exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run the display wlan location config-info aeroscout command to check
configurations delivered to APs from the AeroScout location server.
Prerequisites
AeroScout location has been enabled using the aeroscout tag-enable or aeroscout mu-
enable command, and the AeroScout location server has delivered the configuration
information to the AP.
Example
# Display AeroScout location configuration on the AP ap_4.
<HUAWEI> display wlan location config-info aeroscout ap-name ap_4
----------------------------------------------------------------
AP ID : 4
AP name : ap_4
AP MAC address : 1051-7254-5a80
Response IP address : 10.3.3.3
Response port : 1144
AP tag mode : start
AP MU mode : start
Dilution factor : 100
Dilution timeout(s) : 5
Tags multicast address : 010c-cc00-0000
Compounded message timeout(0.1s) : 12
Table 11-126 Description of the display wlan location config-info aeroscout command output
Item Description
AP ID AP ID.
Item Description
Related Topics
11.6.3 aeroscout tag-enable
11.6.2 aeroscout mu-enable
Format
display wlan location device-info tag { all | ap-id ap-id | ap-name ap-name }
Parameters
Parameter Description Value
ap-id ap-id Displays tag location information about a The AP ID must exist.
specified AP ID.
ap-name ap- Displays tag location information about a The AP name must
name specified AP name. already exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view tag location information about APs, facilitating tag
location statistics collection.
Example
# Display tag location information about all APs.
<HUAWEI> display wlan location device-info tag all
AP ID AP name Tag type Tag MAC Channel RSSI
------------------------------------------------------------------------------
0 huawei AeroScout 1040-8002-6f80 11 -50
1 ap3 Ekahau 1040-8002-6420 11 -50
------------------------------------------------------------------------------
Total: 2
Table 11-127 Description of the display wlan location device-info tag command output
Item Description
AP ID AP ID.
AP name AP name.
Item Description
Function
The ekahau server command sets the destination for reporting location packets of Ekahau
tags received by APs and the port number.
The undo ekahau server command deletes the configured destination for reporting location
packets of Ekahau tags received by APs and the configured port number.
By default, the destination for reporting location packets of Ekahau tags received by APs and
the port number are not configured.
Format
ekahau server ip-address ip-address port port-num [ via-ac ac-port ac-port-num ]
Parameters
Parameter Description Value
ip-address ip- Specifies the IPv4 address of the Ekahau The value is in dotted
address location server. decimal notation.
port port-num Specifies the port number used by APs to The value is an integer
report Ekahau tag information. that ranges from 1025 to
65535.
via-ac Indicates that the tag packets received by -
APs are reported to the AC, which then
forwards the packets to the Ekahau
location server.
ac-port ac-port-num Port number used by an AC to report The value is an integer
Ekahau tag information. that ranges from 1025 to
65535.
Views
Location profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The Ekahau tag packets received by APs can be reported to the AC, which then forwards the
packets to the Ekahau location server. The packets can also be directly reported to the Ekahau
location server.
Precautions
You cannot configure a port number that has been occupied by other services; otherwise, the
port configuration fails.
For the same location method, via-ac can be configured only in one profile. If via-ac has been
configured in the current location profile for a specific location method, it cannot be
configured in other profiles for the same location method.
Example
# Set the destination IP address of the location server to which APs report Ekahau tag packets
to 192.168.1.2 and port number to 8569.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] location-profile name huawei
[HUAWEI-wlan-location-prof-huawei] ekahau server ip-address 192.168.1.2 port 8569
Related Topics
11.6.5 display location-profile
Function
The ekahau tag-enable command enables WLAN location of Ekahau tags.
The undo ekahau tag-enable command disables WLAN location of Ekahau tags.
Format
ekahau tag-enable
Parameters
None
Views
Location profile view
Default Level
2: Configuration level
Usage Guidelines
You can run the ekahau tag-enable command to enable WLAN location of Ekahau tags.
Example
# Enable WLAN location of Ekahau tags.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] location-profile name huawei
[HUAWEI-wlan-location-prof-huawei] ekahau tag-enable
11.6.11 location-profile
Function
The location-profile command binds a location profile to an AP radio.
Format
location-profile profile-name radio { radio-id | all }
Parameters
Parameter Description Value
radio radio-id Specifies the ID of the radio to which the The value is an integer
location profile is bound. that ranges from 0 to 2.
Only the AP4030TN
supports three radios.
Views
AP group view, AP view
Default Level
2: Configuration level
Usage Guidelines
You can run this command to bind a location profile to an AP group radio or AP radio. After
the binding, the parameters of the location profile will be applied to the AP group radio or AP
radio.
Example
# Bind the location profile default to radio 0 of the AP group ap-group1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name ap-group1
[HUAWEI-wlan-ap-group-ap-group1] location-profile default radio 0
Related Topics
11.6.5 display location-profile
Function
The location-profile command creates a location profile or displays the location profile view.
Format
location-profile name profile-name
Parameters
Parameter Description Value
name profile- Specifies the name of a location profile, which The value is a string of
name uniquely identifies a location profile. 1 to 35 case-insensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
The location-profile command creates or deletes a location profile or displays the location
profile view in which you can configure the profile. If the specified profile name does not
exist, the command creates a new location profile and displays the view of this location
profile, and all parameters in the location profile use default values. You can also change
values of these parameters.
Example
# Create the location profile huawei.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] location-profile name huawei
[HUAWEI-wlan-location-prof-huawei]
Related Topics
11.6.5 display location-profile
Function
The private mu-enable command enables terminal location of APs.
Format
private mu-enable
Parameters
None
Views
Location profile view
Default Level
2: Configuration level
Usage Guidelines
You can run the private mu-enable command to enable terminal location of APs.
Example
# Enable terminal location of APs.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] location-profile name huawei
[HUAWEI-wlan-location-prof-huawei] private mu-enable
Function
The private report-frequency command sets the interval at which an AP reports channel
scan information.
The undo private report-frequency command restores the default interval at which an AP
reports channel scan information.
By default, an AP reports channel scan information every 20000 ms.
Format
private report-frequency time
undo private report-frequency
Parameters
Parameter Description Value
time Specifies the interval at which an AP The value is an integer that ranges
reports channel scan information. from 500 ms to 60000 ms.
Views
Location profile view
Default Level
2: Configuration level
Usage Guidelines
During terminal location, an AP periodically scans channels to collect data. The collected data
is buffered and updated on the AP, then reported to the location server at specified intervals.
Example
# Set the interval at which an AP reports channel scan information to 30000 ms.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] location-profile name huawei
[HUAWEI-wlan-location-prof-huawei] private report-frequency 30000
Related Topics
11.6.15 private server
Function
The private server command configures the destination IP address and port number for the
AP to report terminal location data.
The undo private server command restores the default destination IP address and port
number for the AP to report terminal location data.
By default, no destination IP address or port number is configured for the AP to report
terminal location data.
Format
private server ip-address ip-address port port-num [ via-ac ac-port ac-port-num ]
undo private server
Parameters
Parameter Description Value
ip-address ip- Specifies the server IPv4 address to which The value is in dotted
address the AP reports terminal location data. decimal notation.
Views
Location profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the AP completes channel scan, the AP can report the collected data to the location
server in the following two methods.
l The AP directly reports the data to the location server.
l The AP reports the collected data to the AC. The AC then reports the data to the location
server.
When the AP and the location server are located on different LANs, the AP must report the
data to the AC first. The AC must identify information about authorized and unauthorized
terminals based on the location data and report the information to the location server.
If the route between the AP and location server is reachable, and the AC is not required to
identify information about authorized and unauthorized terminals, configure the AP to
directly send data to the location server, preventing adverse impact of the location function on
AC performance and WLAN services.
Precautions
You cannot configure a port number that has been occupied by other services; otherwise, the
port configuration fails.
For the same location method, via-ac can be configured only in one profile. If via-ac has been
configured in the current location profile for a specific location method, it cannot be
configured in other profiles for the same location method.
Example
# Configure the AP to directly report terminal location data to the location server, and set the
server IP address and port number to 192.168.1.2 and 32180, respectively.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] location-profile name huawei
[HUAWEI-wlan-location-prof-huawei] private server ip-address 192.168.1.2 port
32180
Related Topics
11.6.5 display location-profile
Format
reset wlan location device-info tag { all | ap-id ap-id | ap-name ap-name }
Parameters
Parameter Description Value
ap-id ap-id Clears tag information received by a specified The AP ID must exist.
AP ID.
ap-name ap- Clears tag information received by a specified The AP name must
name AP name. already exist.
Views
All views
Default Level
3: Management level
Usage Guidelines
When tag information is too much, you can run this command to clear tag information
received by APs on the AC. Cleared information cannot be recovered.
Example
# Clear tag information received by all APs.
<HUAWEI> reset wlan location device-info tag all
Related Topics
11.6.8 display wlan location device-info tag
Function
The source command sets the source IP address used by the AC to send packets to a location
server.
By default, the source IP address used by the AC to send packets to a location server is not
configured.
Format
source ip-address ip-address
undo source
Parameters
Parameter Description Value
ip-address ip- Specifies the source IPv4 address used by the The value is in dotted
address AC to send packets to a location server. decimal notation.
Views
Location profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the source IP address used by the AC to send packets to a location server is configured
using the source command, the UDP packet sent from the AC to a location server carries this
IP address as its source IP address.
Precautions
l Ensure that the AC IP address manually configured on a location server is the same as
that configured using the source command.
l The source IP address must be a valid IP address existing on the device; otherwise, the
configuration does not take effect.
l In scenarios where Huawei proprietary terminal location protocols are used, the AC uses
the source IP address of the CAPWAP tunnel to send packets to a location server. The
source IP address specified by the source command does not take effect.
Example
# Configure the source IP address of the UDP packets sent from the AC to a location server as
10.102.25.23.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] location-profile name huawei
[HUAWEI-wlan-location-prof-huawei] source ip-address 10.102.25.23
Function
The ble low-power-threshold command configures a low power alarm threshold for BLE
devices.
The undo ble low-power-threshold command restores the default low power alarm threshold
for BLE devices.
By default, the low power alarm threshold for BLE devices is 20%.
Format
ble low-power-threshold low-power-threshold
Parameters
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
After your enable the Bluetooth monitoring function of an APs' built-in Bluetooth module
using the 11.6.28 sniffer enable command, the built-in Bluetooth module will scan
surrounding BLE devices and obtain information about the BLE devices, including battery
power information. If the battery power of a BLE device is lower than the low power alarm
threshold configured on an AC, an alarm is triggered on the AC accordingly.
Example
# Set the low power alarm threshold for BLE devices to 40%.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ble low-power-threshold 40
Related Topics
11.6.28 sniffer enable
Function
The ble monitoring-list command adds specified BLE devices to the BLE device monitoring
list.
The undo ble monitoring-list command deletes a specified BLE device or all BLE devices
from the BLE device monitoring list.
By default, no BLE devices are added to the BLE device monitoring list.
Format
ble monitoring-list mac mac-address1 [ to mac-address2 ]
Parameters
Parameter Description Value
mac mac- Specifies the MAC address of a BLE The value is in H-H-H
address1 device to be monitored. format. An H is a
hexadecimal number of 4
digits.
to mac- Specifies the end MAC addresse of a BLE The value is in H-H-H
address2 device when BLE devices are added to or format. An H is a
deleted from the BLE device monitoring hexadecimal number of 4
list in batches. mac-address2 and mac- digits.
address1 jointly specify a value range and
the mac-address2 value must be equal to or
larger than the mac-address1 value.
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After enabling the Bluetooth monitoring function using the 11.6.28 sniffer enable command,
you are advised to run the ble monitoring-list command to add BLE devices to the BLE
device monitoring list to facilitate BLE device management. When a BLE device in the
monitoring list is offline or has low battery power, an alarm is triggered on the AC
accordingly. If a BLE device is not in the monitoring list, no such alarm is triggered on the
AC.
Precautions
When you disable the Bluetooth monitoring function using the undo 11.6.28 sniffer enable
command, an alarm is triggered on the AC indicating that BLE devices are offline.
Example
# Add the BLE device with MAC address 1234-1234-1000 to the monitoring list.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ble monitoring-list mac 1234-1234-1000
Related Topics
11.6.27 display wlan ble site-info
11.6.28 sniffer enable
Function
The ble-profile command binds a BLE profile to an AP group or AP.
The undo ble-profile command unbinds a BLE profile from an AP group or AP.
Format
ble-profile profile-name
undo ble-profile
Parameters
Parameter Description Value
profile-name Specifies the name of a BLE profile. The BLE profile name
must exist.
Views
AP group view, AP view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After creating a BLE profile using the 11.6.21 ble-profile (WLAN view) command, you need
to bind the profile in the AP view or AP group view to make the settings in the profile take
effect.
Precautions
After you bind a BLE profile in the AP view or AP group view, parameter settings in the BLE
profile take effect for all APs using this profile.
Example
# Create BLE profile huawei and bind the profile to AP group group1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ble-profile name huawei
[HUAWEI-wlan-ble-prof-huawei] quit
[HUAWEI-wlan-view] ap-group name group1
[HUAWEI-wlan-ap-group-group1] ble-profile huawei
Related Topics
11.1.33 ap-group
11.6.21 ble-profile (WLAN view)
11.6.26 display references ble-profile
Function
The ble-profile command creates a BLE profile or displays the BLE profile view.
The undo ble-profile command deletes a BLE profile.
By default, no BLE profile is created.
Format
ble-profile name profile-name
undo ble-profile { name profile-name | all }
Parameters
Parameter Description Value
name profile- Specifies the name of a BLE profile, which The value is a string of
name must be unique and identifies a profile. 1 to 35 case-insensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run this command to create or delete a BLE profile or enter the BLE profile view to
configure the profile. If the specified profile name does not exist, this command creates a new
BLE profile and displays the configuration view of this profile. All parameters in this profile
use default values. You can also change values of these parameters.
Follow-up Procedure
After creating a BLE profile, you need to run the 11.6.20 ble-profile (AP group view and AP
view) command in the AP view or AP group view to bind the profile to make the settings in
the profile take effect.
Precautions
A BLE profile bound to an AP or AP group cannot be deleted. To delete a BLE profile,
unbind it in the AP view or AP group view.
Example
# Create BLE profile huawei and enter its view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ble-profile name huawei
[HUAWEI-wlan-ble-prof-huawei]
Related Topics
11.6.25 display ble-profile
11.6.22 broadcasting-content
Function
The broadcasting-content command configures the content of a BLE broadcast frame sent
by an AP's built-in Bluetooth module.
The undo broadcasting-content command restores the default content of a BLE broadcast
frame sent by an AP's built-in Bluetooth module.
By default, the UUID, Major, and Minor fields in a BLE broadcast frame sent by an AP's
built-in Bluetooth module are null, and the RSSI calibration value is -65 dBm.
NOTE
Only the AP4050DN-E supports the Bluetooth broadcast function.
Format
broadcasting-content { uuid uuid-value | major major-value | minor minor-value |
reference-rssi reference-rssi-value }*
undo broadcasting-content
Parameters
Parameter Description Value
uuid uuid-value Specifies the UUID field in a BLE The value is a string of 1 to
broadcast frame. UUID is the universally 16 characters. The default
unique identifier of a BLE device. value is null.
major major- Specifies the Major field in a BLE The value is a string of 1 or 2
value broadcast frame. This field specifies a characters. The default value
major group and is combined with the is null.
Minor field to define information about a
BEL device, for example, location of a
BLE device.
minor minor- Specifies the Minor field in a BLE The value is a string of 1 or 2
value broadcast frame. This field specifies a characters. The default value
minor group and is combined with the is null.
Major field to define information about a
BEL device, for example, location of a
BLE device.
reference-rssi Specifies the RSSI calibration value of a The value is an integer that
reference-rssi- BLE device. RSSI calibration value ranges from -97 to -50, in
value indicates the RSSI value of a BLE device dBm. The default value is
measured at a distance of 1 m. It is used to -65 that is measured when
estimate the distance between the BLE the transmit power of an
device and Bluetooth terminals. APs' built-in Bluetooth
module is 0 dBm.
Views
BLE profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After enabling the broadcast function of an AP's built-in Bluetooth module using the 11.6.23
broadcaster enable command, you can run the broadcasting-content command to configure
the content of BLE broadcast frames sent by the module.
Precautions
The RSSI calibration value in a BLE broadcast frame is set based on the actual measurement
result.
After changing the transmit power of a built-in Bluetooth module using the 11.6.29 tx-power
(BLE profile view) command, you need to remeasure and reconfigure the RSSI calibration
value. Therefore, you are advised to run the 11.6.29 tx-power (BLE profile view) command
to configure the transmit power of a built-in Bluetooth module before configuring the RSSI
calibration value.
Example
# Configure the content of a BLE broadcast frame sent by an AP's built-in Bluetooth module.
Set UUID to 1234567812345678, Major to A2, Minor to 01, and reference-rssi to –70.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ble-profile name huawei
[HUAWEI-wlan-ble-prof-huawei] broadcasting-content uuid 1234567812345678 major A2
minor 01 reference-rssi -70
Related Topics
11.6.23 broadcaster enable
11.6.25 display ble-profile
11.6.29 tx-power (BLE profile view)
Function
The broadcaster enable command enables the Bluetooth broadcast function of an AP's built-
in Bluetooth module.
The undo broadcaster enable command disables the Bluetooth broadcast function of an AP's
built-in Bluetooth module.
By default, the Bluetooth broadcast function of an AP's built-in Bluetooth module is disabled.
NOTE
Only the AP4050DN-E supports the Bluetooth broadcast function.
Format
broadcaster enable
Parameters
None
Views
BLE profile view
Default Level
2: Configuration level
Usage Guidelines
When an AP's built-in Bluetooth module is used as a BLE device, you can run this command
to enable the Bluetooth broadcast function. After this function is enabled, the built-in
Bluetooth module sends BLE broadcast frames to surrounding devices. The frame content
complies with the iBeacon protocol.
Example
# Enable the Bluetooth broadcast function.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ble-profile name huawei
[HUAWEI-wlan-ble-prof-huawei] broadcaster enable
Related Topics
11.6.25 display ble-profile
11.6.24 broadcasting-interval
Function
The broadcasting-interval command configures the interval for an AP's built-in Bluetooth
module to send BLE broadcast frames.
The undo broadcasting-interval command restores the default interval for an AP's built-in
Bluetooth module to send BLE broadcast frames.
By default, the built-in Bluetooth module of an AP sends BLE broadcast frames at an interval
of 500 ms.
NOTE
Only the AP4050DN-E supports the Bluetooth broadcast function.
Format
broadcasting-interval broadcasting-interval-value
undo broadcasting-interval
Parameters
Parameter Description Value
broadcasting- Specifies the interval for an AP's The value is an integer that
interval-value built-in Bluetooth module to send ranges from 100 to 10240, in
BLE broadcast frames. milliseconds.
Views
BLE profile view
Default Level
2: Configuration level
Usage Guidelines
After enabling the broadcast function of an AP's built-in Bluetooth module using the 11.6.23
broadcaster enable command, you can run the broadcasting-interval command to set the
interval for the module to send BLE broadcast frames.
Example
# Set the interval for an AP's built-in Bluetooth module to send BLE broadcast frames to 1000
ms.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ble-profile name huawei
[HUAWEI-wlan-ble-prof-huawei] broadcasting-interval 1000
Related Topics
11.6.23 broadcaster enable
11.6.25 display ble-profile
Function
The display ble-profile command displays configuration and reference information about a
BLE profile.
Format
display ble-profile { all | name profile-name }
Parameters
Parameter Description Value
all Displays information about all BLE profiles. -
name profile-name Displays information about the BLE profile The BLE profile name
with a specified name. must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view configuration and reference information about a BLE
profile.
Example
# Display information about all BLE profiles.
<HUAWEI> display ble-profile all
---------------------------------------------------------------------------
Profile name Reference
---------------------------------------------------------------------------
huawei 1
---------------------------------------------------------------------------
Total: 1
minor : -
Reference RSSI : -70
Transmit power : 0
Sniffer switch : disable
------------------------------------------------------------------------------
Table 11-129 Description of the display ble-profile name profile-name command output
Item Description
Item Description
Related Topics
11.6.21 ble-profile (WLAN view)
11.6.23 broadcaster enable
11.6.22 broadcasting-content
11.6.24 broadcasting-interval
11.6.28 sniffer enable
11.6.29 tx-power (BLE profile view)
Function
The display references ble-profile command displays reference information about a BLE
profile.
Format
display references ble-profile name profile-name
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view reference information about a BLE profile.
Example
# Display reference information about BLE profile huawei.
<HUAWEI> display references ble-profile name huawei
--------------------------------------------------------------------------
Reference type Reference name
--------------------------------------------------------------------------
AP group ap-group1
--------------------------------------------------------------------------
Total: 1
Item Description
Function
The display wlan ble site-info command displays information about BLE devices that are
scanned by an AP's built-in Bluetooth module.
Format
display wlan ble site-info { all | mac-address mac-address }
Parameters
Parameter Description Value
all Displays information about all -
BLE devices.
mac-address mac- Displays information about a The value is in H-H-H format. An H
address specified BLE device. is a hexadecimal number of 4 digits.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After you enable the Bluetooth monitoring function using the 11.6.28 sniffer enable
command, an AP's built-in Bluetooth module scans surrounding BLE devices and obtains
their information. You can then run this command to view obtained information about BLE
devices scanned by the built-in Bluetooth module.
Example
# Display information about all BLE devices.
<HUAWEI> display wlan ble site-info all
----------------------------------------------------------------------------------
-----------------------------------
Index MAC RSSI Power Advertisement data
----------------------------------------------------------------------------------
-----------------------------------
0 0000-0101-0202 -30 50%
02-02-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-fa
1 0000-0101-0303 -31 51%
01-02-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-fa
2 0000-0101-0505 -33 55%
03-02-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-fa
----------------------------------------------------------------------------------
-----------------------------------
Total: 3
Table 11-131 Description of the display wlan ble site-info command output
Item Description
Index Index.
Related Topics
11.6.28 sniffer enable
Function
The sniffer enable command enables the Bluetooth monitoring function of an AP's built-in
Bluetooth module.
The undo sniffer enable command disables the Bluetooth monitoring function of an AP's
built-in Bluetooth module.
By default, the Bluetooth monitoring function of an AP's built-in Bluetooth module is
disabled.
Format
sniffer enable
undo sniffer enable
Parameters
None
Views
BLE profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run this command to enable the Bluetooth monitoring function. After this function is
enabled, the AP's built-in Bluetooth module scans surrounding BLE devices and reports
obtained information about the BLE devices, such as MAC addresses, RSSIs, and battery
power of the BLE devices, as well as content of BLE broadcast frames.
Precautions
After the Bluetooth monitoring function is enabled, APs will obtain battery power
information about surrounding BLE devices at 02:00 of the AC system time, which is off-
peak hours of WLAN services. If the system time is different from the actual time, obtaining
battery power information may interrupt WLAN services. To prevent such an issue, configure
the system time correctly on the AC.
The Bluetooth broadcast function and monitoring function of an AP's built-in Bluetooth
module can be enabled at the same time. In this case, the AP's built-in Bluetooth module is
also monitored.
After you disable the Bluetooth monitoring function using the undo sniffer enable command,
an alarm is triggered on the AC indicating that BLE devices are offline.
Follow-up Procedure
After enabling the Bluetooth monitoring function, you are advised to run the 11.6.19 ble
monitoring-list command to add BLE devices to the BLE device monitoring list to facilitate
BLE device management. When a BLE device in the monitoring list is offline or has low
battery power, an alarm is triggered on the AC accordingly. If a BLE device is not in the
monitoring list, no such alarm is triggered on the AC.
Example
# Enable the Bluetooth monitoring function.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ble-profile name huawei
[HUAWEI-wlan-ble-prof-huawei] sniffer enable
Related Topics
11.6.19 ble monitoring-list
11.6.25 display ble-profile
11.6.27 display wlan ble site-info
Function
The tx-power command configures the transmit power of an AP's built-in Bluetooth module.
The undo tx-power command restores the default transmit power of an AP's built-in
Bluetooth module.
Format
tx-power tx-power-value
undo tx-power
Parameters
Views
BLE profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run this command to change the transmit power of an AP's built-in Bluetooth
module. Increasing transmit power can improve Bluetooth signal transmission quality but
causes more severe interference to other wireless devices. Reducing transmit power can
reduce interference to other wireless devices but affects Bluetooth signal transmission quality.
Configure proper transmit power of an AP's built-in Bluetooth module according to actual
situations.
Precautions
After changing the transmit power of an AP's built-in Bluetooth module, you need to run the
11.6.22 broadcasting-content command to reconfigure the RSSI calibration value in BLE
broadcast frames.
Example
# Configure the transmit power of an AP's built-in Bluetooth module to 2 dBm.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ble-profile name huawei
[HUAWEI-wlan-ble-prof-huawei] tx-power 2
Related Topics
11.6.22 broadcasting-content
11.6.25 display ble-profile
Function
The brute-force-detect interval command sets the interval for brute force key cracking
detection.
The undo brute-force-detect interval command restores the default interval for brute force
key cracking detection.
By default, the interval for brute force key cracking detection is 60 seconds.
Format
brute-force-detect interval interval
Parameters
Parameter Description Value
interval Specifies the interval for brute force key The value is an integer
interval cracking detection. that ranges from 10 to
120, in seconds.
Views
WIDS profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In a brute force key cracking attack, an attacker tries all possible key combinations one by one
to obtain the correct password. To improve password security, enable defense against brute
force key cracking to prolong the the time used to crack passwords.
An AP checks whether the number of key negotiation failures during WPA/WPA2-PSK,
WAPI-PSK, or WEP-Share-Key authentication of a user exceeds the threshold configured
using the brute-force-detect threshold command. If so, the AP considers that the user is
using the brute force method to crack the password and reports an alarm to the AC. If the
dynamic blacklist function is enabled, the AP adds the user to the dynamic blacklist and
discards all the packets from the user until the dynamic blacklist entry ages out.
Follow-up Procedure
Run the 11.7.30 dynamic-blacklist enable command to enable the dynamic blacklist
function.
Example
# Set the interval for brute force key cracking detection to 100 seconds.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name office
[HUAWEI-wlan-ap-group-office] radio 0
[HUAWEI-wlan-group-radio-office/0] wids attack detect enable wpa-psk
[HUAWEI-wlan-group-radio-office/0] quit
[HUAWEI-wlan-ap-group-office] quit
[HUAWEI-wlan-view] wids-profile name huawei
[HUAWEI-wlan-wids-prof-huawei] brute-force-detect interval 100
Related Topics
11.7.67 wids attack detect enable
11.7.3 brute-force-detect threshold
11.7.30 dynamic-blacklist enable
Format
brute-force-detect quiet-time quiet-time-value
undo brute-force-detect quiet-time
Parameters
Parameter Description Value
quiet-time- Specifies the quiet time for an AP to report The value is an integer
value brute force key attacks to an AC. that ranges from 60 to
36000, in seconds.
Views
WIDS profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After attack detection is enabled on an AP, the AP reports alarms upon attack detection. If a
attack source launches attacks repeatedly, a large number of repetitive alarms are generated.
To prevent this situation, configure the quiet time function for attack detection. When
detecting attack sources of the same MAC address, the AP does not report alarms in the quiet
time. However, if the AP still detects attacks from the attack source after the quiet time
expires, the AP reports alarms. You can set the quiet time based on attack types.
To obtain attack information in time, set the quiet time to a small value. If attack detection is
enabled on many APs, and attacks are frequently detected, set the quiet time to a large value
to avoid frequent alarm reports.
Follow-up Procedure
Run the 11.7.30 dynamic-blacklist enable command to enable the dynamic blacklist
function.
Example
# Set the quiet time for an AP to report brute force key attacks to an AC to 300 seconds.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name office
[HUAWEI-wlan-ap-group-office] radio 0
[HUAWEI-wlan-group-radio-office/0] wids attack detect enable wpa-psk
[HUAWEI-wlan-group-radio-office/0] quit
[HUAWEI-wlan-ap-group-office] quit
[HUAWEI-wlan-view] wids-profile name huawei
[HUAWEI-wlan-wids-prof-huawei] brute-force-detect quiet-time 300
Related Topics
11.7.67 wids attack detect enable
11.7.30 dynamic-blacklist enable
Function
The brute-force-detect threshold command sets the maximum number of key negotiation
failures allowed within a brute force key cracking attack detection period.
The undo brute-force-detect threshold command restores the default maximum number of
key negotiation failures allowed within a brute force key cracking attack detection period.
By default, an AP allows a maximum of 20 key negotiation failures within a brute force key
cracking attack detection period.
Format
brute-force-detect threshold threshold
Parameters
Parameter Description Value
Views
WIDS profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In a brute force key cracking attack, an attacker tries all possible key combinations one by one
to obtain the correct password. To improve password security, enable defense against brute
force key cracking to prolong the the time used to crack passwords.
An AP checks whether the number of key negotiation failures during WPA/WPA2-PSK,
WAPI-PSK, or WEP-Share-Key authentication of a user exceeds the threshold configured
using the brute-force-detect threshold command. If so, the AP considers that the user is
using the brute force method to crack the password and reports an alarm to the AC. If the
dynamic blacklist function is enabled, the AP adds the user to the dynamic blacklist and
discards all the packets from the user until the dynamic blacklist entry ages out. If the
threshold is set to a small value, the AP may incorrectly add authorized users to the dynamic
blacklist, causing the users unable to go online.
Follow-up Procedure
Run the 11.7.30 dynamic-blacklist enable command to enable the dynamic blacklist
function.
Example
# Set the maximum number of key negotiation failures allowed within a brute force key
cracking attack detection period to 60.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name office
[HUAWEI-wlan-ap-group-office] radio 0
[HUAWEI-wlan-group-radio-office/0] wids attack detect enable wpa-psk
[HUAWEI-wlan-group-radio-office/0] quit
[HUAWEI-wlan-ap-group-office] quit
[HUAWEI-wlan-view] wids-profile name huawei
[HUAWEI-wlan-wids-prof-huawei] brute-force-detect threshold 60
Related Topics
11.7.67 wids attack detect enable
11.7.30 dynamic-blacklist enable
11.7.4 contain-mode
Function
The contain-mode command sets the containment mode against rogue devices.
The undo contain-mode command deletes the containment mode against rogue devices.
By default, no containment mode against rogue devices is set.
Format
contain-mode { open-ap | spoof-ssid-ap | client [ protect sta-whitelist-profile profile-
name ] | adhoc }
undo contain-mode { open-ap | spoof-ssid-ap | client [ protect ] | adhoc }
Parameters
Parameter Description Value
Views
WIDS profile view
Default Level
2: Configuration level
Usage Guidelines
Rogue devices pose serious security threats to enterprise networks.
After the containment mode is set against rogue APs, the monitor AP uses the identity of the
rogue AP to broadcast disauthentication frames to forcibly disconnect STAs. To prevent the
STAs from connecting to the rogue AP again, the monitor AP will periodically and
continuously send disauthentication frames.
After the containment mode is set against rogue STAs or Adhoc devices, the monitor AP uses
the MAC address of a rogue device to continuously send unicast disauthentication frames.
Example
# Counter rogue APs with spoofing SSIDs.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name office
[HUAWEI-wlan-ap-group-office] radio 0
[HUAWEI-wlan-group-radio-office/0] wids contain enable
[HUAWEI-wlan-group-radio-office/0] quit
[HUAWEI-wlan-ap-group-office] quit
[HUAWEI-wlan-view] wids-profile name huawei
[HUAWEI-wlan-wids-prof-huawei] contain-mode spoof-ssid-ap
Related Topics
11.7.68 wids contain enable
Function
The device report-interval command sets the interval at which an AP reports incremental
wireless device information.
The undo device report-interval command restores the default interval at which an AP
reports incremental wireless device information.
Format
device report-interval interval
Parameters
Parameter Description Value
Views
WIDS profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The monitoring AP buffers information about detected wireless devices at the interval set
using the device report-interval command. When the interval is reached, the monitoring AP
reports the information to the AC and then clear the reported information.
Prerequisites
The device detection function has been enabled using the wids device detect enable
command for the AP.
Example
# Set the interval at which an AP reports incremental wireless device information to 120
seconds.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name office
[HUAWEI-wlan-ap-group-office] radio 0
[HUAWEI-wlan-group-radio-office/0] wids device detect enable
[HUAWEI-wlan-group-radio-office/0] quit
[HUAWEI-wlan-ap-group-office] quit
[HUAWEI-wlan-view] wids-profile name office
[HUAWEI-wlan-wids-prof-office] device report-interval 120
Related Topics
11.7.69 wids device detect enable
Function
The device synchronization-interval command sets the interval at which an AP reports all
wireless device information.
The undo device synchronization-interval command restores the default interval at which
an AP reports all wireless device information.
Format
device synchronization-interval interval
Parameters
Parameter Description Value
Views
WIDS profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To ensure that detected device information is consistent on the AP and AC, run the device
synchronization-interval command to enable the AP to periodically synchronize wireless
device information to the AC.
Prerequisites
The device detection function has been enabled using the wids device detect enable
command for the AP.
Example
# Set the interval at which an AP reports all wireless device information to 120 minutes.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name office
[HUAWEI-wlan-ap-group-office] radio 0
[HUAWEI-wlan-group-radio-office/0] wids device detect enable
[HUAWEI-wlan-group-radio-office/0] quit
[HUAWEI-wlan-ap-group-office] quit
[HUAWEI-wlan-view] wids-profile name office
[HUAWEI-wlan-wids-prof-office] device synchronization-interval 120
Related Topics
11.7.69 wids device detect enable
Function
The display references wids-whitelist-profile command displays reference information
about a WIDS whitelist profile.
Format
display references wids-whitelist-profile name profile-name
Parameters
Parameter Description Value
name profile-name Displays reference information about a The WIDS whitelist profile
specified WIDS whitelist profile. must already exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references wids-whitelist-profile command to view reference
information about a WIDS whitelist profile.
Example
# Display reference information about the WIDS whitelist profile huawei.
<HUAWEI> display references wids-whitelist-profile name huawei
------------------------------------------------------------
Profile type Reference name
------------------------------------------------------------
wids-profile huawei
------------------------------------------------------------
Total: 1
Format
display references wids-profile name profile-name
Parameters
Parameter Description Value
name profile-name Displays reference information about a The WIDS profile must
specified WIDS profile. exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references wids-profile command to view reference information
about a WIDS profile.
Example
# Display reference information about the WIDS profile huawei.
<HUAWEI> display references wids-profile name huawei
--------------------------------------------------------------------------
Reference type Reference name
--------------------------------------------------------------------------
AP group default
AP ID 0
--------------------------------------------------------------------------
Total: 2
Format
display references wids-spoof-profile name profile-name
Parameters
Parameter Description Value
name profile-name Displays reference information about a The WIDS spoof SSID
specified WIDS spoof SSID profile. profile must already exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references wids-spoof-profile command to view reference
information about a WIDS spoof SSID profile.
Example
# Display reference information about the WIDS spoof SSID profile huawei.
<HUAWEI> display references wids-spoof-profile name huawei
Profile type Reference name
------------------------------------------------------------
wids-profile huawei
------------------------------------------------------------
Total: 1
Function
The display wids-whitelist-profile command displays information about a WIDS whitelist
profile.
Format
display wids-whitelist-profile { all | name profile-name }
Parameters
Parameter Description Value
all Displays information about all WIDS -
whitelist profiles.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display wids-whitelist-profile command to view information about a WIDS
whitelist profile.
Example
# Display information about all WIDS whitelist profiles.
<HUAWEI> display wids-whitelist-profile all
------------------------------------------------------------
Profile name Reference
------------------------------------------------------------
huawei 0
office 0
office1 1
------------------------------------------------------------
Total: 3
OUI 00-11-22
SSID huawei
------------------------------------------------------------
Total: 3
Related Topics
11.7.34 permit-ap
Function
The display wids-profile command displays information about a WIDS profile.
Format
display wids-profile { all | name profile-name }
Parameters
Parameter Description Value
all Displays information about all WIDS -
profiles.
name profile-name Displays information about a specified The WIDS profile must
WIDS profile. already exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display wids-profile command to view information about a WIDS profile.
Example
# Display information about all WIDS profiles.
<HUAWEI> display wids-profile all
------------------------------------------------------------
Profile name Reference
------------------------------------------------------------
default 3
huawei 2
office 0
office01 0
------------------------------------------------------------
Total: 4
Item Description
Brute force detect interval(s) Interval for brute force key cracking
detection.
To set the interval, run the 11.7.1 brute-
force-detect interval command.
Brute force quiet time(s) Quiet time for an AP to report the detected
brute force attacks to the AC.
To set the quiet time, run the 11.7.2 brute-
force-detect quiet-time command.
Item Description
Related Topics
11.7.5 device report-interval
11.7.6 device synchronization-interval
11.7.1 brute-force-detect interval
11.7.3 brute-force-detect threshold
11.7.2 brute-force-detect quiet-time
11.7.31 flood-detect interval
11.7.33 flood-detect threshold
11.7.32 flood-detect quiet-time
11.7.64 weak-iv-detect quiet-time
11.7.48 spoof-detect quiet-time
11.7.30 dynamic-blacklist enable
11.7.4 contain-mode
11.7.75 wids-spoof-profile (WIDS profile view)
11.7.71 wids-whitelist-profile (WIDS profile view)
Function
The display wids-spoof-profile command displays information about a WIDS spoof SSID
profile.
Format
display wids-spoof-profile { all | name profile-name }
Parameters
Parameter Description Value
all Displays information about all WIDS spoof -
SSID profiles.
name profile-name Displays information about a specified The WIDS spoof SSID
WIDS spoof SSID profile. profile must already exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display wids-spoof-profile command to view information about a WIDS
spoof SSID profile.
Example
# Display information about all WIDS spoof SSID profiles.
<HUAWEI> display wids-spoof-profile all
------------------------------------------------------------
Profile name Reference
------------------------------------------------------------
huawei 0
office1 1
------------------------------------------------------------
Total: 2
ID Index.
Related Topics
11.7.49 spoof-ssid
Format
display references security-profile name profile-name
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the command to view reference information about a security profile.
Example
# Display reference information about the security profile security-profile1.
<HUAWEI> display references security-profile name security-profile1
---------------------------------------------
Reference type Reference name
---------------------------------------------
VAP profile vap-profile1
---------------------------------------------
Total: 1
Format
display references sta-blacklist-profile name profile-name
Parameters
Parameter Description Value
name profile- Displays reference information about a STA The STA blacklist
name blacklist profile. profile must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the command to view reference information about a STA blacklist profile.
Example
# Display reference information about the STA blacklist profile sta-blacklist-profile1.
<HUAWEI> display references sta-blacklist-profile name sta-blacklist-profile1
---------------------------------------------
Format
display references sta-whitelist-profile name profile-name
Parameters
Parameter Description Value
name profile- Displays reference information about a STA The STA whitelist
name whitelist profile. profile must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the command to view reference information about a STA whitelist profile.
Example
# Display reference information about the STA whitelist profile sta-whitelist-profile1.
<HUAWEI> display references sta-whitelist-profile name sta-whitelist-profile1
---------------------------------------------
Item Description
Function
The display security-profile command displays configuration and reference information
about a security profile.
Format
display security-profile { all | name profile-name }
Parameters
Parameter Description Value
name profile- Displays information about a specified security The security profile
name profile. must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the command to view configuration and reference information about a specified
security profile or all security profiles.
Example
# Display configurations of all security profiles.
<HUAWEI> display security-profile all
----------------------------------------------------------
Profile name Reference
----------------------------------------------------------
default 1
default-wds 1
default-mesh 1
security-profile1 0
----------------------------------------------------------
Total: 3
Item Description
Item Description
Function
The display sta-blacklist-profile command displays configuration and reference information
about a STA blacklist profile.
Format
display sta-blacklist-profile { all | name profile-name }
Parameters
Parameter Description Value
name profile- Displays information about a specified STA The STA blacklist
name blacklist profile. profile must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After configuring STA blacklists for VAPs, you can run this command to check whether a
MAC address is in the blacklists.
Example
# Display reference information about all STA blacklist profiles.
<HUAWEI> display sta-blacklist-profile all
------------------------------------------------------------
Profile name Reference
------------------------------------------------------------
sta-blacklist-profile1 1
------------------------------------------------------------
Total: 1
Related Topics
11.7.52 sta-mac
Function
The display station dynamic-blacklist command displays the dynamic blacklist on an AP.
Format
display station dynamic-blacklist { ap-id ap-id | ap-name ap-name }
Parameters
Parameter Description Value
ap-id ap-id Displays information about STAs that are denied The AP ID must
access on the AP with a specified ID. exist.
ap-name ap-name Displays information about STAs that are denied The AP name must
access on the AP with a specified name. exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
There is a STA dynamic blacklist on an AP. The blacklist helps control access of STAs, for
example, forbidding STAs with bogus IP addresses to go online. If a STA is not allowed to go
online, the STA is added to the dynamic blacklist. Before the dynamic blacklist entry ages
out, the STA cannot associate with the AP. The aging time of the dynamic blacklist entries is
10 minutes. After the aging time is reached, the dynamic blacklist entries are automatically
deleted. During this period, if the STA on an entry is added to the blacklist again, the aging
time of the entry is updated and recalculated.
The administrator can run this command to check STAs in the blacklist and the reasons for
adding the STAs to the blacklist.
Example
# Display the dynamic blacklist on AP.
<HUAWEI> display station dynamic-blacklist ap-name huawei
Total: 1
------------------------------------------------------------------------------
STA MAC Time left(s) Reason
------------------------------------------------------------------------------
581f-28fc-7ead 160 static ip
------------------------------------------------------------------------------
Item Description
Related Topics
11.7.29 dynamic-blacklist aging-time
Function
The display sta-whitelist-profile command displays configuration and reference information
about a STA whitelist profile.
Format
display sta-whitelist-profile { all | name profile-name }
Parameters
Parameter Description Value
name profile- Displays information about a specified STA The STA whitelist
name whitelist profile. profile must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After configuring a STA whitelist on a device, you can run this command to check whether a
MAC address is in the whitelist.
Example
# Display reference information about all STA whitelist profiles.
<HUAWEI> display sta-whitelist-profile all
------------------------------------------------------------
Profile name Reference
------------------------------------------------------------
sta-whitelist-profile1 1
------------------------------------------------------------
Total: 1
Item Description
Related Topics
11.7.52 sta-mac
Function
The display wlan ids attack-detected command displays information about the detected
attacking devices.
Format
display wlan ids attack-detected { all | flood | spoof | wapi-psk | weak-iv | wep-share-key |
wpa-psk | wpa2-psk | mac-address mac-address }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After attack detection is enabled, you can run the display wlan ids attack-detected command
to view information about the attacking devices.
Prerequisites
The attack detection functions of all types have been enabled using the 11.7.67 wids attack
detect enable command.
Example
# Display information of all current attacking devices.
<HUAWEI> display wlan ids attack-detected all
#AP: Number of monitor APs that have detected the device
AT: Last detcted attack type
CH: Channel number
act: Action frame asr: Association request
aur: Authentication request daf: Deauthentication frame
dar: Disassociation request wiv: Weak IV detected
pbr: Probe request rar: Reassociation request
eaps: EAPOL start frame eapl: EAPOL logoff frame
saf: Spoofed disassociation frame
sdf: Spoofed deauthentication frame
otsf: Other types of spoofing frames
-------------------------------------------------------------------------------
MAC address AT CH RSSI(dBm) Last detected time #AP
-------------------------------------------------------------------------------
000b-c002-9c81 pbr 165 -87 2014-11-20/15:51:13 1
0024-2376-03e9 pbr 165 -84 2014-11-20/15:52:13 1
0046-4b74-691f act 165 -67 2014-11-20/15:43:33 1
00bc-71b7-171d pbr 165 -88 2014-11-20/15:41:43 1
00bc-71b7-171f act 165 -87 2014-11-20/15:44:03 1
-------------------------------------------------------------------------------
Total: 5, printed: 5
Table 11-151 Description of the display wlan ids attack-detected all command output
Item Description
Table 11-152 Description of the display wlan ids attack-detected mac-address mac-address
command output
Item Description
Related Topics
11.7.67 wids attack detect enable
Format
display wlan ids attack-detected statistics
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After attack detection is enabled, you can run the display wlan ids attack-detected statistics
command to view the total number of all types of attacks.
Prerequisites
The attack detection functions of all types have been enabled using the 11.7.67 wids attack
detect enable command.
Example
# Display the number of attacks detected.
<HUAWEI> display wlan ids attack-detected statistics
Attack tracking since: 2015-01-27/12:02:11
--------------------------------------------------------------------------------
Type Total
--------------------------------------------------------------------------------
Probe request frame flood attack : 0
Authentication request frame flood attack : 0
Deauthentication frame flood attack : 0
Association request frame flood attack : 0
Disassociation request frame flood attack : 0
Reassociation request frame flood attack : 0
Action frame flood attack : 0
EAPOL start frame flood attack : 0
EAPOL logoff frame flood attack : 0
Weak IVs detected : 0
Spoofed deauthentication frame attack : 0
Spoofed disassociation frame attack : 0
Other types of spoofing frame attack : 0
WEP share-key attack : 0
WPA attack : 0
WPA2 attack : 0
WAPI attack : 0
--------------------------------------------------------------------------------
Table 11-153 Description of the display wlan ids attack-detected statistics command output
Item Description
Related Topics
11.7.67 wids attack detect enable
Format
display wlan ids attack-history { all | flood | spoof | wapi-psk | weak-iv | wep-share-key |
wpa-psk | wpa2-psk | mac-address mac-address }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After attack detection is enabled, information the detected attacking devices are saved in the
attacking device list. If an attacking device no longer launches an attack, the device is
removed from the attacking device list and saved to the historical attacking device list. You
can run the display wlan ids attack-history command to check historical records about the
attacking devices detected.
Prerequisites
The attack detection functions of all types have been enabled using the 11.7.67 wids attack
detect enable command.
Example
# Display historical records of all attacking devices.
<HUAWEI> display wlan ids attack-history all
act: Action frame asr: Association request
aur: Authentication request daf: Deauthentication frame
dar: Disassociation request wiv: Weak IV detected
pbr: Probe request rar: Reassociation request
eaps: EAPOL start frame eapl: EAPOL logoff frame
saf: Spoofed disassociation frame
sdf: Spoofed deauthentication frame
otsf: Other types of spoofing frames
AP: Name of the monitor AP that has detected the device
AT: Attack type CH: Channel number
-------------------------------------------------------------------------------
MAC address AT CH RSSI(dBm) Last detected time AP
-------------------------------------------------------------------------------
2477-039a-37ec pbr 165 -86 2014-11-20/15:51:43 ap-13
00bc-71b7-171d pbr 165 -88 2014-11-20/15:41:43 ap-13
2477-039a-0bf4 pbr 165 -81 2014-11-20/15:41:53 ap-13
-------------------------------------------------------------------------------
Total: 3, printed: 3
Table 11-154 Description of the display wlan ids attack-history all command output
Item Description
Related Topics
11.7.67 wids attack detect enable
Format
display wlan ids contain { all | ap | adhoc | client | ssid | mac-address mac-address |
monitor-ap { ap-name ap-name | ap-id ap-id } }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After WIDS or WIPS is enabled, you can run the display wlan ids countermeasures device
command to view information about countered rogue devices.
Example
# Display the list of all countered rogue devices.
<HUAWEI> display wlan ids contain all
#Rf: Number of monitor radios that have contained the device
CH: Channel number
-------------------------------------------------------------------------------
MAC address CH Authentication Last detected time #Rf SSID
-------------------------------------------------------------------------------
88e3-abbf-b93d 11 open 2014-11-20/16:16:57 1 -
-------------------------------------------------------------------------------
Total: 1, printed: 1
Table 11-155 Description of the display wlan ids contain all command output
Item Description
Table 11-156 Description of the display wlan ids contain ssid command output
Item Description
Last detected time Last time at which the device using the
SSID is detected.
Radio ID : 0
MAC address : dcd2-fc1e-c4a0
Radio type : 802.11b/g
Channel : 1
RSSI(dBm) : -54
Last detected time : 2015-10-20/15:06:26
Counter measure : Y
-------------------------------------------------------------------------------
Table 11-157 Description of the display wlan ids contain mac-address command output
Item Description
Number of monitor radios that have Number of radios that contain the device.
contained the device If WIDS is enabled on multiple APs, the
type of the device may be contained by
these APs' radios.
Item Description
# Display the list of countered rogue devices among the wireless devices detected by the
monitoring AP huawei.
<HUAWEI> display wlan ids contain monitor-ap ap-name huawei
Countermeasures Device Profile
--------------------------------------------------------------------------------
AP MAC address : dcd2-fc1e-c4a0
AP type : AP6010DN-AGN
AP name : huawei
Contain device 0
MAC address : c46a-b7bc-7b83
BSSID : 0006-f476-e210
Type : rogue client
SSID : -
Authentication : -
Last detected channel by this AP : 1
Maximum RSSI(dBm) : -71
Beacon interval(ms) : 0
First detected time : 2015-10-20/15:06:26
--------------------------------------------------------------------------------
Total: 1
Table 11-158 Description of the display wlan ids contain monitor-ap command output
Item Description
Item Description
Format
display wlan ids device-detected { all | [ interference | rogue ] ap | [ rogue ] bridge |
[ rogue ] client | adhoc | [ rogue ] ssid | mac-address mac-address }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
To ensure the WLAN reliability, all the wireless devices on the current WLAN must be
monitored. You can run the display wlan ids detected command to view information about
the wireless devices detected.
Prerequisites
The device detection function has been enabled on the AP using the 11.7.69 wids device
detect enable command.
Example
# Display all devices detected on a WLAN.
<HUAWEI> display wlan ids device-detected all
Flags: r: rogue, p: permit, i: interference, a: adhoc, w: AP, b: wireless-bridge,
c: client
#Rf: Number of monitor radios that have detected the device
CH: Channel number
-------------------------------------------------------------------------------
MAC address Type CH Authentication Last detected time #Rf SSID
-------------------------------------------------------------------------------
0010-0020-de2b r/i/w 1 open 2014-11-20/11:03:44 1 -
-------------------------------------------------------------------------------
Total: 1, printed: 1
Table 11-159 Description of the display wlan ids device-detected all command output
Item Description
Item Description
Table 11-160 Description of the display wlan ids device-detected ap command output
Item Description
Table 11-161 Description of the display wlan ids device-detected ssid command output
Item Description
Last detected time Last time at which the device using the
SSID is detected.
Table 11-162 Description of the display wlan ids device-detected rogue ssid command
output
Item Description
# Display detailed information about devices with MAC address 587f-66d4-d569 detected on
the WLAN.
<HUAWEI> display wlan ids device-detected mac-address 587f-66d4-d569
Detected MAC List
--------------------------------------------------------------------------------
MAC address : 587f-66d4-d569
BSSID : 0008-cbe9-1c00
Type : rogue client
SSID : -
Authentication : 802.1x
Number of monitor radios that have detected the device : 1
Last detected channel : 1
Maximum RSSI(dBm) : -80
Beacon interval(ms) : -
First detected time : 2015-10-20/15:07:23
Reported AP :
admin_ap0_admin_ap0_admin
Radio ID : 0
MAC address : dcd2-fc1e-c4a0
Radio type : 802.11b/g
Channel : 1
RSSI(dBm) : -80
Last detected time : 2015-10-20/15:07:23
Counter measure : Y
--------------------------------------------------------------------------------
Table 11-163 Description of the display wlan ids device-detected mac-address command
output
Item Description
Item Description
Number of monitor radios that have Number of radios that detect the device.
detected the device If WIDS is enabled on multiple APs, the
type of the device may be detected by these
APs' radios.
Format
display wlan ids dynamic-blacklist { all | ap-id ap-id | ap-name ap-name | mac-address
mac-address }
Parameters
Parameter Description Value
ap-id ap-id Displays information about attacking devices The AP ID must exist.
detected by the AP with a specified ID.
ap-name ap- Displays information about attacking devices The AP name must
name detected by the AP with a specified name. exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
An AP uses attack detection and dynamic blacklist functions to add a detected attacking
device to the dynamic blacklist, and rejects packets sent from this device until the device
entry in the dynamic blacklist ages. You can run the display wlan ids dynamic-blacklist
command to view information about devices in the dynamic blacklist.
Prerequisites
l The dynamic blacklist function has been enabled using the 11.7.30 dynamic-blacklist
enable command.
l The attack detection functions of all types have been enabled using the 11.7.67 wids
attack detect enable command.
Example
# Display information about all devices in the dynamic blacklist.
<HUAWEI> display wlan ids dynamic-blacklist all
#AP: Number of monitor APs that have detected the device
act: Action frame asr: Association request
aur: Authentication request daf: Deauthentication frame
dar: Disassociation request eapl: EAPOL logoff frame
pbr: Probe request rar: Reassociation request
eaps: EAPOL start frame
-------------------------------------------------------------------------------
MAC address Last detected time Reason #AP
-------------------------------------------------------------------------------
0020-1408-019f 2014-11-20/11:15:53 act 1
00bc-71b7-171f 2014-11-20/11:15:53 act 1
00d5-5862-641d 2014-11-20/11:15:43 pbr 1
-------------------------------------------------------------------------------
Total: 3, printed: 3
Table 11-164 Description of the display wlan ids dynamic-blacklist all command output
Item Description
# Display information about all devices added to the dynamic blacklist by AP huawei.
<HUAWEI> display wlan ids dynamic-blacklist ap-name huawei
act: Action frame asr: Association request
aur: Authentication request daf: Deauthentication frame
dar: Disassociation request eapl: EAPOL logoff frame
pbr: Probe request rar: Reassociation request
eaps: EAPOL start frame
-------------------------------------------------------------------------------
MAC address Last detected time Reason
-------------------------------------------------------------------------------
0020-1408-019f 2014-11-20/11:15:53 act
00bc-71b7-171f 2014-11-20/11:15:53 act
00d5-5862-641d 2014-11-20/11:15:43 pbr
-------------------------------------------------------------------------------
Total: 3, printed: 3
Table 11-165 Description of the display wlan ids dynamic-blacklist mac-address command
output
Item Description
Related Topics
11.7.30 dynamic-blacklist enable
11.7.67 wids attack detect enable
Format
display wlan ids rogue-history { all | ap | bridge | client | adhoc | ssid | mac-address mac-
address }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run the display wlan ids rogue-history command to view the historical records of
rogue devices.
Prerequisites
The device detection function has been enabled on the AP using the 11.7.69 wids device
detect enable command.
Example
# Display historical records of all rogue devices.
<HUAWEI> display wlan ids rogue-history all
Flags: a: adhoc, w: AP, b: wireless-bridge, c: client
CH: Channel number
-------------------------------------------------------------------------------
MAC address Type CH Authentication Last detected time SSID
-------------------------------------------------------------------------------
000a-f7bc-1852 w 11 open 2014-11-20/11:20:37 wlan
000b-c002-9c81 c 11 - 2014-11-20/11:16:07 -
-------------------------------------------------------------------------------
Total: 2, printed: 2
Table 11-166 Description of the display wlan ids rogue-history all command output
Item Description
Table 11-167 Description of the display wlan ids rogue-history ssid command output
Item Description
Last detected time Last time at which the device using the
SSID is detected.
Table 11-168 Description of the display wlan ids rogue-history mac-address command
output
Item Description
Function
The display wlan ids spoof-ssid fuzzy-match command displays fuzzy matching rules for
spoofing SSIDs.
Format
display wlan ids spoof-ssid fuzzy-match regex regex-value
Parameters
Parameter Description Value
regex regex- Specifies the matching rules for spoofing The rules must exist.
value SSIDs and displays spoofing SSIDs that match The value is in text
the rules. format and can contain
1 to 48 case-sensitive
characters. It supports
Chinese characters or
mixture of Chinese and
English characters.
NOTE
You can only use a
command editor of the
UTF-8 encoding format
to edit Chinese
characters.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
To view SSIDs that match a specific rule, run the display wlan ids spoof-ssid fuzzy-match
regex regex-value command.
Example
# Display SSIDs that match a specific rule.
<HUAWEI> display wlan ids spoof-ssid fuzzy-match regex ^HUAWE[1l]$
#Dev: Number of devices using SSID
--------------------------------------------------------------------------------
Match SSID #Dev Last detected time WIDS spoof profile
--------------------------------------------------------------------------------
HUAWE1 2 2014-03-06/12:44:37 huawei
HUAWEl 1 2014-03-06/12:44:50 huawei
--------------------------------------------------------------------------------
Total: 2
Table 11-169 Description of the display wlan ids spoof-ssid fuzzy-match regex command
output
Item Description
Related Topics
11.7.49 spoof-ssid
Function
The display wlan wapi certificate command displays the content of a certificate file.
Format
display wlan wapi certificate file-name file-name
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view content of certificate files imported to the device.
In the command, file-name must specify the complete path of a certificate file. For example, if
the certificate file as.cer is saved in the flash memory, run display wlan wapi certificate file-
name flash:/as.cer command.
Example
# Display content of certificate file as.cer.
<HUAWEI> display wlan wapi certificate file-name flash:/as.cer
Certificate:
Data:
Version: V3
Serial number:
50 FA CF CA
Signature algorithm: sha256ECDSA192
Issuer:
C = CN
O = 0003
OU = CUCC
CN = as_test_1@ASU
Validity:
Not before: 2013-01-19 16:54:34 UTC
Not after : 2033-01-19 16:54:34 UTC
Subject:
C = CN
O = 0003
OU = CUCC
CN = as_test_1@ASU
Subject public key information:
Public key algorithm: ECC
Public key: (392 bit)
04 31 AB F2 76 AE E4 BD EF E6 ED CA 93 C0 04 C8
C9 C9 BF 6F A3 6A F9 A1 9E 35 3E 9B 08 21 EF 20
5E 82 C1 42 2D A9 42 C3 CE 91 98 7F 21 83 7C 71
3A
Table 11-170 Description of the display wlan wapi certificate command output
Item Description
Subject public key information Information about the public key of the
certificate.
Format
dynamic-blacklist aging-time time
undo dynamic-blacklist aging-time
Parameters
Parameter Description Value
time Specifies the aging time at the expiry of which The value is an integer
a specified MAC address is removed from the that ranges from 180 to
dynamic blacklist. 3600, in seconds.
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
When detecting attacks from a STA, an AP reports the STA to the AC, forbids the STA to go
online, and rejects any packets sent from the STA. As long as the STA is blacklisted, it cannot
go online again even if it no longer launches attacks. To avoid that, you can run the dynamic-
blacklist aging-time command to configure an aging time for the dynamic blacklist. If the
configured aging time expires and the AP detects no attack from the STA, the STA is once
again allowed to go online.
Example
# Set the aging time of the dynamic blacklist to 300 seconds.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name huawei
[HUAWEI-wlan-ap-system-prof-huawei] dynamic-blacklist aging-time 300
Related Topics
11.7.30 dynamic-blacklist enable
Format
dynamic-blacklist enable
undo dynamic-blacklist enable
Parameters
None
Views
WIDS profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run the dynamic-blacklist enable command to enable the dynamic blacklist
function. When detecting flood attacks or brute force password cracking attacks from a
device, an AP reports the device to the AC, and the AC adds the device to a dynamic
blacklist. Any packets sent from the device are rejected until the dynamic blacklist entry ages.
An AP can use the dynamic blacklist to filter out the blacklisted wireless devices to avoid
malicious attacks.
Follow-up Procedure
Run the 11.7.29 dynamic-blacklist aging-time command to set an aging time for the
dynamic blacklist.
Example
# Enable the dynamic blacklist function.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wids-profile name huawei
[HUAWEI-wlan-wids-prof-huawei] dynamic-blacklist enable
Related Topics
11.7.29 dynamic-blacklist aging-time
Format
flood-detect interval interval
undo flood-detect interval
Parameters
Parameter Description Value
interval Specifies the interval for flood attack The value is an integer
interval detection. that ranges from 10 to
120, in seconds.
Views
WIDS profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A flood attack occurs when an AP receives a large number of packets of the same type within
a short period. As a result, the AP is flooded by too many attack packets to process service
packets from authorized wireless terminals.
After the flood attack detection function is enabled, an AP counts the number of packets of
the same type that it receives from a user at regular intervals. When the number exceeds a
specified threshold, the AP considers that the user launches a flood attack. If the dynamic
blacklist function is enabled, the user will be added to a dynamic blacklist.
Follow-up Procedure
Run the 11.7.30 dynamic-blacklist enable command to enable the dynamic blacklist
function.
Example
# Set the flood attack detection interval to 120s.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name office
[HUAWEI-wlan-ap-group-office] radio 0
[HUAWEI-wlan-group-radio-office/0] wids attack detect enable flood
[HUAWEI-wlan-group-radio-office/0] quit
[HUAWEI-wlan-ap-group-office] quit
[HUAWEI-wlan-view] wids-profile name huawei
[HUAWEI-wlan-wids-prof-huawei] flood-detect interval 120
Related Topics
11.7.67 wids attack detect enable
11.7.30 dynamic-blacklist enable
Format
flood-detect quiet-time quiet-time-value
undo flood-detect quiet-time
Parameters
Parameter Description Value
quiet-time- Specifies the quiet time for an AP to report the The value is an integer
value detected flood attacks to the AC. that ranges from 60 to
36000, in seconds.
Views
WIDS profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After attack detection is enabled on an AP, the AP reports alarms upon attack detection. If a
attack source launches attacks repeatedly, a large number of repetitive alarms are generated.
To prevent this situation, configure the quiet time for an AP to report alarms. When detecting
attack sources of the same MAC address, the AP does not report alarms in the quiet time.
However, if the AP still detects attacks from the attack source after the quiet time expires, the
AP reports alarms. You can set the quiet time based on attack types.
To obtain attack information in a timely manner, set the quiet time to a small value. If attack
detection is enabled on many APs, and attacks are frequently detected, set the quiet time to a
large value to prevent frequent alarm reports.
Follow-up Procedure
Run the 11.7.30 dynamic-blacklist enable command to enable the dynamic blacklist
function.
Example
# Set the quiet time to 300 seconds for an AP to report the detected flood attacks to the AC.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name office
[HUAWEI-wlan-ap-group-office] radio 0
[HUAWEI-wlan-group-radio-office/0] wids attack detect enable flood
[HUAWEI-wlan-group-radio-office/0] quit
[HUAWEI-wlan-ap-group-office] quit
[HUAWEI-wlan-view] wids-profile name huawei
[HUAWEI-wlan-wids-prof-huawei] flood-detect quiet-time 300
Related Topics
11.7.67 wids attack detect enable
11.7.30 dynamic-blacklist enable
Format
flood-detect threshold threshold
undo flood-detect threshold
Parameters
Parameter Description Value
threshold Specifies the flood attack detection threshold. The value is an integer
threshold that ranges from 1 to
1000.
Views
WIDS profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A flood attack occurs when a device receives a large number of packets of the same type
within a short period. As a result, the device is flooded by too many attack packets to process
service packets from authorized wireless terminals.
After the flood attack detection function is enabled, a device counts the number of packets of
the same type that it receives from a user at regular intervals. When the number exceeds a
specified threshold, the device considers that the user launches a flood attack. If the dynamic
blacklist function is enabled, the user will be added to a dynamic blacklist. If the threshold is
set to a small value, the device may incorrectly add authorized users to the dynamic blacklist,
causing the users unable to go online.
Follow-up Procedure
Run the 11.7.30 dynamic-blacklist enable command to enable the dynamic blacklist
function.
Example
# Set the flood attack detection threshold to 350.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name office
[HUAWEI-wlan-ap-group-office] radio 0
[HUAWEI-wlan-group-radio-office/0] wids attack detect enable flood
[HUAWEI-wlan-group-radio-office/0] quit
[HUAWEI-wlan-ap-group-office] quit
[HUAWEI-wlan-view] wids-profile name huawei
[HUAWEI-wlan-wids-prof-huawei] flood-detect threshold 350
Related Topics
11.7.67 wids attack detect enable
11.7.30 dynamic-blacklist enable
11.7.34 permit-ap
Function
The permit-ap command configures a WIDS whitelist.
Format
permit-ap { mac-address mac-address | oui oui | ssid ssid }
undo permit-ap { mac-address { mac-address | all } | oui { oui | all } | ssid { name ssid |
all } }
Parameters
Parameter Description Value
Views
WIDS whitelist profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After WIDS/WIPS is enabled, rogue APs can be detected and countered. However, there may
be APs of other vendors or other networks working in the existing signal coverage areas. If
these APs are countered, their services will be affected. To prevent this situation, configure an
authorized AP list, including an authorized MAC address list, OUI list, and SSID list. If an
unauthorized AP is detected but matches the authorized AP list, the AP is considered an
authorized AP and will not be countered.
For example, APs of other vendors are deployed on the existing WLAN to expand network
capacity. To prevent the APs from being countered, add OUIs of the vendors to a whitelist and
add SSIDs of these APs to a whitelist. In this way, the device will consider the APs as
authorized APs.
Precautions
If you add or delete an entry, the device will re-check the validity of the unauthorized APs. If
an unauthorized AP becomes authorized, the device stops countering the AP. If an authorized
AP becomes unauthorized, the device starts countering the AP.
Example
# Add an MAC address, an OUI, and a SSID to the WIDS whitelist.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wids-whitelist-profile name huawei
[HUAWEI-wlan-wids-whitelist-huawei] permit-ap mac-address 0011-2233-4455
[HUAWEI-wlan-wids-whitelist-huawei] permit-ap oui 00-11-22
[HUAWEI-wlan-wids-whitelist-huawei] permit-ap ssid huawei
Related Topics
11.7.70 wids-whitelist-profile (WLAN view)
11.7.35 pmf
Function
The pmf command enables the Protected Management Frame (PMF) function of a VAP.
The undo pmf command disables the PMF function for a VAP.
Format
pmf { optional | mandatory }
undo pmf
Parameters
Parameter Description Value
Views
Security profile view
Default Level
2: Configuration level
Usage Guidelines
Application Scenario
PMF is a specification released by Wi-Fi Alliance (WFA) based on IEEE 802.11w standards.
It aims to apply security measures defined in WFA2 to unicast and multicast management
action frames to improve network credibility.
If management frames transmitted on WLANs are not encrypted, the following security
problems may be introduced. PMF can address the problems.
l Hackers intercept management frames exchanged between the APs and users.
l Hackers pretend to be APs and send Disassociation and Deauthentication frames to
disconnect users.
l Hackers pretend to be users and send Disassociation frames to APs to disconnect the
users.
Precautions
The authentication and encryption mode must be WPA2–AES in the security profile.
Modifying configuration in the security profile will disconnect all users on the VAP that uses
the security profile. The users need to reassociate with the VAP to go online.
Example
# Enable the PMF function in optional mode.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1] security wpa2 psk pass-phrase abcdfffffg aes
[HUAWEI-wlan-sec-prof-p1] pmf optional
Function
The reset wlan ids attack-detected command deletes information about the attacking devices
detected.
Format
reset wlan ids attack-detected { all | flood | spoof | wapi-psk | weak-iv | wep-share-key |
wpa-psk | wpa2-psk | mac-address mac-address }
Parameters
Parameter Description Value
Views
All views
Default Level
3: Management level
Usage Guidelines
After attack detection is enabled, information about attacking devices detected is recorded.
When there is excessive information recorded or the recorded information is useless, you can
run the reset wlan ids attack-detected command to delete the information.
Example
# Delete information about all the current attacking devices.
<HUAWEI> reset wlan ids attack-detected all
Related Topics
11.7.20 display wlan ids attack-detected
Format
reset wlan ids attack-detected statistics
Parameters
None
Views
All views
Default Level
3: Management level
Usage Guidelines
After attack detection is enabled, the number of attacks detected is recorded. When there is
excessive information recorded or the recorded information is useless, you can run the reset
wlan ids attack-detected statistics command to delete the information.
Example
# Delete the number of attacks detected.
<HUAWEI> reset wlan ids attack-detected statistics
Related Topics
11.7.21 display wlan ids attack-detected statistics
Function
The reset wlan ids attack-history command deletes historical records about the attacking
devices detected.
Format
reset wlan ids attack-history { all | flood | spoof | wapi-psk | weak-iv | wep-share-key |
wpa-psk | wpa2-psk | mac-address mac-address }
Parameters
Parameter Description Value
Views
All views
Default Level
3: Management level
Usage Guidelines
After attack detection is enabled, historical records about attacking devices detected is
recorded. When there is excessive information recorded or the recorded information is
useless, you can run the reset wlan ids attack-history command to delete the information.
Example
# Delete historical records about all the current attacking devices.
<HUAWEI> reset wlan ids attack-history all
Related Topics
11.7.22 display wlan ids attack-history
Function
The rreset wlan ids device-detected command deletes information about the wireless devices
detected.
Format
reset wlan ids device-detected { all | [ interference | rogue ] ap | [ rogue ] bridge | [ rogue ]
client | adhoc | ssid [ ssid ] | mac-address mac-address }
Parameters
Parameter Description Value
ssid [ ssid ] Deletes information about detected devices The value must be an
with specified SSID or all SSIDs. existing SSID.
Views
All views
Default Level
3: Management level
Usage Guidelines
When there is excessive information about wireless devices recorded or the recorded
information is useless, you can run the reset wlan ids device-detected command to delete the
information.
Example
# Delete information about all the wireless devices detected.
<HUAWEI> reset wlan ids device-detected all
Format
reset wlan ids dynamic-blacklist { ap-id ap-id | { ap-id ap-id | ap-name ap-name | mac-
address mac-address | all }
Parameters
Parameter Description Value
ap-id ap-id Deletes the dynamic blacklist information The AP ID must exist.
reported by the AP with a specified ID.
ap-name ap- Deletes the dynamic blacklist information The AP name must
name reported by the AP with a specified name. exist.
mac-address Deletes the device with a specified MAC The MAC address
mac-address address from the dynamic blacklist. must exist.
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The reset wlan ids dynamic-blacklist command is applicable to the following scenarios:
l To recollect the dynamic blacklist information, run the reset wlan ids dynamic-blacklist
all command to delete all information in the dynamic blacklist. After that, the AC
recollects the information.
l To remove an authorized device from the dynamic blacklist, run the reset wlan ids
dynamic-blacklist mac-address command to remove the MAC address of the device
from the dynamic blacklist. After that, information sent from the device is not rejected.
Precautions
Running the reset wlan ids dynamic-blacklist command affects packet receiving of APs.
Exercise caution when running this command.
Example
# Delete the device with MAC address 78AC-C0C1-C1FC from the dynamic blacklist.
<HUAWEI> reset wlan ids dynamic-blacklist mac-address 78ac-c0c1-c1fc
Function
The reset wlan ids rogue-history command deletes historical records of rogue devices.
Format
reset wlan ids rogue-history { all | ap | bridge | client | adhoc | ssid [ ssid ] | mac-address
mac-address }
Parameters
Parameter Description Value
ssid [ ssid ] Deletes historical records of devices with The value must be an
specified SSIDs. existing SSID.
Views
All views
Default Level
3: Management level
Usage Guidelines
When there are excessive historical records of rogue devices or their historical records are
useless, you can run the reset wlan ids rogue-history command to delete the historical
records.
Example
# Delete all detected historical records of the rogue devices.
<HUAWEI> reset wlan ids rogue-history all
Format
security { wpa | wpa2 | wpa-wpa2 } dot1x { aes | tkip | aes-tkip }
undo security
Parameters
Parameter Description Value
Views
Security profile view
Default Level
2: Configuration level
Usage Guidelines
WPA/WPA2 authentication includes WPA/WPA2 pre-shared key authentication and 802.1X
authentication, which are also called WPA/WPA2 personal edition and WPA/WPA2 enterprise
To access a WLAN device using WPA or WPA2 802.1X authentication, run the security
dot1x command. If multiple types of user terminals are available, you can configure the
WPA-WPA2 and TKIP-CCMP security policy for authentication and data encryption.
NOTE
The following terminals do not support the WPA2 802.1X authentication and cannot access the AP. You
must configure other security policies for the terminals.
l Nokia: N8
l HP: Pre 3
The authentication type in the security profile and authentication profile must both be set to
802.1x authentication. You can run the display wlan config-errors command to check
whether error messages are generated for authentication type mismatch between the security
profile and authentication profile.
The system displays the message only when the security profile has been bound to the other
profiles.
Example
# Configure WPA authentication (802.1x and TKIP encryption).
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1] security wpa dot1x tkip
Function
The security psk command configures pre-shared key authentication and encryption for WPA
and WPA2.
Format
security { wpa | wpa2 | wpa-wpa2 } psk { pass-phrase | hex } key-value { aes | tkip | aes-
tkip }
undo security
Parameters
Parameter Description Value
Views
Security profile view
Default Level
2: Configuration level
Usage Guidelines
WPA/WPA2 authentication includes WPA/WPA2 pre-shared key authentication and 802.1X
authentication, which are also called WPA/WPA2 personal edition and WPA/WPA2 enterprise
edition respectively. 802.1X authentication is of high security and is applicable to enterprise
networks.
To access a WLAN device using WPA or WPA2 pre-shared key authentication, run the
security psk command. If multiple types of user terminals are available, you can configure
the WPA-WPA2 and AES-TKIP security policy for authentication and data encryption.
NOTE
If the key is in hexadecimal notation, you can enter hexadecimal characters without entering 0x.
If a security profile is bound to multiple VAP profiles, it will take a few minutes to configure
WPA/WPA2 PSK authentication and encryption in the security profile.
The system displays the message only when the security profile has been bound to the other
profiles.
Example
# Configure WPA pre-shared key authentication and the authentication key.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1] security wpa psk pass-phrase abcdfffffg aes
Format
security wapi psk { pass-phrase | hex } key-value
undo security
Parameters
Parameter Description Value
Views
Security profile view
Default Level
2: Configuration level
Usage Guidelines
WAPI supports two authentication modes: certificate authentication and pre-shared key
authentication. When pre-shared key authentication is used, a pre-shared key must be
configured.
l If WAPI authentication is specified as a security policy in a security profile, you can run
the wapi authentication-method command to configure the WAPI authentication mode.
l The wapi authentication-method command determines the WAPI authentication and
key management mode. When certificate authentication and key management are
configured, authentication involves identity authentication and key negotiation, and the
authentication server and certificate need to be configured. When pre-shared key
authentication is configured, a pre-shared key needs to be configured, and STAs also
need to know the pre-shared key. In this situation, authentication just involves key
negotiation.
The system displays the message only when the security profile has been bound to the other
profiles.
Example
# Set the WAPI authentication mode to pre-shared key authentication and specify the key.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1] security wapi psk pass-phrase testpassword
Function
The security wep command configures the WEP authentication mode.
Format
security { open | wep [ share-key ] }
undo security
Parameters
Parameter Description Value
Views
Security profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can select security policies on a WLAN based on the security level. WEP is a security
policy used earlier and has security risks. It can be used in open scenarios that do not require
high security. You can run this command to set the WEP authentication mode to open
authentication or share-key authentication.
Table 11-171 Comparison between open system authentication and share-key authentication
Authentication Mode Advantage Disadvantage
Precautions
l If the authentication mode is set to share-key, run the 11.7.66 wep key command to
configure a share-key.
l If the authentication mode is set to open, the WEP share-key configured in the profile
cannot take effect.
l Each AP can have at most four key indexes configured. The key indexes used by
different VAPs cannot be the same. If a key index takes effect on a VAP, the key index
cannot be applied to other VAPs.
l The system displays the message only when the security profile has been bound to the
other profiles.
Example
# Create security profile p1 and set the authentication mode to share-key.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1] security wep share-key
Related Topics
11.7.66 wep key
11.7.46 security-profile
Function
The security-profile command creates a security profile or enters the security profile view.
The undo security-profile command deletes a security profile according to the ID or name.
By default, security profiles default, default-wds, and default-mesh are available in the
system.
Format
security-profile name profile-name
Parameters
Parameter Description Value
name profile- Specifies the name of a security profile. The value is a string of
name 1 to 35 case-insensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
You can run this command to configure access security. A security profile must be configured
before you specify an authentication mode in the profile. To delete a security profile, run the
undo security-profile command.
The system configures the new profile, the default value is no authentication and no
encryption.
Example
# Configure a security profile named p1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1]
Related Topics
11.7.16 display security-profile
Function
The security-profile command binds a security profile to a VAP profile.
The undo security-profile command unbinds a security profile from a VAP profile.
Format
security-profile profile-name
undo security-profile
Parameters
Parameter Description Value
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
You can use this command to bind a security profile to a VAP profile. The security profile
then applies to all users using this VAP profile.
Example
# Create VAP profile ChinaNet and bind security profile security-profile1 to the VAP
profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name ChinaNet
[HUAWEI-wlan-vap-prof-ChinaNet] security-profile security-profile1
Related Topics
11.7.46 security-profile
11.1.143 display vap-profile
Format
spoof-detect quiet-time quiet-time-value
undo spoof-detect quiet-time
Parameters
Parameter Description Value
quiet-time- Specifies the quiet time for an AP to report the The value is an integer
value detected spoofing attacks to the AC. that ranges from 60 to
36000, in seconds.
Views
WIDS profile view
Default Level
2: Configuration level
Usage Guidelines
After attack detection is enabled on an AP, the AP reports alarms upon attack detection. If a
attack source launches attacks repeatedly, a large number of repetitive alarms are generated.
To prevent this situation, configure the quiet time for an AP to report alarms. When detecting
attack sources of the same MAC address, the AP does not report alarms in the quiet time.
However, if the AP still detects attacks from the attack source after the quiet time expires, the
AP reports alarms. You can set the quiet time based on attack types.
To obtain attack information in a timely manner, set the quiet time to a small value. If attack
detection is enabled on many APs, and attacks are frequently detected, set the quiet time to a
large value to prevent frequent alarm reports.
Example
# Set the quiet time to 300 seconds for an AP to report the detected spoofing attacks to the
AC.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name office
[HUAWEI-wlan-ap-group-office] radio 0
[HUAWEI-wlan-group-radio-office/0] wids attack detect enable spoof
[HUAWEI-wlan-group-radio-office/0] quit
[HUAWEI-wlan-ap-group-office] quit
[HUAWEI-wlan-view] wids-profile name huawei
[HUAWEI-wlan-wids-prof-huawei] spoof-detect quiet-time 300
Related Topics
11.7.67 wids attack detect enable
11.7.49 spoof-ssid
Function
The spoof-ssid command configures a fuzzy matching rule for spoofing SSIDs.
The undo spoof-ssid command deletes a fuzzy matching rule for spoofing SSIDs.
Format
spoof-ssid fuzzy-match regex regex-value
Parameters
Parameter Description Value
regex regex- Specifies the regular expression for an SSID. If The value is in text
value an SSID matches the regular expression, the format and can contain
SSID is considered a spoofing SSID. 1 to 48 case-sensitive
characters. It supports
Chinese characters or
mixture of Chinese and
English characters.
NOTE
You can only use a
command editor of the
UTF-8 encoding format
to edit Chinese
characters.
Views
WIDS spoof SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
WLAN services are available in public places, such as banks and airports. Users can connect
to the WLANs after associating with corresponding SSIDs. If a rogue AP is deployed and
provides spoofing SSIDs similar to authorized SSIDs, the users may be misled and connect to
the rogue AP, which brings security risks. To address this problem, configure a fuzzy
matching rule to identify spoofing SSIDs. The device compares a detected SSID with the
matching rule. If the SSID matches the rule, the SSID is considered a spoofing SSID. The AP
using the spoofing SSID is a rogue AP. After rogue AP containment is configured, the device
contains the rogue AP and disconnects users from the spoofing SSID.
Precautions
To make fuzzy matching rules for spoofing SSIDs take effect, enable device detection and
rogue device containment so that the device can take countermeasures against rogue APs.
Example
# Configure a fuzzy matching rule using the regular expression ^HUAWE[1l]$ to identify
spoofing IDs HUAWE1 or HUAWEl similar to HUAWEI.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wids-spoof-profile name huawei
[HUAWEI-wlan-wids-spoof-huawei] spoof-ssid fuzzy-match regex ^HUAWE[1l]$
Related Topics
11.7.74 wids-spoof-profile (WLAN view)
11.7.50 sta-access-mode
Function
The sta-access-mode command binds STA blacklist and STA whitelist profiles to VAP
profiles or AP system profiles.
The undo sta-access-mode command unbinds STA blacklist and STA whitelist profiles from
VAP profiles or AP system profiles.
By default, no STA blacklist and STA whitelist profiles are bound to a VAP profile and an AP
system profile.
Format
sta-access-mode { blacklist | whitelist } profile-name
undo sta-access-mode
Parameters
Parameter Description Value
profile-name Specifies the names of STA blacklist and The STA blacklist and
whitelist profiles. whitelist profiles must
exist.
Views
VAP profile view, AP system profile view
Default Level
2: Configuration level
Usage Guidelines
STA blacklists and whitelists configured by using the 11.7.52 sta-mac command take effect
only after the STA blacklist and whitelist profiles are bound to VAP profiles or AP system
profiles using the sta-access-mode command.
When STA blacklist and whitelist profiles are bound to different profiles, the effective scope
of the STA blacklists and whitelists differs.
l VAP profile: The STA blacklist and whitelist take effect on the corresponding VAP.
l AP system profile: The STA blacklist and whitelist take effect on the corresponding AP.
l VAP profile and AP system profile: A STA cannot go online if it cannot meet any of
access requirements.
Example
# Bind the STA blacklist profile sta-blacklist-profile1 to the VAP profile vap-profile1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap-profile1
[HUAWEI-wlan-vap-prof-vap-profile1] sta-access-mode blacklist sta-blacklist-
profile1
Related Topics
11.7.52 sta-mac
11.7.51 sta-blacklist-profile
Function
The sta-blacklist-profile command creates a STA blacklist profile or displays the STA
blacklist profile view.
The undo sta-blacklist-profile command deletes one or multiple STA blacklist profiles.
By default, no STA blacklist profile is created.
Format
sta-blacklist-profile name profile-name
undo sta-blacklist-profile { name profile-name | all }
Parameters
Parameter Description Value
name profile- Specifies the name of a STA blacklist profile. The value is a string of
name 1 to 35 case-insensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If the MAC address of a STA is in the blacklist, the STA cannot go online. If the STA
blacklist profile is not referenced or the MAC address of a STA is not in the blacklist, the STA
is allowed to go online.
The configured blacklist takes effect only after the STA blacklist profile is bound to a VAP
profile or an AP system profile using the 11.7.50 sta-access-mode command.
If a STA is added to the blacklist, the system automatically disconnects the STA.
Precautions
If STA blacklist profiles are bound to a VAP profile and an AP system profile, a STA cannot
go online when the MAC address of the STA is in either of the STA blacklist profile.
Example
# Create the STA blacklist profile sta-blacklist-profile1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] sta-blacklist-profile name sta-blacklist-profile1
[HUAWEI-wlan-blacklist-prof-sta-blacklist-profile1]
Related Topics
11.7.50 sta-access-mode
11.7.17 display sta-blacklist-profile
11.7.52 sta-mac
Function
The sta-mac command adds the MAC addresses of a STA to the blacklist or whitelist.
The undo sta-mac command deletes a specified MAC address or all MAC addresses from the
blacklist or whitelist.
By default, the MAC address of a STA is not added to the blacklist or whitelist.
Format
sta-mac mac-address
undo sta-mac { mac-address | all }
Parameters
Parameter Description Value
Views
Blacklist profile view, whitelist profile view
Default Level
2: Configuration level
Usage Guidelines
If the blacklist function is enabled, all STAs in the blacklist cannot connect to the WLAN.
If the whitelist function is enabled, only STAs in the whitelist can connect to the WLAN.
You can configure a maximum of 512 STA MAC addresses in a STA whitelist profile.
You can configure a maximum of 512 STA MAC addresses in a STA blacklist profile.
If a STA is added to the blacklist, the system automatically disconnects the STA.
Example
# Add MAC address 2C27-D720-746B of a STA to blacklist huawei.
<HUAWEI> system-view
[HUAWEI] wlan
Related Topics
11.7.17 display sta-blacklist-profile
11.7.19 display sta-whitelist-profile
11.7.53 sta-whitelist-profile
Function
The sta-whitelist-profile command creates a STA whitelist profile for VAPs or displays the
STA whitelist profile view.
The undo sta-whitelist-profile command deletes a specified STA whitelist profile or all STA
whitelist profiles for VAPs.
By default, no STA whitelist profile is created.
Format
sta-whitelist-profile name profile-name
undo sta-whitelist-profile { name profile-name | all }
Parameters
Parameter Description Value
name profile- Specifies the name of a STA whitelist profile. The value is a string of
name 1 to 35 case-insensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
The configured whitelist takes effect only after the STA whitelist profile is bound to a VAP
profile or an AP system profile using the 11.7.50 sta-access-mode command.
If the configured whitelist takes effect, only STAs in the whitelist can access the WLAN.
Example
# Create the STA whitelist profile sta-whitelist-profile1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] sta-whitelist-profile name sta-whitelist-profile1
[HUAWEI-wlan-whitelist-prof-sta-whitelist-profile1]
Related Topics
11.7.50 sta-access-mode
11.7.19 display sta-whitelist-profile
Format
wapi asu ip ip-address
undo wapi asu ip
Parameters
Parameter Description Value
ip-address Specifies an IP address for the ASU server. The value is in dotted
decimal notation.
Views
Security profile view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
If WAPI certificate authentication is configured, an AC sends WAPI authentication packets to
the ASU server at the specified IP address.
Prerequisites
If WAPI certificate authentication is specified as a security policy in a security profile, run the
wapi asu command to specify an IP address for the ASU server.
Precautions
The wapi asu command helps to determine to which ASU server WAPI packets are sent.
Users must ensure the correctness of both ASU certificates and ASU servers; otherwise, they
may fail in user authentication.
The system displays the message only when the security profile has been bound to the other
profiles.
Example
# Specify IP address 10.164.10.10 for the ASU server.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1] wapi asu ip 10.164.10.10
11.7.55 wapi bk
Function
The wapi bk command sets the interval for updating a BK and the BK lifetime percentage.
The undo wapi bk command restores the default interval for updating a BK and the BK
lifetime percentage.
By default, the interval for updating a BK is 43200s, and the BK lifetime percentage is 70%.
Format
wapi { bk-threshold bk-threshold | bk-update-interval bk-update-interval }
undo wapi { bk-threshold | bk-update-interval }
Parameters
Parameter Description Value
bk-update- Specifies the interval for updating a BK. The value is an integer
interval bk- that ranges from 600 to
update-interval 604800, in seconds.
Views
Security profile view
Default Level
2: Configuration level
Usage Guidelines
You can set the intervals for updating a BK to ensure security.
The value obtained by multiplying the interval for updating a BK by the BK lifetime
percentage should be greater than or equal to 300 seconds. If the interval for updating a BK is
less than 300s, the BK may be updated before negotiation is complete due to low STA
performance. In this case, some STAs may be forced offline or cannot go online.
Example
# Set the interval for updating a BK to 10000s and the BK lifetime percentage to 80%.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1] wapi bk-update-interval 10000
Warning: If the product of bk-update-interval and bk-threshold is smaller than
300s, users may be forced offline. Continue? [Y/N]:y
[HUAWEI-wlan-sec-prof-p1] wapi bk-threshold 80
Function
The wapi cert-retrans-count command sets the number of retransmissions of certificate
authentication packets.
The undo wapi cert-retrans-count command restores the default number of retransmissions
of certificate authentication packets.
By default, the number of retransmissions is 3.
Format
wapi cert-retrans-count cert-count
undo wapi cert-retrans-count
Parameters
Parameter Description Value
Views
Security profile view
Default Level
2: Configuration level
Usage Guidelines
If WAPI authentication is specified as a security policy, run the wapi cert-retrans-count
command to set the number of retransmissions of certificate authentication packets.
Example
# Set the number of retransmissions of certificate authentication packets to 5.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1] wapi cert-retrans-count 5
Function
The wapi import certificate command imports the AC certificate file, certificate of the AC
certificate issuer, and ASU certificate file.
The undo wapi certificate command deletes the imported AC certificate file, certificate of
the AC certificate issuer, or ASU certificate file.
By default, the AC certificate file, certificate of the AC certificate issuer, and ASU certificate
file are not imported.
Format
wapi import certificate { ac | asu | issuer } format pkcs12 file-name file-name password
password
Parameters
Parameter Description Value
file-name file- Specifies a certificate file name, which the The value is a string of
name complete path of a certificate file must be 1 to 255 characters. It
specified. cannot contain
question marks (?) and
cannot start or end
with double quotation
marks (" ") or spaces.
password Specifies the key of the P12 certificate. The password can be
password in plain text or cipher
text.
l A plain text
password is a string
of 1 to 32
characters.
l A cipher text
password is a string
of 48 or 68
characters.
Views
Security profile view
Default Level
3: Management level
Usage Guidelines
l If WAPI certificate authentication is specified as a security policy in a security profile,
run the wapi import certificate command to specify the AC certificate, certificate of the
AC certificate issuer, and ASU certificate. STAs will fail to be authenticated if you do
not run this command. The issuer certificate helps to check whether the AC certificate is
modified.
l Before using this command, store the AC certificate and ASU certificate to the storage of
the device, and import the certificates and private key using TFTP. Certificates must be
X509 V3 certificates and comply with the WAPI standard. Otherwise, certificates cannot
be imported.
l After this command is run:
– When an issuer certificate is configured, the system checks correctness of the AC
certificate.
– If the authentication system uses only two certificates, the issuer certificate and
ASU certificate have the same certificate file name and are the same certificate. If
the authentication system uses three certificates, the issuer certificate and ASU
certificate are different from each other and both must be imported.
NOTE
Example
# Import the AC certificate.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1] wapi import certificate ac format pem file-name flash:/
local_ac.cer
Format
wapi import private-key format pkcs12 file-name file-name password password
wapi import private-key format pem file-name file-name
undo wapi private-key
Parameters
Parameter Description Value
file-name file- Specifies the name of a private key file. The value is a string of
name 1 to 255 characters. It
cannot contain
question marks (?) and
cannot start or end
with double quotation
marks (" ") or spaces.
password Specifies the password in the private key file The password can be
password of the P12 format. in plain text or cipher
text.
l A plain text
password is a string
of 1 to 32
characters.
l A cipher text
password is a string
of 48 or 68
characters.
Views
Security profile view
Default Level
3: Management level
Usage Guidelines
l If WAPI certificate authentication is specified as a security policy in a security profile,
run the wapi import private-key command to specify the private key file for the AC
certificate.
l Before using this command, store the AC private key file to the storage of the device,
and import the private key file using TFTP.
l After this command is used, the system obtains the private key file and establishes the
mapping between the certificate and private key.
NOTE
The certificate and private key to be imported must be valid and correct.
Example
# Import the AC private key file ac_key.key.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1] wapi import private-key format pem file-name flash:/
ac_key.key
Related Topics
11.7.16 display security-profile
Format
wapi { usk | msk } key-update { disable | time-based }
undo wapi { usk | msk } key-update
Parameters
Parameter Description Value
Views
Security profile view
Default Level
2: Configuration level
Usage Guidelines
l To ensure network security, update keys in a timely manner. There are several key update
modes.
l The wapi key-update command sets the USK and MSK update mode. If the interval for
updating an MSK or a USK is too long , key security cannot be ensured.
l If disable is specified, keys will not be updated.
Example
# Set the USK update mode to time-based update.
<HUAWEI> system-view
[HUAWEI] wlan
Related Topics
11.7.60 wapi msk
11.7.63 wapi usk
Function
The wapi msk command sets the interval for updating an MSK, and number of
retransmissions of MSK negotiation packets.
The undo wapi msk command restores the default interval for updating an MCK, and
number of retransmissions of MSK negotiation packets.
By default, the interval for updating an MSK is 86400s; the number of retransmissions of
MSK negotiation packets is 3.
Format
wapi { msk-update-interval msk-interval | msk-retrans-count msk-count }
Parameters
Parameter Description Value
msk-update- Specifies the interval for updating an MSK. The value is an integer
interval msk- When the MSK update mode is set to time- that ranges from 600 to
interval based update using the 11.7.59 wapi key- 604800, in seconds.
update command, the interval for updating an
MSK needs to be set.
Views
Security profile view
Default Level
2: Configuration level
Usage Guidelines
WAPI defines a dynamic key negotiation mechanism, but there are still security risks if a STA
uses the same encryption key for a long time. Both the USK and MSK have a lifetime. The
USK or MSK needs to be updated when its lifetime ends.
Example
# Set the interval for updating an MSK to 10000s, and number of retransmissions of MSK
negotiation packets to 5.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1] wapi msk key-update time-based
[HUAWEI-wlan-sec-prof-p1] wapi msk-update-interval 10000
[HUAWEI-wlan-sec-prof-p1] wapi msk-retrans-count 5
Related Topics
11.7.59 wapi key-update
Format
wapi sa-timeout sa-time
undo wapi sa-timeout
Parameters
Parameter Description Value
Views
Security profile view
Default Level
2: Configuration level
Usage Guidelines
You can prolong the WAPI timeout period to increase the authentication success ratio.
Example
# Set the timeout period of an SA to 100s.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1] wapi sa-timeout 100
Format
wapi source interface { vlanif vlan-id | loopback loopback-number }
undo wapi source interface
Parameters
Parameter Description Value
vlanif vlan-id Configures a VLANIF interface as the source The value is an integer
interface. that ranges from 1 to
4094.
Views
Security profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Example
# Configure a VLANIF interface as the source interface for the AC to communicate with the
ASU server.
<HUAWEI> system-view
[HUAWEI] vlan 100
[HUAWEI-vlan100] quit
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address 192.168.10.1 24
[HUAWEI-Vlanif100] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1] wapi source interface Vlanif 100
Format
wapi { usk-update-interval usk-interval | usk-retrans-count usk-count }
undo wapi { usk-update-interval | usk-retrans-count }
Parameters
Parameter Description Value
usk-update- Specifies the interval for updating a USK. The value is an integer
interval usk- When the USK update mode is set to time- that ranges from 600 to
interval based update using the 11.7.59 wapi key- 604800, in seconds.
update command, the interval for updating a
USK needs to be set.
Views
Security profile view
Default Level
2: Configuration level
Usage Guidelines
WAPI defines a dynamic key negotiation mechanism, but there are still security risks if a STA
uses the same encryption key for a long time. Both the USK and MSK have a lifetime. The
USK or MSK needs to be updated when its lifetime ends.
Example
# Set the interval for updating a USK to 10000s, and number of retransmissions of USK
negotiation packets to 5.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1] wapi usk key-update time-based
[HUAWEI-wlan-sec-prof-p1] wapi usk-update-interval 10000
[HUAWEI-wlan-sec-prof-p1] wapi usk-retrans-count 5
Related Topics
11.7.59 wapi key-update
Function
The weak-iv-detect quiet-time command sets the quiet time for an AP to report the detected
weak IV attacks to the AC.
The undo weak-iv-detect quiet-time command restores the default quiet time for an AP to
report the detected weak IV attacks to the AC.
By default, the quiet time is 600 seconds for an AP to report the detected weak IV attacks to
the AC.
Format
weak-iv-detect quiet-time quiet-time-value
Parameters
Parameter Description Value
quiet-time- Specifies the quiet time for an AP to report the The value is an integer
value detected weak IV attacks to the AC. that ranges from 60 to
36000, in seconds.
Views
WIDS profile view
Default Level
2: Configuration level
Usage Guidelines
After attack detection is enabled on an AP, the AP reports alarms upon attack detection. If a
attack source launches attacks repeatedly, a large number of repetitive alarms are generated.
To prevent this situation, configure the quiet time for an AP to report alarms. When detecting
attack sources of the same MAC address, the AP does not report alarms in the quiet time.
However, if the AP still detects attacks from the attack source after the quiet time expires, the
AP reports alarms. You can set the quiet time based on attack types.
To obtain attack information in a timely manner, set the quiet time to a small value. If attack
detection is enabled on many APs, and attacks are frequently detected, set the quiet time to a
large value to prevent frequent alarm reports.
Example
# Set the quiet time to 300 seconds for an AP to report the detected weak IV attacks to the
AC.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name office
[HUAWEI-wlan-ap-group-office] radio 0
[HUAWEI-wlan-group-radio-office/0] wids attack detect enable weak-iv
[HUAWEI-wlan-group-radio-office/0] quit
[HUAWEI-wlan-ap-group-office] quit
[HUAWEI-wlan-view] wids-profile name huawei
[HUAWEI-wlan-wids-prof-huawei] weak-iv-detect quiet-time 300
Related Topics
11.7.67 wids attack detect enable
Function
The wep default-key command sets the default key ID for WEP authentication or encryption.
The undo wep default-key command restores the default key ID for WEP authentication or
encryption.
By default, key 0 is used for WEP authentication or encryption.
Format
wep default-key key-id
undo wep default-key
Parameters
Parameter Description Value
key-id Specifies the default key ID. The key ID must exist.
Views
Security profile view
Default Level
2: Configuration level
Usage Guidelines
l A maximum of four WEP keys can be configured, and only one WEP key is used for
authentication and encryption. This command specifies which key to use.
l After a key ID is specified, the specified key is used for authentication or encryption.
l Each AP can have at most four key indexes configured. The key indexes used by
different VAPs cannot be the same. If a key index takes effect on a VAP, the key index
cannot be applied to other VAPs.
l The system displays the message only when the security profile has been bound to the
other profiles.
Example
# Set the default key ID to 1.
<HUAWEI> system-view
[HUAWEI] wlan
Related Topics
11.7.66 wep key
Format
wep key key-id { wep-40 | wep-104 | wep-128 } { pass-phrase | hex } key-value
undo wep key key-id
Parameters
Parameter Description Value
Views
Security profile view
Default Level
2: Configuration level
Usage Guidelines
To connect to a WLAN device in WEP shared-key authentication mode, run the wep key
command to set a WEP key.
NOTE
If the key is in hexadecimal notation, you can enter hexadecimal characters without entering 0x.
The system displays the message only when the security profile has been bound to the other
profiles.
Example
# Configure a WEP key and its ID.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1] wep key 1 wep-128 hex 12345678123456781234567812345678
Related Topics
11.7.65 wep default-key
Function
(AP group radio view) The wids attack detect enable command enables attack detection on
all specified radios in an AP group.
(AP group radio view) The undo wids attack detect enable command disables attack
detection on all l specified radios in an AP group.
(AP radio view) The wids attack detect enable command enables attack detection on an AP
radio.
(AP radio view) The undo wids attack detect enable command cancels the configuration of
the attack detection function on an AP radio. The status of this function on the AP radio is
then determined by the status of this function in the AP group radio view.
By default, attack detection is disabled on AP radios.
Format
wids attack detect enable { all | flood | weak-iv | spoof | wpa-psk | wpa2-psk | wapi-psk |
wep-share-key }
undo wids attack detect enable { all | flood | weak-iv | spoof | wpa-psk | wpa2-psk | wapi-
psk | wep-share-key }
Parameters
Parameter Description Value
Views
AP group radio view, AP radio view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To monitor and prevent malicious or unintentional attacks on WLANs in real time, network
administrators can enable the following attack detection functions based on actual
requirements:
l flood: indicates flood attack detection used to detect whether an AP receives a large
number of packets of the same type in a short period.
l weak-iv: indicates weak IV attack detection used to detect whether weak IV is used for
WEP encryption on a WLAN.
l spoof: indicates spoofing attack detection used to detect whether a potential attacker
pretends to be an AP to broadcast Deauthentication and Disassociation packets.
l wpa-psk, wpa2-psk, wapi-psk, wep-share-key: indicates brute force attack detection. If
the WPA-PSK, WPA2-PSK, WAPI-PSK, or WEP-SK security policy is configured on a
WLAN, brute force attack detection can be enabled to increase the time required for
password cracking and improve password security.
Precautions
The configuration in the AP radio view has a higher priority than that in the AP group radio
view.
Follow-up Procedure
Run the 11.7.30 dynamic-blacklist enable command to enable the dynamic blacklist
function.
Example
# Enable brute force attack detection for WPA-PSK authentication on radio 0 in AP group
office.
<HUAWEI> system-view
[HUAWEI] wlan
Related Topics
11.7.30 dynamic-blacklist enable
Function
(AP group radio view) The wids contain enable command enables rogue device containment
on all specified radios in an AP group.
(AP group radio view) The undo wids contain enable command disables rogue device
containment on all specified radios in an AP group.
(AP radio view) The wids contain enable command enables rogue device containment on an
AP radio.
(AP radio view) The undo wids contain enable command cancels the configuration of the
rogue device containment function on an AP radio. The status of this function on the AP radio
is then determined by the status of this function in the AP group radio view.
Format
wids contain enable
Parameters
None
Views
AP group radio view, AP radio view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the containment mode is set against rogue APs, the monitor AP uses the identity of the
rogue AP to broadcast disauthentication frames to forcibly disconnect STAs. To prevent the
STAs from connecting to the rogue AP again, the monitor AP will periodically and
continuously send disauthentication frames.
After the containment mode is set against rogue STAs or ad-hoc devices, the monitor AP uses
the MAC address of a rogue device to continuously send unicast disauthentication frames.
Precautions
The configuration in the AP radio view has a higher priority than that in the AP group radio
view.
After command keep-service enable is executed, if the wids device detect enable and wids
contain enable commands are configured to enable rogue device detection and containment,
the AP will continue providing data services after going offline. However, the AC considers
the AP as a rogue device and adds it to the containment list. The containment mechanism will
disconnect STAs from the AP. Therefore, service holding upon CAPWAP link disconnection
does not take effect in this case.
After command keep-service enable allow new-access is executed, if the wids device detect
enable and wids contain enable commands are configured to enable rogue device detection
and containment, the AP will continue providing data services after going offline. However,
the AC considers the AP as a rogue device and adds it to the containment list. The
containment mechanism will disable the AP from allowing access of new STAs. Therefore,
the function of enabling an offline AP to allow access of new STAs does not take effect in this
case.
Follow-up Procedure
Run the 11.7.4 contain-mode command to set the rogue device containment mode.
Example
# Enable rogue device containment on radio 0 in AP group office.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name office
[HUAWEI-wlan-ap-group-office] radio 0
[HUAWEI-wlan-group-radio-office/0] wids contain enable
Related Topics
11.7.4 contain-mode
Format
wids device detect enable
Parameters
None
Views
AP group radio view, AP radio view
Default Level
2: Configuration level
Usage Guidelines
Application Scenario
After the wireless device detection function is enabled, the monitoring AP detects information
about wireless devices in its coverage range and reports the information to the AC. The AC
determines whether unauthorized devices exist on the WLAN.
Precautions
The configuration in the AP radio view has a higher priority than that in the AP group radio
view.
After command keep-service enable is executed, if the wids device detect enable and wids
contain enable commands are configured to enable rogue device detection and containment,
the AP will continue providing data services after going offline. However, the AC considers
the AP as a rogue device and adds it to the containment list. The containment mechanism will
disconnect STAs from the AP. Therefore, service holding upon CAPWAP link disconnection
does not take effect in this case.
After command keep-service enable allow new-access is executed, if the wids device detect
enable and wids contain enable commands are configured to enable rogue device detection
and containment, the AP will continue providing data services after going offline. However,
the AC considers the AP as a rogue device and adds it to the containment list. The
containment mechanism will disable the AP from allowing access of new STAs. Therefore,
the function of enabling an offline AP to allow access of new STAs does not take effect in this
case.
Example
# Enable device detection on radio 0 in AP group office.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name office
[HUAWEI-wlan-ap-group-office] radio 0
[HUAWEI-wlan-group-radio-office/0] wids device detect enable
Function
The wids-whitelist-profile command creates a WIDS whitelist profile and displays the WIDS
whitelist profile view.
The undo wids-whitelist-profile command deletes a WIDS whitelist profile.
By default, no WIDS whitelist profile exists in the system.
Format
wids-whitelist-profile name profile-name
undo wids-whitelist-profile { name profile-name | all }
Parameters
Parameter Description Value
name profile- Specifies the name of a WIDS whitelist The value is a string of
name profile. 1 to 35 case-insensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After WIDS/WIPS is enabled, rogue APs can be detected and countered. However, there may
be APs of other vendors or on other networks working in the existing signal coverage areas. If
these APs are countered, their services will be affected. To prevent this situation, configure an
authorized AP list, including an authorized MAC address list, OUI list, and SSID list. If an
unauthorized AP is detected but matches the authorized AP list, the AP is considered an
authorized AP and will not be countered. After you create a WIDS whitelist profile using the
wids-whitelist-profile command, run the 11.7.34 permit-ap command to configure an
authorized AP list.
Follow-up Procedure
Run the 11.7.71 wids-whitelist-profile (WIDS profile view) command to bind the WIDS
whitelist profile to a WIDS profile so that the WIDS whitelist profile can take effect.
Example
# Create the WIDS whitelist profile office.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wids-whitelist-profile name office
[HUAWEI-wlan-wids-whitelist-office]
Related Topics
11.7.71 wids-whitelist-profile (WIDS profile view)
11.7.34 permit-ap
Function
The wids-whitelist-profile command binds a WIDS whitelist profile to a WIDS profile.
The undo wids-whitelist-profile command unbinds a WIDS whitelist profile from a WIDS
profile.
Format
wids-whitelist-profile profile-name
undo wids-whitelist-profile
Parameters
Parameter Description Value
Views
WIDS profile view
Default Level
2: Configuration level
Usage Guidelines
After you create a WIDS whitelist profile using the 11.7.70 wids-whitelist-profile (WLAN
view) command, bind it to a WIDS profile so that the WIDS whitelist profile can take effect.
Example
# Bind the WIDS whitelist profile office01 to the WIDS profile wids-office01.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wids-whitelist-profile name office01
[HUAWEI-wlan-wids-whitelist-office01] quit
[HUAWEI-wlan-view] wids-profile name wids-office01
[HUAWEI-wlan-wids-prof-wids-office01] wids-whitelist-profile office01
Related Topics
11.7.70 wids-whitelist-profile (WLAN view)
11.7.72 wids-profile (WLAN view)
Function
The wids-profile command creates a WIDS profile and displays the WIDS profile view.
You can run the 11.7.11 display wids-profile command to view configuration of the WIDS
profile default.
Format
wids-profile name profile-name
Parameters
Parameter Description Value
name profile- Specifies the name of a WIDS profile. The value is a string of
name 1 to 35 case-insensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can configure the WIDS function on a device to detect and counter rogue devices on a
WLAN. The WIDS function also enables the device to detect attacks and add devices
launching the attacks to a dynamic blacklist. Packets sent from the blacklisted devices will be
rejected to protect authorized users.
After you create a WIDS profile using the wids-profile command, you can configure APs to
detect and counter rogue devices, and detect attacks in the profile.
Follow-up Procedure
Run the 11.7.73 wids-profile (AP group view and AP view) command to bind the WIDS
profile to an AP group or AP so that the WIDS profile can take effect.
Example
# Create the WIDS profile office.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wids-profile name office
[HUAWEI-wlan-wids-prof-office]
Related Topics
11.7.73 wids-profile (AP group view and AP view)
Format
wids-profile profile-name
undo wids-profile
Parameters
Parameter Description Value
Views
AP group view, AP view
Default Level
2: Configuration level
Usage Guidelines
After you create a WIDS profile using the 11.7.72 wids-profile (WLAN view) command,
bind it to an AP group or AP to make the profile take effect.
Example
# Bind the WIDS profile office01 to AP group AP-office01.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wids-profile name office01
[HUAWEI-wlan-wids-prof-office01] quit
[HUAWEI-wlan-view] ap-group name AP-office01
[HUAWEI-wlan-ap-group-AP-office01] wids-profile office01
Related Topics
11.7.72 wids-profile (WLAN view)
Format
wids-spoof-profile name profile-name
undo wids-spoof-profile { name profile-name | all }
Parameters
Parameter Description Value
name profile- Specifies the name of a WIDS spoof SSID The value is a string of
name profile. 1 to 35 case-insensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
WLAN services are available in public places, such as banks and airports. Users can connect
to the WLANs after associating with corresponding SSIDs. If a rogue AP is deployed and
provides spoofing SSIDs similar to authorized SSIDs, the users may be misled and connect to
the rogue AP, which brings security risks. To address this problem, configure a fuzzy
matching rule to identify spoofing SSIDs. After you create a WIDS spoof SSID profile using
the wids-spoof-profile command, run the 11.7.49 spoof-ssid command to configure a fuzzy
matching rule to identify spoofing SSIDs.
Follow-up Procedure
Run the 11.7.75 wids-spoof-profile (WIDS profile view) command to bind the WIDS spoof
SSID profile to a WIDS profile to make the WIDS spoof SSID profile take effect.
Example
# Create the WIDS spoof SSID profile office.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wids-spoof-profile name office
[HUAWEI-wlan-wids-spoof-office]
Related Topics
11.7.75 wids-spoof-profile (WIDS profile view)
11.7.49 spoof-ssid
Function
The wids-spoof-profile command binds a WIDS spoof SSID profile to a WIDS profile.
The undo wids-spoof-profile command unbinds a WIDS spoof SSID profile from a WIDS
profile.
Format
wids-spoof-profile profile-name
undo wids-spoof-profile
Parameters
Parameter Description Value
profile-name Specifies the name of a WIDS spoof SSID The WIDS spoof SSID
profile. profile must already
exist.
Views
WIDS profile view
Default Level
2: Configuration level
Usage Guidelines
After you create a WIDS spoof SSID profile using the 11.7.74 wids-spoof-profile (WLAN
view) command, bind it to a WIDS profile so that the WIDS spoof SSID profile can take
effect.
Example
# Bind the WIDS spoof SSID profile office01 to the WIDS profile office01.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wids-spoof-profile name office01
[HUAWEI-wlan-wids-spoof-office01] quit
[HUAWEI-wlan-view] wids-profile name office01
[HUAWEI-wlan-wids-prof-office01] wids-spoof-profile office01
Related Topics
11.7.74 wids-spoof-profile (WLAN view)
11.7.72 wids-profile (WLAN view)
11.7.76 work-mode
Function
The work-mode command sets the radio working mode in the radio profile view.
The undo work-mode command restores the default radio working mode.
Format
work-mode { monitor [ dual-band-scan enable ] | normal }
undo work-mode
Parameters
Parameter Description Value
Views
AP group radio view, AP radio view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
– If the air scan function is disabled on a radio, including WIDS, spectrum analysis,
and terminal location, the radio is used to transmit common WLAN services.
– If the air scan function is enabled on a radio, the radio transmits common WLAN
services and also implements detection. Transmission of common WLAN services
may be affected.
l monitor: indicates the monitor mode.
In this mode, the radio can only transmit WLAN services scanned by the air interface but
cannot transmit common WLAN services.
Precautions
The change of the radio working mode can lead to interrupted services. Users cannot associate
with the AP when its radio is working in monitoring mode.
The configuration in the AP radio view has a higher priority than that in the AP group radio
view.
In monitor mode, the working channels and power of AP radios change at any time. In this
situation, the working channels and power of the AP radios display as -.
Radio 1 does not support inter-band scanning.
Example
# Set the working mode of radio 0 in AP group office to monitor.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name office
[HUAWEI-wlan-ap-group-office] radio 0
[HUAWEI-wlan-group-radio-office/0] work-mode monitor
Warning: Modify the work mode may cause business interruption, continue?(y/n)
:y
Format
wpa ptk-update enable
undo wpa ptk-update enable
Parameters
None
Views
Security profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In WPA or WPA2 authentication and encryption, a Pairwise Transient Key (PTK) is generated
at the key negotiation stage to encrypt unicast radio packets. To ensure secure encryption,
enable periodic PTK update so that the AP and STA use a new PTK to encrypt radio packets
after a regular interval.
Precautions
When periodic PTK update is implemented, some terminals may go offline due to individual
problems.
Follow-up Procedure
Run the 11.7.78 wpa ptk-update ptk-update-interval command to configure the periodic
PTK update interval.
Example
# Enable the periodic PTK update function.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name huawei
[HUAWEI-wlan-sec-prof-huawei] wpa ptk-update enable
Related Topics
11.7.78 wpa ptk-update ptk-update-interval
Function
The wpa ptk-update ptk-update-interval command configures an interval for updating
PTKs in WPA or WPA2 authentication and encryption.
The undo wpa ptk-update ptk-update-interval command restores the default PTK update
interval.
Format
wpa ptk-update ptk-update-interval ptk-rekey-interval
Parameters
Parameter Description Value
Views
Security profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To ensure secure encryption during WPA or WPA2 authentication, enable periodic PTK
update. You can run this command to configure the PTK update interval. A smaller interval
indicates faster PTK update and more secure data encryption. However, if the PTK update
interval is set too small, the STA and AP implement more negotiations, affecting the
throughput.
Precautions
The configured periodic PTK update interval takes effect only after you enable the periodic
PTK update function using the 11.7.77 wpa ptk-update enable command.
Example
# Set the periodic PTK update interval to 50,000 seconds.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name huawei
[HUAWEI-wlan-sec-prof-huawei] wpa ptk-update ptk-update-interval 50000
Related Topics
11.7.77 wpa ptk-update enable
Format
dhcp trust port
Parameters
None
Views
WDS profile view
Default Level
2: Configuration level
Usage Guidelines
After a DHCP trusted port is enabled in a WDS profile and the WDS profile is applied to an
AP, the AP receives the DHCP OFFER, ACK, and NAK packets sent by authorized DHCP
servers and forwards the packets to STAs so that the STAs can obtain valid IP addresses and
go online.
Example
# Enable a DHCP trusted port in the WDS profile test.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wds-profile name test
[HUAWEI-wlan-wds-prof-test] dhcp trust port
Related Topics
11.8.20 wds-profile
Function
The display references wds-profile command displays reference information about a WDS
profile.
Format
display references wds-profile name profile-name
Parameters
Parameter Description Value
name profile- Displays reference information about a The WDS profile must
name specified WDS profile. exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references wds-profile command to check reference information
about a WDS profile.
Example
# Display reference information about the WDS profile test.
<HUAWEI> display references wds-profile name test
--------------------------------------------------------------------------------
Reference type Reference name Reference radio WLAN ID
--------------------------------------------------------------------------------
AP group group-1 Radio-0 13
AP group group-1 Radio-0 14
--------------------------------------------------------------------------------
Total: 2
Table 11-172 Description of the display references wds-profile name command output
Parameter Description
Parameter Description
Related Topics
11.8.4 display wds-profile
11.8.21 wds-profile radio
11.8.22 wds-profile (AP group radio view or AP radio view)
Format
display references wds-whitelist-profile name whitelist-name
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references wds-whitelist-profile command to check reference
information about a specified WDS whitelist profile.
Example
# Display reference information about the WDS whitelist profile test.
<HUAWEI> display references wds-whitelist-profile name test
--------------------------------------------------------------------------------
Reference type Reference name
--------------------------------------------------------------------------------
AP group profile-1
AP group profile-2
--------------------------------------------------------------------------------
Total: 2
Parameter Description
Related Topics
11.8.5 display wds-whitelist-profile
11.8.23 wds-whitelist-profile
11.8.24 wds-whitelist-profile (AP group radio view or AP radio view)
Function
The display wds-profile command displays reference or configuration information about a
WDS profile.
Format
display wds-profile { all | name profile-name }
Parameters
Parameter Description Value
name profile- Displays information about a specified WDS The WDS profile must
name profile. exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display wds-profile command to view the number of times a WDS profile is
referenced or configuration information of a specified WDS profile.
Example
# Display reference information about all WDS profiles.
<HUAWEI> display wds-profile all
--------------------------------------------------------------------------------
Profile name Reference
--------------------------------------------------------------------------------
default 0
test 2
--------------------------------------------------------------------------------
Total: 2
Item Description
Related Topics
11.8.1 dhcp trust port (WDS profile view)
Function
The display wds-whitelist-profile command displays reference or configuration information
about a WDS whitelist profile.
Format
display wds-whitelist-profile { all | name whitelist-name }
Parameters
Parameter Description Value
name whitelist- Displays information about a specified WDS The WDS whitelist
name whitelist profile. profile must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display wds-whitelist-profile command to view the number of times a WDS
whitelist profile is referenced or MAC addresses added in a specified WDS whitelist profile.
Example
# Display reference information about all WDS whitelist profiles.
<HUAWEI> display wds-whitelist-profile all
--------------------------------------------------------------------------------
Profile name Reference
--------------------------------------------------------------------------------
default 0
test 2
--------------------------------------------------------------------------------
Total: 2
Related Topics
11.8.23 wds-whitelist-profile
11.8.9 peer-ap mac (WDS whitelist profile view)
Format
display wds vap { ap-group ap-group-name | ap-id ap-id [ radio radio-id ] | ap-name ap-
name [ radio radio-id ] } [ wds-name wds-name ]
display wds vap { all | wds-name wds-name }
Parameters
Parameter Description Value
ap-group ap- Displays information about all WDS VAPs in a The AP group must
group-name specified AP group. exist.
ap-id ap-id Displays information about WDS VAPs on the The AP ID must exist.
AP with a specified ID.
ap-name ap- Displays information about WDS VAPs on the The AP name must
name AP with a specified name. exist.
radio radio-id Displays information about WDS VAPs of a The radio ID must
specified AP radio. exist.
wds-name Displays information about WDS VAPs of a The WDS name must
wds-name specified WDS name. exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display wds vap command to display information about a WDS VAP.
Example
# Display information about all WDS VAPs.
<HUAWEI> display wds vap all
WID : WLAN ID
----------------------------------------------------------------------------------
---
AP ID AP name RfID WID WDS name BSSID WDS
links
----------------------------------------------------------------------------------
---
1 AP2 0 14 wds 60DE-4474-964D
0
1 AP2 0 13 wds 60DE-4474-964C
0
0 AP1 0 14 wds 60DE-4476-E36D
1
0 AP1 0 13 wds 60DE-4476-E36C
1
----------------------------------------------------------------------------------
---
Total: 4
AP ID AP ID.
AP name AP name.
Related Topics
11.8.7 display wlan wds link
11.8.19 wds-name
Format
display wlan wds link { all | ap-id ap-id [ radio radio-id ] | ap-name ap-name [ radio radio-
id ] | wds-profile profile-name }
Parameters
Parameter Description Value
ap-id ap-id Displays information about WDS links on the The AP ID must exist.
AP with a specified ID.
ap-name ap- Displays information about WDS links on the The AP name must
name AP with a specified name. exist.
radio radio-id Displays information about WDS links of a The radio ID must
specified AP radio. exist.
wds-profile Displays information about WDS links in a The WDS profile must
profile-name specified WDS profile. exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display wlan wds link command to view information about a WDS link.
Example
# Display information about all WDS links.
<HUAWEI> display wlan wds link all
Rf : radio ID Dis : coverage distance(100m)
Ch : channel Per : drop percent(%)
TSNR : total SNR(dB) P- : peer
WDS : WDS mode Re : retry ratio(%)
RSSI : RSSI(dBm) MaxR : max RSSI(dBm)
----------------------------------------------------------------------------------
------------------
APName P-APName Rf Dis Ch WDS P-Status RSSI MaxR Per Re
TSNR SNR(Ch0~2:dB)
----------------------------------------------------------------------------------
------------------
AP_1 1 3 36 root - -77 -40 100 100
0 -/-/-
AP_2 1 3 36 root - -72 -40 56 99
23 21/19/-
----------------------------------------------------------------------------------
------------------
Total: 2
Table 11-179 Description of the display wlan wds link command output
Item Description
Item Description
Related Topics
11.8.6 display wds vap
Function
The mode command sets the working mode for an AP's wired interface.
The undo mode command restores the default working mode of an AP's wired interface.
By default,
l On a common AP: Its GE interfaces work in root mode, Eth interfaces in endpoint
mode, and Eth-Trunk interfaces in root mode.
l On a central AP: Its downlink GE interfaces work in middle mode and uplink GE
interfaces in root mode.
l On an R230D: Its Eth interface works in root mode.
l On an R240D: Its Eth interface works in endpoint mode and GE interface in root mode.
NOTE
You cannot change the working mode of wired interfaces on the R230D, R240D, AP2010DN and
AP2030DN.
Format
mode { root | endpoint | middle }
undo mode
Parameters
Parameter Description Value
Views
AP wired port profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When working as an uplink interface to connect to an AC, an AP's wired interface must work
in root mode. In root mode, the AP's wired interface automatically joins service VLANs and
user-specific VLANs (for example, VLANs assigned by the RADIUS server).
When working as a downlink interface to connect to a wired terminal, the AP's wired
interface must work in endpoint mode. In endpoint mode, the AP's wired interface does not
join any VLAN by default.
When the central AP connects to RUs through downlink GE interfaces, the working mode of
the downlink GE interfaces must be set to middle.
Precautions
The AP's wired interface supports user isolation in endpoint mode, but not in root mode.
If the working mode of an AP's wired interface is set to root in the AP wired port profile, you
cannot set the vlan pvid vlan-id. In turn, if you set the vlan pvid vlan-id, you cannot set the
working mode of the AP's wired interface to root.
Example
# Set the working mode of the AP's wired interface GE0 to endpoint.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name ap-group1
[HUAWEI-wlan-ap-group-ap-group1] quit
[HUAWEI-wlan-view] wired-port-profile name wired
[HUAWEI-wlan-wired-port-wired] mode endpoint
[HUAWEI-wlan-wired-port-wired] quit
[HUAWEI-wlan-view] ap-group name ap-group1
[HUAWEI-wlan-ap-group-ap-group1] wired-port-profile wired gigabitethernet 0
Related Topics
11.1.265 wired-port-profile (WLAN view)
Format
peer-ap mac mac-address
undo peer-ap mac mac-address
Parameters
Parameter Description Value
Views
WDS whitelist profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a WDS whitelist profile is created, you can run the peer-ap mac command to add
neighboring APs' MAC addresses to the profile.
If a WDS whitelist profile is bound to a WDS profile, only APs with MAC addresses in the
WDS whitelist profile can access the local AP, and other APs are denied access.
Precautions
A maximum of six MAC addresses can be added to a WDS whitelist profile.
Example
# Create the WDS whitelist profile whitelist and add the MAC address 0001-0001-0001 to
the whitelist profile. Bind the WDS whitelist profile whitelist to radio 0 of APs in the AP
group group1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wds-whitelist-profile name whitelist
[HUAWEI-wlan-wds-whitelist-whitelist] peer-ap mac 0001-0001-0001
[HUAWEI-wlan-wds-whitelist-whitelist] quit
[HUAWEI-wlan-view] ap-group name group1
[HUAWEI-wlan-ap-group-group1] radio 0
[HUAWEI-wlan-group-radio-group1/0] wds-whitelist-profile whitelist
Related Topics
11.8.23 wds-whitelist-profile
0-7 0
8-15 1
16-23 2
24-31 3
32-39 4
40-47 5
48-55 6
56-63 7
Format
priority-map dscp { dscp-value1 [ to dscp-value2 ] } &<1-10> dot11e dot11e-value
undo priority-map dscp
Parameters
Parameter Description Value
dscp dscp- Specifies the DSCP priority of 802.3 packets. The value is an integer
value1 that ranges from 0 to
63. A larger value
indicates a higher
priority.
to dscp-value2 Specifies the DSCP priority of 802.3 packets. The value is an integer
that ranges from 0 to
63. A larger value
indicates a higher
priority.
dot11e dot11e- Specifies the 802.11e user priority. The value is an integer
value that ranges from 0 to 7.
A larger value
indicates a higher
priority.
Views
WDS profile view
Default Level
2: Configuration level
Usage Guidelines
On a WDS network, you can run this command to configure the mapping from DSCP
priorities to 802.11e user priorities on the WDS air interface of an AP.
Example
# Map DSCP priorities 0-6 to 802.11e user priority 0 on the WDS air interface.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wds-profile name test
[HUAWEI-wlan-wds-prof-test] priority-map dscp 0 to 6 dot11e 0
Related Topics
11.8.11 priority-map trust (WDS profile view)
The undo priority-map trust command restores the default priority mapping to be trusted by
the WDS air interface.
By default, the WDS air interface trusts the mapping from DSCP priorities to 802.11e user
priorities.
Format
priority-map trust { dot1p | dscp }
Parameters
Parameter Description Value
Views
WDS profile view
Default Level
2: Configuration level
Usage Guidelines
On a WDS network, when 802.1p or DSCP priorities in data packets need to be mapped to
802.11e user priorities and the packets are transmitted through a WDS link, run this
command.
Example
# Configure the WDS air interface to trust the mapping from 802.1p priorities to 802.11e user
priorities.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wds-profile name test
[HUAWEI-wlan-wds-prof-test] priority-map trust dot1p
Related Topics
11.8.10 priority-map dscp (WDS profile view)
Format
security-profile profile-name
undo security-profile
Parameters
Parameter Description Value
profile-name Specifies the name of the security profile The security profile
bound to a WDS profile. must exist.
Views
WDS profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Before a WDS profile is applied to an AP radio to set up WDS links, the WDS profile must
have a security profile bound to ensure WDS link security.
Precautions
Currently, the WDS profile supports only the security policy WPA2+PSK+AES. After a
security profile is bound to a WDS profile, the authentication policy and encryption mode in
the security profile cannot be changed, but the authentication key can be changed.
A WDS profile can only have one security profile bound. If you run the command multiple
times in the same WDS profile view, the latest configuration overwrites the old one.
Example
# Create the security profile sec and set the security policy to WPA2+PSK+AES. Create the
WDS profile test and bind the security profile to the WDS profile.
<HUAWEI> system-view
[HUAWEI] wlan
Related Topics
11.7.46 security-profile
11.8.20 wds-profile
Format
stp enable
undo stp enable
Parameters
None
Views
AP wired port profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a WDS or Mesh network, STP packets are transparently transmitted over wireless links
(WDS or Mesh links). An STP-enabled AP does not forward STP packets to the wireless side.
STP takes effect only on the AP's wired side.
Precautions
If an AP's wired interface is added to an Eth-Trunk, the wired interface does not support STP.
Example
# Enable STP on the AP's wired interface GE0.
<HUAWEI> system-view
[HUAWEI] wlan
Related Topics
11.1.265 wired-port-profile (WLAN view)
Function
The user-isolate command enables user isolation on an AP's wired interface.
The undo user-isolate command disables user isolation on an AP's wired interface.
By default, user isolation is disabled on an AP's wired interface.
Format
user-isolate { all | l2 }
undo user-isolate
Parameters
Parameter Description Value
Views
AP wired port profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The user isolation function prevents users on the same wired interface from communicating
with each other. All user traffic on the wired interface is forwarded by the gateway. Therefore,
this function ensures communication security on wired interfaces and allows uniform
charging for users.
Precautions
Example
# Set the working mode of the AP's wired interface GE0 to endpoint and enable Layer 2 user
isolation on GE0.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name ap-group1
[HUAWEI-wlan-ap-group-ap-group1] quit
[HUAWEI-wlan-view] wired-port-profile name wired
[HUAWEI-wlan-wired-port-wired] mode endpoint
[HUAWEI-wlan-wired-port-wired] user-isolate l2
[HUAWEI-wlan-wired-port-wired] quit
[HUAWEI-wlan-view] ap-group name ap-group1
[HUAWEI-wlan-ap-group-ap-group1] wired-port-profile wired gigabitethernet 0
Related Topics
11.1.265 wired-port-profile (WLAN view)
Function
The vlan pvid command sets the PVID for an AP wired interface.
The undo vlan pvid command deletes the PVID of an AP wired interface.
Format
vlan pvid vlan-id
Parameters
Parameter Description Value
Views
AP wired port profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The APs on the WLAN WDS network only process tagged packets.
When receiving an untagged packet from a peer device, the AP wired interface adds a VLAN
tag to the packet. After the PVID is configured on the wired interface, the interface adds the
PVID to all the received untagged packets.
NOTE
In the following paragraphs, packets sent by the AP's wired interface refer to the management packets and
service packets sent in the tunnel forwarding mode.
l After the management-vlan vlan-id command is executed, to configure the AP wired interface to allow
packets carrying the management VLAN tag to pass through, run the vlan tagged vlan-id command to
add the AP wired interface to the management VLAN in tagged mode.
l After the management-vlan vlan-id command is executed, to disable packets sent from the AP wired
interface from carrying the management VLAN tag, run the vlan untagged vlan-id command to add the
AP wired interface to the management VLAN in untagged mode.
l After the management-vlan vlan-id command is executed, to add the management VLAN tag to
untagged packets received on the AP wired interface, run the vlan pvid vlan-id command to set the PVID
of the AP wired interface to the management VLAN ID.
Precautions
Eth-Trunk member interfaces do not support PVID setting.
Example
# Set the working mode of the AP's wired interface GE0 to endpoint and set the PVID of
GE0 to VLAN 1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name ap-group1
[HUAWEI-wlan-ap-group-ap-group1] quit
[HUAWEI-wlan-view] wired-port-profile name wired
[HUAWEI-wlan-wired-port-wired] mode endpoint
[HUAWEI-wlan-wired-port-wired] vlan pvid 1
[HUAWEI-wlan-wired-port-wired] quit
[HUAWEI-wlan-view] ap-group name ap-group1
[HUAWEI-wlan-ap-group-ap-group1] wired-port-profile wired gigabitethernet 0
Related Topics
11.1.265 wired-port-profile (WLAN view)
NOTE
Currently, VLANs can only be added to a WDS profile in tagged mode.
Format
vlan tagged { vlan-id1 [ to vlan-id2 ] } &<1-10>
Parameters
Parameter Description Value
Views
WDS profile view
Default Level
2: Configuration level
Usage Guidelines
Adding VLANs to a WDS profile is equivalent to adding hybrid interfaces to a VLAN. After
one or a group of VLANs is added to a WDS profile, the WDS link forwards only the packets
with these VLAN IDs from STAs and peer APs.
NOTE
Example
# Create the WDS profile test and add VLANs 3, 4, 5, 6, 10, and 12 to the WDS profile in
tagged mode.
<HUAWEI> system-view
[HUAWEI] wlan
Related Topics
11.8.20 wds-profile
NOTE
Format
vlan { tagged | untagged } { vlan-id1 [ to vlan-id2 ] } &<1-10>
undo vlan { all | vlan-id1 [ to vlan-id2 ] &<1-10> }
Parameters
Parameter Description Value
Views
AP wired port profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the vlan tagged { vlan-id1 [ to vlan-id2 ] } &<1-10> command is executed to add the
wired interface to one or more VLANs in tagged mode, the interface does not remove VLAN
tags from the packets it forwarded.
After the vlan untagged { vlan-id1 [ to vlan-id2 ] } &<1-10> command is executed to add
the wired interface to one or more VLANs in untagged mode, the interface removes VLAN
tags from the packets it forwarded.
NOTE
After an AP wired interface is added to the management VLAN, CAPWAP packets sent from the AP wired
interface carry the VLAN tag.
l After the management-vlan vlan-id command is executed, to configure the AP wired interface to allow
packets carrying the management VLAN tag to pass through, run the vlan tagged vlan-id command to
add the AP wired interface to the management VLAN in tagged mode.
l After the management-vlan vlan-id command is executed, to disable packets sent from the AP wired
interface from carrying the management VLAN tag, run the vlan untagged vlan-id command to add the
AP wired interface to the management VLAN in untagged mode.
l After the management-vlan vlan-id command is executed, to add the management VLAN tag to
untagged packets received on the AP wired interface, run the vlan pvid vlan-id command to set the PVID
of the AP wired interface to the management VLAN ID.
Configuration Impact
Eth-Trunk member interfaces cannot be added to VLANs.
Example
# Set the working mode of the AP wired interface GE0 to endpoint and add GE0 to VLANs
3, 4, 5, and 10 in tagged mode and to VLANs 12, 13, 14, and 20 in untagged mode.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name ap-group1
[HUAWEI-wlan-ap-group-ap-group1] quit
[HUAWEI-wlan-view] wired-port-profile name wired
[HUAWEI-wlan-wired-port-wired] mode endpoint
[HUAWEI-wlan-wired-port-wired] vlan tagged 3 to 5 10
[HUAWEI-wlan-wired-port-wired] vlan untagged 12 to 14 20
[HUAWEI-wlan-wired-port-wired] quit
[HUAWEI-wlan-view] ap-group name ap-group1
[HUAWEI-wlan-ap-group-ap-group1] wired-port-profile wired gigabitethernet 0
Related Topics
11.1.265 wired-port-profile (WLAN view)
11.8.18 wds-mode
Function
The wds-mode command sets the WDS mode in a WDS profile.
By default, the WDS mode in a WDS profile is leaf.
Format
wds-mode { root | middle | leaf }
Parameters
Parameter Description Value
Views
WDS profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To connect an AP to an AC through WDS links, use this command to set the WDS mode for
an AP radio based on the location of the AP on a WDS network.
In the downlink direction, a root node can connect to a middle or leaf node, and a middle node
can connect to a leaf node. A leaf node is the termination node of a WDS link.
Precautions
After changing the WDS mode in a WDS profile, reset the APs using the profile to make the
changed WDS mode take effect.
Example
# Create the WDS profile test and set the WDS mode of the profile to middle.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wds-profile name test
[HUAWEI-wlan-wds-prof-test] wds-mode middle
Related Topics
11.8.20 wds-profile
11.8.19 wds-name
Function
The wds-name command sets a WDS name for a WDS profile.
The undo wds-name command deletes the WDS name of a WDS profile.
By default, the WDS name of a WDS profile is HUAWEI-WLAN-WDS.
Format
wds-name name
undo wds-name
Parameters
Parameter Description Value
name Specifies the character string that indicates the The value is a string of
WDS name. 1 to 32 case-sensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
Views
WDS profile view
Default Level
2: Configuration level
Usage Guidelines
A WDS name is similar to an SSID. On a WDS network, an AP radio discovers WDS
services provided by other APs based on the WDS name.
Each WDS profile must have a WDS name. The default WDS name of a WDS profile is
HUAWEI-WLAN-WDS. You can run the 11.8.19 wds-name command to set a WDS name
for a WDS profile.
Example
# Create the WDS profile test and set the WDS name of the profile to bridge.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wds-profile name test
[HUAWEI-wlan-wds-prof-test] wds-name bridge
Related Topics
11.8.20 wds-profile
11.8.20 wds-profile
Function
The wds-profile command creates a WDS profile or displays the WDS profile view.
Format
wds-profile name profile-name
undo wds-profile { all | name profile-name }
Parameters
Parameter Description Value
name profile- Specifies the name of a WDS profile. The value is a string of
name 1 to 35 case-insensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Each WDS profile must have a WDS name. The default WDS name of a WDS profile is
HUAWEI-WLAN-WDS. You can run the 11.8.19 wds-name command to set a WDS name
for a WDS profile.
Example
# Create the WDS profile test and set the WDS name of the profile to bridge.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wds-profile name test
[HUAWEI-wlan-wds-prof-test] wds-name bridge
Related Topics
11.8.19 wds-name
Function
The wds-profile radio command binds a WDS profile to an AP group or AP.
The undo wds-profile radio command deletes a WDS profile from an AP group or AP.
By default, no WDS profile is bound to an AP group or AP.
Format
wds-profile profile-name radio { all | radio-id }
undo wds-profile radio { all | radio-id }
Parameters
Parameter Description Value
profile-name Specifies the name of the WDS profile bound The WDS profile must
to an AP or AP group. exist.
Views
AP group view, AP view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a WDS profile is bound to an AP or AP group, the AP radio will generate a WDS VAP
to provide WDS services. The WDS VAP provides hidden SSIDs for WDS nodes to set up
connections.
Prerequisites
A WDS profile has been created and configured properly.
Precautions
Among the VAPs created after a WDS profile is bound to an AP radio, the VAPs with the
WLAN IDs 13 and 14 cannot be occupied.
An AP radio can only have one WDS profile bound.
Since the WLAN WDS and Mesh functions are mutually exclusive, the WDS and Mesh
profiles cannot be applied to an AP radio at the same time.
Example
# Bind the WDS profile test to radio 0 of APs in the AP group group1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name group1
[HUAWEI-wlan-ap-group-group1] wds-profile test radio 0
Warning: This action may cause service interruption. Continue?[Y/N]y
Related Topics
11.8.20 wds-profile
Function
The wds-profile command binds a WDS profile to an AP radio.
The undo wds-profile command unbinds a WDS profile from an AP radio.
By default, no WDS profile is bound to an AP radio.
Format
wds-profile profile-name
undo wds-profile
Parameters
Parameter Description Value
profile-name Specifies the name of the WDS profile bound The WDS profile must
to an AP radio. exist.
Views
AP group radio view, AP radio view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a WDS profile is bound to an AP radio, the radio will generate a WDS VAP to provide
WDS services. The WDS VAP provides hidden SSIDs for WDS nodes to set up connections.
Prerequisites
A WDS profile has been created and configured properly.
Precautions
Among the VAPs created after a WDS profile is bound to an AP radio, the VAPs with the
WLAN IDs 13 and 14 cannot be occupied.
This command has the same function as the 11.8.21 wds-profile radio command. You can use
either of them.
Example
# Bind the WDS profile test to radio 0 of APs in the AP group group1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name group1
[HUAWEI-wlan-ap-group-group1] radio 0
[HUAWEI-wlan-group-radio-group1/0] wds-profile test
Warning: This action may cause service interruption. Continue?[Y/N]y
Related Topics
11.8.20 wds-profile
11.8.21 wds-profile radio
11.8.23 wds-whitelist-profile
Function
The wds-whitelist-profile command creates a WDS whitelist profile or displays the WDS
whitelist profile view.
Format
wds-whitelist-profile name whitelist-name
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
After a WDS whitelist profile is created using the wds-whitelist-profile command, you can
run the 11.8.9 peer-ap mac (WDS whitelist profile view) command in the WDS whitelist
profile view to add MAC addresses of peer APs that are allowed to set up WDS links with the
local AP to the profile.
The maximum number of the new WDS whitelist profile can be created is 512.
Example
# Create the WDS whitelist profile whitelist and add the MAC address 0001-0001-0001 to
the whitelist profile. Bind the WDS whitelist profile whitelist to radio 0 of APs in the AP
group group1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wds-whitelist-profile name whitelist
[HUAWEI-wlan-wds-whitelist-whitelist] peer-ap mac 0001-0001-0001
[HUAWEI-wlan-wds-whitelist-whitelist] quit
[HUAWEI-wlan-view] ap-group name group1
[HUAWEI-wlan-ap-group-group1] radio 0
[HUAWEI-wlan-group-radio-group1/0] wds-whitelist-profile whitelist
Related Topics
11.8.9 peer-ap mac (WDS whitelist profile view)
11.8.20 wds-profile
11.8.24 wds-whitelist-profile (AP group radio view or AP radio view)
Function
The wds-whitelist-profile command binds a WDS whitelist profile to an AP radio.
The undo wds-whitelist-profile command unbinds a WDS whitelist profile from an AP
radio.
By default, no WDS whitelist profile is bound to an AP radio.
Format
wds-whitelist-profile whitelist-name
undo wds-whitelist-profile
Parameters
Parameter Description Value
whitelist-name Specifies the name of the WDS whitelist The WDS whitelist
profile bound to an AP radio. profile must exist.
Views
AP group radio view, AP radio view
Default Level
2: Configuration level
Usage Guidelines
After a WDS whitelist profile is applied to an AP radio, the AP radio can only set up WDS
links with neighboring APs whose MAC addresses are in the WDS whitelist profile. If no
WDS whitelist profile is bound to an AP radio, the AP radio can establish WDS links with
any neighboring APs.
NOTE
On a WDS network, a root or middle node controls subnode access by MAC addresses added to the WDS
whitelist profile. However, a leaf node does not require a whitelist.
An AP radio can only have one WDS whitelist profile bound. If you run the command
multiple times on the same AP radio, the latest configuration overwrites the old one.
Example
# Create the WDS whitelist profile whitelist and add the MAC address 0001-0001-0001 to
the whitelist profile. Bind the WDS whitelist profile whitelist to radio 0 of APs in the AP
group group1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wds-whitelist-profile name whitelist
[HUAWEI-wlan-wds-whitelist-whitelist] peer-ap mac 0001-0001-0001
[HUAWEI-wlan-wds-whitelist-whitelist] quit
[HUAWEI-wlan-view] ap-group name group1
[HUAWEI-wlan-ap-group-group1] radio 0
[HUAWEI-wlan-group-radio-group1/0] wds-whitelist-profile whitelist
Related Topics
11.8.20 wds-profile
11.8.23 wds-whitelist-profile
Function
The dhcp trust port command enables a DHCP trusted port in a Mesh profile.
The undo dhcp trust port command disables a DHCP trusted port in a Mesh profile.
Format
dhcp trust port
Parameters
None
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
After a DHCP trusted port is enabled in a Mesh profile and the Mesh profile is applied to an
AP, the AP receives the DHCP OFFER, ACK, and NAK packets sent by authorized DHCP
servers and forwards the packets to STAs so that the STAs can obtain valid IP addresses and
go online.
Example
# Enable a DHCP trusted port in the Mesh profile test.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] dhcp trust port
Related Topics
11.9.17 mesh-profile
Format
display mesh-profile { all | name profile-name }
Parameters
Parameter Description Value
name profile- Displays reference information about a The Mesh profile must
name specified Mesh profile. exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display mesh-profile command to view the number of times a Mesh profile
is referenced or configuration information of a specified Mesh profile.
Example
# Display reference information about all Mesh profiles.
<HUAWEI> display mesh-profile all
--------------------------------------------------------------------------------
Profile name Reference
--------------------------------------------------------------------------------
default 0
test 2
--------------------------------------------------------------------------------
Total: 2
Item Description
Item Description
Related Topics
11.9.1 dhcp trust port (Mesh profile view)
11.9.9 fwa wmm edca-client
11.9.10 fwa wmm edca-mode
11.9.11 fwa enable
11.9.13 link-report-interval
11.9.14 link-rssi-threshold
11.9.15 max-link-number
11.9.16 mesh-id
11.9.27 security-profile (Mesh profile view)
Function
The display mesh-whitelist-profile command displays reference or configuration
information about a Mesh whitelist profile.
Format
display mesh-whitelist-profile { all | name whitelist-name }
Parameters
Parameter Description Value
name whitelist- Displays information about a specified Mesh The Mesh whitelist
name whitelist profile. profile must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display mesh-whitelist-profile command to view the number of times a
Mesh whitelist profile is referenced or MAC addresses added in a specified Mesh whitelist
profile.
Example
# Display reference information about all Mesh whitelist profiles.
<HUAWEI> display mesh-whitelist-profile all
--------------------------------------------------------------------------------
Profile name Reference
--------------------------------------------------------------------------------
default 0
test 2
--------------------------------------------------------------------------------
Total: 2
Item Description
Item Description
Related Topics
11.9.21 mesh-whitelist-profile
11.9.24 peer-ap mac (Mesh whitelist profile view)
Format
display mesh vap { ap-group ap-group-name | ap-id ap-id [ radio radio-id ] | ap-name ap-
name [ radio radio-id ] } [ mesh-id mesh-id ]
display mesh vap { all | mesh-id mesh-id }
Parameters
Parameter Description Value
ap-group ap- Displays information about all Mesh VAPs in a The AP group must
group-name specified AP group. exist.
ap-id ap-id Displays information about Mesh VAPs on the The AP ID must exist.
AP with a specified ID.
ap-name ap- Displays information about Mesh VAPs on the The AP name must
name AP with a specified name. exist.
radio radio-id Displays information about Mesh VAPs of a The radio ID must
specified AP radio. exist.
mesh-id mesh- Displays information about Mesh VAPs of a The Mesh ID must
id specified Mesh ID. exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display mesh vap command to view information about a specified Mesh
VAP or all Mesh VAPs.
Example
# Display information about all Mesh VAPs.
<HUAWEI> display mesh vap all
WID : WLAN ID
-------------------------------------------------------------------------------
Item Description
AP ID AP ID.
AP name AP name.
Related Topics
11.9.7 display wlan mesh link
11.9.16 mesh-id
Function
The display references mesh-profile command displays reference information about a Mesh
profile.
Format
display references mesh-profile name profile-name
Parameters
Parameter Description Value
name profile- Specifies the name of a Mesh profile. The Mesh profile must
name exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references mesh-profile command to check reference information
about a Mesh profile.
Example
# Display reference information about the Mesh profile test.
<HUAWEI> display references mesh-profile name test
--------------------------------------------------------------------------------
Reference type Reference name Reference radio WLAN ID
--------------------------------------------------------------------------------
AP group test1 Radio-0 16
--------------------------------------------------------------------------------
Total: 1
Related Topics
11.9.2 display mesh-profile
11.9.18 mesh-profile radio
11.9.19 mesh-profile (AP group radio view or AP radio view)
Function
The display references mesh-whitelist-profile command displays reference information
about a Mesh whitelist profile.
Format
display references mesh-whitelist-profile name whitelist-name
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references mesh-whitelist-profile command to check reference
information about a specified Mesh whitelist profile.
Example
# Display reference information about the Mesh whitelist profile test.
<HUAWEI> display references mesh-whitelist-profile name test
--------------------------------------------------------------------------------
Reference type Reference name
--------------------------------------------------------------------------------
AP group default
--------------------------------------------------------------------------------
Total: 1
Item Description
Item Description
Related Topics
11.9.3 display mesh-whitelist-profile
11.9.21 mesh-whitelist-profile
11.9.22 mesh-whitelist-profile (AP group radio view or AP radio view)
Function
The display wlan mesh link command displays information about a Mesh link.
Format
display wlan mesh link { all | ap-id ap-id [ radio radio-id ] | ap-name ap-name [ radio
radio-id ] | mesh-profile profile-name }
Parameters
Parameter Description Value
ap-id ap-id Displays information about Mesh links on the The AP ID must exist.
AP with a specified ID.
ap-name ap- Displays information about Mesh links on the The AP name must
name AP with a specified name. exist.
radio radio-id Displays information about Mesh links of a The radio ID must
specified AP radio. exist.
mesh-profile Displays information about Mesh links in a The Mesh profile must
profile-name specified Mesh profile. exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display wlan mesh link command to view information about a Mesh link.
Example
# Display information about all Mesh links.
<HUAWEI> display wlan mesh link all
Rf : radio ID Dis : coverage distance(100m)
Ch : channel Per : drop percent(%)
TSNR : total SNR(dB) P- : peer
Mesh : Mesh mode Re : retry ratio(%)
RSSI : RSSI(dBm) MaxR : max RSSI(dBm)
--------------------------------------------------------------------------------
--------------------
APName P-APName Rf Dis Ch Mesh P-Status RSSI
MaxR Per Re TSNR SNR(Ch0~2:dB)
--------------------------------------------------------------------------------
--------------------
area_3 0 3 1 portal - -43 -5 0
65 52 50/43/-
area_1 0 3 1 portal - -43 -5 0
44 52 47/50/-
area_2 0 3 1 portal - -51 -5 0
61 42 26/38/-
--------------------------------------------------------------------------------
--------------------
Total: 3
Table 11-188 Description of the display wlan mesh link command output
Item Description
Item Description
Related Topics
11.9.4 display mesh vap
Format
display wlan mesh route { ap-id ap-id | ap-name ap-name | all }
Parameters
Parameter Description Value
ap-id Displays routing information of the AP with a The AP ID must exist.
specified ID on a Mesh network.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can use this command to view specified or all APs' routing information on a Mesh
network, which helps you locate faults on the Mesh network.
Example
# Display all APs' routing information on a Mesh network.
<HUAWEI> display wlan mesh route all
-------------------------------------------------------------------------------
Table 11-189 Description of the display wlan mesh route command output
Item Description
AC_VO ECWmax 3
ECWmin 2
AIFSN 2
TXOPLimit 47
AC_VI ECWmax 4
ECWmin 3
AIFSN 2
TXOPLimit 94
AC_BE ECWmax 10
ECWmin 4
AIFSN 3
TXOPLimit 0
AC_BK ECWmax 10
ECWmin 4
AIFSN 7
TXOPLimit 0
Format
fwa wmm edca-client { ac-vo | ac-vi | ac-be | ac-bk } { aifsn aifsn-value | ecw ecwmin
ecwmin-value ecwmax ecwmax-value | txoplimit txoplimit-value } *
undo fwa wmm edca-client
Parameters
Parameter Description Value
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
WMM classifies data packets into the following access categories (ACs): AC_VO, AC_VI,
AC_BE, and AC_BK. A set of EDCA parameters is set for each AC queue. These parameters
determine the capabilities of a queue to occupy a channel. You can set EDCA parameters for
packets of different ACs to provide differentiated priorities to the packets and different
capabilities to compete for channels. In this way, differentiated services are implemented.
Table 11-191 describes the EDCA parameters.
Arbitration Interframe Spacing The DIFS has a fixed value. WMM provides different
Number (AIFSN) DIFS values for different ACs. A large AIFSN value
means that the STA must wait for a long time and has
a low priority.
Exponent form of CWmin ECWmin specifies the minimum backoff time, and
(ECWmin) and exponent form of ECWmax specifies the maximum backoff time.
CWmax (ECWmax) Together, they determine the average backoff time.
Large ECWmin and ECWmax values mean a long
average backoff time for the STA and a low STA
priority.
Parameter Meaning
Transmission Opportunity Limit After preempting a channel, the STA can occupy the
(TXOPLimit) channel within the period of TXOPLimit. A large
TXOPLimit value means that the STA can occupy the
channel for a long time. If the TXOPLimit value is 0,
the STA can onlysend one data frame every time it
preempts a channel.
Precautions
l The EDCA parameters configured using the fwa wmm edca-client command take effect
only after you set the EDCA mode to manual mode using the fwa wmm edca-mode
manual command.
l By default, queues of AC_VO, AC_VI, AC_BE, and AC_BK are in descending order of
priority. Priorities of the four queues are determined by their EDCA parameters.
You need to configure EDCA parameters according to actual scenarios. Table 11-192 shows
the configuration of EDCA parameters in voice scenarios, and Table 11-193 shows the
configuration in voice and video hybrid scenarios.
AC_VO ECWmax 4
ECWmin 2
AIFSN 2
TXOPLimit 0
AC_VI ECWmax 5
ECWmin 3
AIFSN 5
TXOPLimit 0
AC_BE ECWmax 10
ECWmin 6
AIFSN 5
TXOPLimit 0
AC_BK ECWmax 10
ECWmin 8
AIFSN 12
TXOPLimit 0
Table 11-193 Recommended configuration of EDCA parameters in voice and video hybrid
scenarios
Packet Type Parameters Description
AC_VO ECWmax 4
ECWmin 2
AIFSN 2
TXOPLimit 0
AC_VI ECWmax 5
ECWmin 3
AIFSN 5
TXOPLimit 0
AC_BE ECWmax 10
ECWmin 6
AIFSN 12
TXOPLimit 0
AC_BK ECWmax 10
ECWmin 8
AIFSN 12
TXOPLimit 0
Example
# Configure EDCA parameters of AC_VO packets used by the remote AP to negotiate with
the AT.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] fwa wmm edca-mode manual
[HUAWEI-wlan-mesh-prof-test] fwa wmm edca-client ac-vo aifsn 7 ecw ecwmin 4
ecwmax 10 txoplimit 0
Related Topics
11.9.10 fwa wmm edca-mode
Format
fwa wmm edca-mode { auto | manual }
Parameters
Parameter Description Value
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In scenarios where the AT connects to the remote AP through Mesh links, the remote AP
automatically adjusts EDCA parameters based on the number of ATs in automatic EDCA
mode. In manual mode, you can run the 11.9.9 fwa wmm edca-client command to configure
EDCA parameters of the remote AP. The remote AP negotiates with the AT according to the
configured parameters.
NOTE
l The fwa wmm edca-mode command takes effect only after the FWA mode is enabled in the Mesh
profile using the 11.9.11 fwa enable command.
l In automatic EDCA mode, the EDCA parameters manually configured using the 11.9.9 fwa wmm
edca-client command do not take effect on the AP.
l This command applies only to scenarios where the AT connects to the remote AP through Mesh links.
Example
# Set the EDCA mode to auto.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name huawei
[HUAWEI-wlan-mesh-prof-huawei] fwa wmm edca-mode auto
Related Topics
11.9.11 fwa enable
11.5.23 wmm edca-ap
Format
fwa enable
undo fwa enable
Parameters
None
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
An outdoor Access Terminal (AT) needs to set up a Mesh link with a remote AP to provide
network access for the connected users. You need to configure Mesh service on the remote AP
and enable Fixed Wireless Access (FWA) in the Mesh profile so that the AT can connect to
the remote AP.
Configuration Impact
l FWA and vehicle-ground fast link handover are mutually exclusive in a Mesh profile.
l After you enable FWA for a Mesh profile using the fwa enable command, the default
value of link-num in the max-link-number link-num command is 32, and the value
ranges from 1 to 32.
l After you enable FWA in a Mesh profile using the fwa enable command, the RSSI
threshold of a Mesh link is fixed as -90 dBm, and not changed by the 11.9.14 link-rssi-
threshold command.
l After you enable FWA in a Mesh profile using the fwa enable command, you can
complete Mesh service configuration without the need to bind a Mesh whitelist profile to
the Mesh profile.
l After you enable FWA for a Mesh profile using the fwa enable command, the radio
bound to the Mesh profile allows access from only ATs. Do not enable FWA when ATs
are not used to prevent a Mesh service configuration failure.
Example
# Enable FWA for the Mesh profile named test.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] fwa enable
11.9.12 link-aging-time
Function
The link-aging-time command sets the aging time of a Mesh link.
The undo link-aging-time command restores the default aging time of a Mesh link.
Format
link-aging-time aging-time
undo link-aging-time
Parameters
Parameter Description Value
aging-time Specifies the aging time of a Mesh link. The value is an integer
that ranges from 5 to
60, in seconds. The
default value is 60.
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
If a Mesh node cannot receive keepalive packets from a neighboring node for a period of time
greater than or equal to the aging time of a Mesh link, the Mesh node considers the Mesh link
disconnected and will reselect a link.
In a fast changing radio environment, if the aging time of a Mesh link is set to a small value,
Mesh links may be frequently disconnected or reselected, causing network flapping. If the
aging time of a Mesh link is set to a large value, a Mesh node cannot reselect Mesh links in a
timely manner, causing service interruption. Therefore, you need to configure a proper aging
time for Mesh links based on actual situations.
Example
# Set the aging time of a Mesh link to 10s.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] link-aging-time 10
Related Topics
11.9.17 mesh-profile
11.9.13 link-report-interval
Function
The link-report-interval command sets the interval at which an MP reports Mesh link
information to the AC.
The undo link-report-interval command restores the default interval at which an MP reports
Mesh link information to the AC.
Format
link-report-interval report-interval
undo link-report-interval
Parameters
Parameter Description Value
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When the network is unstable, an MP may frequently send Mesh link establishment or
teardown information to the AC, affecting AC's processing of user services. To solve this
problem, run the link-report-interval command to configure an MP to periodically send
Mesh link information to the AC. After the command is executed, the MP sends link
information to the AC only at specified intervals, ensuring normal processing of user services.
Example
# Set the interval at which an MP reports Mesh link information to the AC to 20s.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] link-report-interval 20
Related Topics
11.9.17 mesh-profile
11.9.14 link-rssi-threshold
Function
The link-rssi-threshold command sets the received signal strength indicator (RSSI) threshold
of a mesh link.
The undo link-rssi-threshold command restores the default RSSI threshold of a mesh link.
By default, the RSSI threshold of a mesh link is -75 dBm. After the FWA mode is enabled in
a Mesh profile, the RSSI threshold of a Mesh link is fixed as -90 dBm.
Format
link-rssi-threshold threshold-value
undo link-rssi-threshold
Parameters
Parameter Description Value
threshold-value Specifies the RSSI threshold of a mesh link. The value is an integer
that ranges from -90 to
-20, in dBm. The
default value is -75.
After the FWA mode is
enabled in a Mesh
profile, the RSSI
threshold of a Mesh
link is fixed as -90
dBm.
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The RSSI threshold of a mesh link indicates the minimum RSSI of the mesh link. If the RSSI
of an MP that joins a WMN is lower than the RSSI threshold configured using the link-rssi-
threshold command, the routing information table of the mesh link is updated and routing
information about the MP is deleted.
The RSSI threshold of a mesh link depends on the distance between two MPs that establish
the mesh link. If the two MPs are far from each other, a smaller RSSI threshold is
recommended. If the two MPs are close to each other, a larger RSSI threshold is
recommended.
Example
# Set the RSSI threshold of mesh links to -60 dBm.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] link-rssi-threshold -60
Related Topics
11.9.17 mesh-profile
11.9.15 max-link-number
Function
The max-link-number command sets the maximum number of mesh links that can be
established between APs.
The undo max-link-number command restores the default maximum number of mesh links
that can be established between APs.
By default, a maximum of eight mesh links can be established between APs. After you enable
FWA for a mesh profile using the fwa enable command, a maximum of 32 mesh links can be
established between APs by default.
Format
max-link-number link-num
undo max-link-number
Parameters
Parameter Description Value
link-num Specifies the maximum number of mesh links The value is an integer
that can be established between APs. that ranges from 1 to
32.
NOTE
After you enable FWA
for a mesh profile using
the fwa enable
command, the default
value of link-num is 32,
and the value ranges
from 1 to 32.
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When an AP sets up too many Mesh links with neighboring APs, network indicators, such as
the throughput cannot meet customer needs, affecting user experience. To improve user
experience, you can run the max-link-number command to set the maximum number of
mesh links that can be established between APs according to actual situations.
Impact
If the number of mesh links of an AP has reached the maximum, the AP does not set up new
Mesh links with neighboring APs.
Example
# Set the maximum number of mesh links that can be established between APs to 3.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] max-link-number 3
Related Topics
11.9.17 mesh-profile
11.9.16 mesh-id
Function
The mesh-id command sets a Mesh ID for a Mesh profile.
The undo mesh-id command restores the Mesh ID of a Mesh profile to the default value.
Format
mesh-id name
undo mesh-id
Parameters
Parameter Description Value
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
The Mesh ID of a Mesh profile is similar to the SSID. On a Mesh network, AP radios
discover available Mesh services of other APs based on the Mesh ID.
Each Mesh profile must have a Mesh ID. The default Mesh ID of a Mesh profile is
HUAWEI-WLAN-MESH. You can run the 11.9.16 mesh-id command to set a Mesh ID for a
Mesh profile.
Example
# Create the Mesh profile test and set the Mesh ID of the profile to mesh-net.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] mesh-id mesh-net
Related Topics
11.9.17 mesh-profile
11.9.17 mesh-profile
Function
The mesh-profile command creates a Mesh profile or displays the Mesh profile view.
Format
mesh-profile name profile-name
Parameters
Parameter Description Value
name profile- Specifies the name of a Mesh profile. The value is a string of
name 1 to 35 case-insensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a Mesh profile is applied to an AP radio, Mesh VAPs are created on the radio.
Each Mesh profile must have a Mesh ID. The default Mesh ID of a Mesh profile is
HUAWEI-WLAN-MESH. You can run the 11.9.16 mesh-id command to set a Mesh ID for a
Mesh profile.
Example
# Create the Mesh profile test and set the Mesh ID of the profile to mesh-net.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] mesh-id mesh-net
Related Topics
11.9.16 mesh-id
Function
The mesh-profile radio command binds a Mesh profile to an AP group or AP.
The undo mesh-profile radio command unbinds a Mesh profile from an AP group or AP.
Format
mesh-profile profile-name radio { all | radio-id }
Parameters
Parameter Description Value
profile-name Specifies the name of the Mesh profile bound The Mesh profile must
to an AP group or AP. exist.
Views
AP group view, AP view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a Mesh profile is bound to an AP group or AP, a Mesh VAP will be generated on AP
radios to provide Mesh services for users.
Prerequisites
Precautions
Among the VAPs created after a Mesh profile is bound to a radio, the VAP with the WLAN
ID 16 cannot be occupied.
Since the WLAN WDS and Mesh functions are mutually exclusive, the WDS and Mesh
profiles cannot be applied to an AP radio at the same time.
Example
# Bind the Mesh profile test to radio 0 of APs in the AP group group1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name group1
[HUAWEI-wlan-ap-group-group1] mesh-profile test radio 0
Related Topics
11.9.17 mesh-profile
Function
The mesh-profile command binds a Mesh profile to an AP radio.
Format
mesh-profile profile-name
undo mesh-profile
Parameters
Parameter Description Value
profile-name Specifies the name of the Mesh profile bound The Mesh profile must
to an AP radio. exist.
Views
AP group radio view, AP radio view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a Mesh profile is bound to an AP group radio or an AP radio, a Mesh VAP will be
generated on the specified AP radio to provide Mesh services for users.
Prerequisites
Precautions
Among the VAPs created after a Mesh profile is bound to a radio, the VAP with the WLAN
ID 16 cannot be occupied.
This command has the same function as the 11.9.18 mesh-profile radio command. You can
use either of them.
Example
# Bind the Mesh profile test to radio 0 of APs in the AP group group1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name group1
[HUAWEI-wlan-ap-group-group1] radio 0
[HUAWEI-wlan-group-radio-group1/0] mesh-profile test
Related Topics
11.9.17 mesh-profile
11.9.18 mesh-profile radio
11.9.20 mesh-role
Function
The mesh-role command configures a Mesh role for an AP in the AP system profile.
The undo mesh-role command restores the default Mesh role of an AP in the AP system
profile.
Format
mesh-role { mesh-portal | mesh-node }
undo mesh-role
Parameters
Parameter Description Value
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
APs on a Mesh network can be sorted into the following types:
l MP (mesh-node): Any Mesh points (MPs) that can support AP functions. They provide
both Mesh service and user access service.
l MPP (mesh-portal): Mesh points that connect the Mesh network to other types of
networks and forward communication traffic on a Mesh network.
Configure Mesh roles of APs according to service requirements. If an AP needs to provide
Mesh and user access services, set the Mesh role of the AP to mesh-node. If an AP is located
at Mesh network ingress or needs to connect MPs to external networks, set the Mesh role of
the AP to mesh-portal.
NOTE
To ensure the overall Mesh network performance, you are not advised to configure user access services
on a mesh-portal AP.
Example
# Set the Mesh role of an AP to mesh-portal in the AP system profile test.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name test
[HUAWEI-wlan-ap-system-prof-test] mesh-role mesh-portal
11.9.21 mesh-whitelist-profile
Function
The mesh-whitelist-profile command creates a Mesh whitelist profile or displays the Mesh
whitelist profile view.
The undo mesh-whitelist-profile command deletes a Mesh whitelist profile.
By default, no Mesh whitelist profile is available in the system.
Format
mesh-whitelist-profile name whitelist-name
undo mesh-whitelist-profile { all | name whitelist-name }
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
After a Mesh whitelist profile is created, run the 11.9.24 peer-ap mac (Mesh whitelist
profile view) command in the Mesh whitelist profile view to add MAC addresses of the
allowed peer APs to the profile.
The maximum number of the new Mesh whitelist profile can be created is 512.
Example
# Create the Mesh whitelist profile whitelist and add the MAC address 0001-0001-0001 to
the whitelist profile. Bind the Mesh whitelist profile whitelist to radio 0 of APs in the AP
group group1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-whitelist-profile name whitelist
[HUAWEI-wlan-mesh-whitelist-whitelist] peer-ap mac 0001-0001-0001
[HUAWEI-wlan-mesh-whitelist-whitelist] quit
[HUAWEI-wlan-view] ap-group name group1
[HUAWEI-wlan-ap-group-group1] radio 0
[HUAWEI-wlan-group-radio-group1/0] mesh-whitelist-profile whitelist
Related Topics
11.9.24 peer-ap mac (Mesh whitelist profile view)
11.9.17 mesh-profile
11.9.22 mesh-whitelist-profile (AP group radio view or AP radio view)
Function
The mesh-whitelist-profile command binds a Mesh whitelist profile to an AP radio.
Format
mesh-whitelist-profile whitelist-name
undo mesh-whitelist-profile
Parameters
Parameter Description Value
whitelist-name Specifies the name of the Mesh whitelist The Mesh whitelist
profile bound to an AP radio. profile must exist.
Views
AP group radio view, AP radio view
Default Level
2: Configuration level
Usage Guidelines
After a Mesh whitelist profile is applied to an AP radio, the AP radio can only set up Mesh
links with neighboring APs whose MAC addresses are in the Mesh whitelist profile.
NOTE
On a Mesh network where ATs are deployed, after FWA is enabled in a Mesh profile using the fwa enable
command, you can complete the Mesh service configuration without the need to bind a Mesh whitelist profile
to an AP radio. However, in other Mesh application scenarios, an AP radio must have a Mesh whitelist profile
bound, and the Mesh whitelist profile must have MAC addresses configured.
An AP radio can only have one Mesh whitelist profile bound. If you run the command
multiple times on the same AP radio, the latest configuration overwrites the old one.
On a triple-radio AP, radio 2 does not support the Mesh function.
Example
# Create the Mesh whitelist profile whitelist and add the MAC address 0001-0001-0001 to
the whitelist profile. Bind the Mesh whitelist profile whitelist to radio 0 of APs in the AP
group group1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-whitelist-profile name whitelist
[HUAWEI-wlan-mesh-whitelist-whitelist] peer-ap mac 0001-0001-0001
[HUAWEI-wlan-mesh-whitelist-whitelist] quit
[HUAWEI-wlan-view] ap-group name group1
[HUAWEI-wlan-ap-group-group1] radio 0
[HUAWEI-wlan-group-radio-group1/0] mesh-whitelist-profile whitelist
Related Topics
11.9.17 mesh-profile
11.9.21 mesh-whitelist-profile
Format
mpp-active-reselection enable
undo mpp-active-reselection
Parameters
None
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After active MPP reselection is enabled on an MP, the MP evaluates MPPs of the same Mesh
ID and on the same channel based on the signal strength of Mesh links, and the numbers of
link hops and Mesh links. If a more preferable MPP is available, the MP selects the MPP as
its Mesh gateway.
By default, active MPP reselection is disabled, and an MP can only passively reselect MPPs.
Only when the minimum RSSI of all Mesh links on the optimal route to the current MPP is
lower than the RSSI threshold of a Mesh link, the MP triggers the MPP reselection process.
Precautions
The configuration does not take effect on MPPs or vehicle-mounted APs in train-ground
communication scenarios because the vehicle-mounted APs select MPPs based on the fast
link handover algorithm.
Active MPP reselection will cause service loss. Configure the function according to actual
needs.
Example
# Enable active MPP reselection.
<HUAWEI> system-view
[HUAWEI] wlan
Related Topics
11.9.17 mesh-profile
11.9.14 link-rssi-threshold
Format
peer-ap mac mac-address
undo peer-ap mac mac-address
Parameters
Parameter Description Value
Views
Mesh whitelist profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a Mesh whitelist profile is created, you can run the peer-ap mac command to add
neighboring APs' MAC addresses to the profile.
If a Mesh whitelist profile is bound to a Mesh profile, only APs with MAC addresses in the
Mesh whitelist profile can access the local AP, and other APs are denied access.
Precautions
Example
# Create the Mesh whitelist profile whitelist and add the MAC address 0001-0001-0001 to
the whitelist profile. Bind the Mesh whitelist profile whitelist to radio 0 of APs in the AP
group group1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-whitelist-profile name whitelist
[HUAWEI-wlan-mesh-whitelist-whitelist] peer-ap mac 0001-0001-0001
[HUAWEI-wlan-mesh-whitelist-whitelist] quit
[HUAWEI-wlan-view] ap-group name group1
[HUAWEI-wlan-ap-group-group1] radio 0
[HUAWEI-wlan-group-radio-group1/0] mesh-whitelist-profile whitelist
Related Topics
11.9.21 mesh-whitelist-profile
0-7 0
8-15 1
16-23 2
24-31 3
32-39 4
40-47 5
48-55 6
56-63 7
Format
priority-map dscp { dscp-value1 [ to dscp-value2 ] } &<1-10> dot11e dot11e-value
Parameters
Parameter Description Value
dscp dscp- Specifies the DSCP priority of 802.3 packets. The value is an integer
value1 that ranges from 0 to
63. A larger value
indicates a higher
priority.
to dscp-value2 Specifies the DSCP priority of 802.3 packets. The value is an integer
that ranges from 0 to
63. A larger value
indicates a higher
priority.
dot11e dot11e- Specifies the 802.11e user priority. The value is an integer
value that ranges from 0 to 7.
A larger value
indicates a higher
priority.
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
On a Mesh network, you can run this command to configure the mapping from DSCP
priorities to 802.11e user priorities on the Mesh air interface of an AP.
Example
# Map DSCP priorities 0-6 to 802.11e user priority 0 on the Mesh air interface.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] priority-map dscp 0 to 6 dot11e 0
Related Topics
11.9.26 priority-map trust (Mesh profile view)
Format
priority-map trust { dot1p | dscp }
undo priority-map trust
Parameters
Parameter Description Value
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
On a Mesh network, when 802.1p or DSCP priorities in data packets need to be mapped to
802.11e user priorities and the packets are transmitted through a Mesh link, run this
command.
Example
# Configure the Mesh air interface to trust the mapping from 802.1p priorities to 802.11e user
priorities.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] priority-map trust dot1p
Related Topics
11.9.25 priority-map dscp (Mesh profile view)
Function
The security-profile command binds a security profile to a Mesh profile.
The undo security-profile command restores the default security profile bound to a Mesh
profile.
Format
security-profile profile-name
undo security-profile
Parameters
Parameter Description Value
profile-name Specifies the name of the security profile The security profile
bound to a Mesh profile. must exist.
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Before a Mesh profile is applied to an AP radio to establish Mesh links, the Mesh profile must
have a security profile bound to ensure Mesh link security.
Precautions
Currently, the Mesh profile supports only the security policy WPA2+PSK+AES. After a
security profile is bound to a Mesh profile, the authentication policy and encryption mode in
the security profile cannot be changed, but the authentication key can be changed.
A Mesh profile can only have one security profile bound. If you run the command multiple
times in the same Mesh profile view, the latest configuration overwrites the old one.
Example
# Create the security profile sec and set the security policy to WPA2+PSK+AES. Create the
Mesh profile test and bind the security profile to the Mesh profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name sec
[HUAWEI-wlan-sec-prof-sec] security wpa2 psk pass-phrase huawei@123 aes
[HUAWEI-wlan-sec-prof-sec] quit
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] security-profile sec
Related Topics
11.9.17 mesh-profile
11.7.46 security-profile
11.10.1 antenna-output
Function
The antenna-output command configures an output mode of a 2.4G/5G antenna.
The undo antenna-output command restores the default output mode of a 2.4G/5G antenna.
Format
antenna-output { split | combine }
undo antenna-output
Parameters
Parameter Description Value
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In train-ground communication scenarios, you can use the antenna-output split command to
configure the split mode of a 2.4G/5G antenna. The antenna uses either the 2.4 GHz radio to
provide wireless coverage in the carriage, or the 5 GHz radio to provide wireless bridging
between carriages.
Precautions
Example
# Configure the combination mode of a 2.4G/5G antenna.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name apsys1
[HUAWEI-wlan-ap-system-prof-apsys1] antenna-output combine
Related Topics
11.1.112 display ap-system-profile
Function
The display mesh-handover-profile command displays reference or configuration
information about a Mesh handover profile.
Format
display mesh-handover-profile { all | name profile-name }
Parameters
Parameter Description Value
name profile- Displays information about a specified Mesh The Mesh handover
name handover profile. profile must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display mesh-handover-profile command to view the number of times a
Mesh handover profile is referenced by a Mesh profile or parameter settings of a specified
Mesh handover profile.
Example
# Display reference information about all Mesh handover profiles.
<HUAWEI> display mesh-handover-profile all
--------------------------------------------------------------------------------
Profile name Reference
--------------------------------------------------------------------------------
default 0
test 2
--------------------------------------------------------------------------------
Total: 2
Handover location based algorithm switch Status of the location-based enhanced fast
link handover algorithm.
l disable: The algorithm is disabled.
l enable: The algorithm is enabled.
To configure the parameter, run the 11.10.5
location-based-algorithm enable
command.
Related Topics
11.10.5 location-based-algorithm enable
11.10.6 mesh-handover-profile
Format
display mesh-neighbor-rssi [ ap-name ap-name radio radio-id | ap-id ap-id radio radio-id ]
[ max-neighbor-number max-number ]
Parameters
Parameter Description Value
radio radio-id Displays RSSI information The value is an integer that ranges from 0
collected by a specified to 2.
radio. l 0: indicates the 2.4 GHz radio.
l 1: indicates the 5 GHz radio.
l 2: indicates the 5 GHz radio.
NOTE
Radio 0 of the AP8130DN supports the 2.4
GHz and 5 GHz frequency bands but can only
work on one frequency band at a time.
Radio 0 and Radio 1 of the AP4030TN
supports the 2.4 GHz and 5 GHz frequency
bands but can only work on one frequency
band at a time.
You can run the 11.1.160 frequency command
to change the working frequency band of radio
0.
max-neighbor- Specifies the maximum The value is an integer that ranges from 1
number max- number of neighboring APs to 256.
number of which RSSI information
collected by the AP can be
displayed.
If this parameter is not
specified, RSSI information
of all neighboring APs
collected by the AP is
displayed.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
This command applies only to APs on a Mesh network. A local AP can collect RSSI
information of a neighboring AP only when the neighboring AP and local AP are added to
Mesh whitelists of each other.
Example
# Display RSSI information collected by all APs.
<HUAWEI> display mesh-neighbor-rssi
Info: This operation may take a few seconds, please wait.done.
AP name/MAC/Radio/Location-ID Neighbor AP/MAC/Location-ID RSSI Update Time
--------------------------------------------------------------------------------
Item Description
Function
The display references mesh-handover-profile command displays information about Mesh
profiles by which a specified Mesh handover profile is referenced.
Format
display references mesh-handover-profile name profile-name
Parameters
Parameter Description Value
name profile- Displays information about the Mesh profiles The Mesh handover
name by which a specified Mesh handover profile is profile must exist.
referenced.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references mesh-handover-profile command to check the Mesh
profiles by which a Mesh handover profile is referenced.
Example
# Display information about Mesh profiles by which the Mesh handover profile test is
referenced.
<HUAWEI> display references mesh-handover-profile name test
--------------------------------------------------------------------------------
Reference type Reference name
--------------------------------------------------------------------------------
Mesh profile profile-1
Mesh profile profile-2
--------------------------------------------------------------------------------
Total: 2
Related Topics
11.10.2 display mesh-handover-profile
11.10.6 mesh-handover-profile
11.10.7 mesh-handover-profile (Mesh profile view)
Format
location-based-algorithm enable
undo location-based-algorithm enable
Parameters
None
Views
Mesh handover profile view
Default Level
2: Configuration level
Usage Guidelines
After the location-based enhanced link handover algorithm is enabled, the vehicle-mounted
AP will switch the active link to the nearest trackside AP that meets handover requirements.
In vehicle-ground communication scenarios, signals of a trackside AP distant from a train
may be temporarily better than the trackside AP near the train due to radio environment
changes. If an active link handover occurs at this time, the active link may be incorrectly
switched to the distant trackside AP. To prevent incorrect handovers and improve vehicle-
ground communication quality, you can use the location-based enhanced link handover
algorithm. This algorithm requires that trackside APs be named in ascending or descending
order of sequence numbers.
Trackside APs should be named in head-name_sequence-number format. head-name
describes track line information and can be different for trackside APs on the same track. It is
recommended that you set the same head-name for APs on a track to differentiate tracks.
sequence-number of APs along a track must be in descending or ascending order. The
sequence numbers of trackside APs can be set with unequal steps. head-name and sequence-
number are separated using an underline (_), for example, L1_001, L1_002, L1_005, L1_010.
Example
# Enable the location-based enhanced link handover algorithm.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-handover-profile name test
[HUAWEI-wlan-mesh-handover-test] location-based-algorithm enable
Related Topics
11.10.6 mesh-handover-profile
11.10.6 mesh-handover-profile
Function
The mesh-handover-profile command creates a Mesh handover profile or displays the Mesh
handover profile view.
The undo mesh-handover-profile command deletes a Mesh handover profile.
By default, the system provides the Mesh handover profile default.
Format
mesh-handover-profile name profile-name
undo mesh-handover-profile { all | name profile-name }
Parameters
Parameter Description Value
name profile- Specifies the name of a Mesh handover profile. The value is a string of
name 1 to 35 case-insensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
After a Mesh handover profile is bound to a Mesh profile, the Mesh profile can provide the
vehicle-ground fast link handover function and apply to vehicle-ground communication
scenarios.
Example
# Create the Mesh handover profile handover and bind it to the Mesh profile test.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-handover-profile name handover
[HUAWEI-wlan-mesh-handover-handover] quit
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] mesh-handover-profile handover
Related Topics
11.10.7 mesh-handover-profile (Mesh profile view)
Function
The mesh-handover-profile command binds a Mesh handover profile to a Mesh profile.
The undo mesh-handover-profile command unbinds a Mesh handover profile from a Mesh
profile.
By default, no Mesh handover profile is bound to a Mesh profile.
Format
mesh-handover-profile profile-name
undo mesh-handover-profile
Parameters
Parameter Description Value
profile-name Specifies the name of the Mesh handover The Mesh handover
profile bound to a Mesh profile. profile must exist.
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
You can run the mesh-handover-profile command to bind a Mesh handover profile to a Mesh
profile so that the Mesh profile can provide the vehicle-ground fast link handover function
and apply to vehicle-ground communication scenarios.
Example
# Create the Mesh handover profile handover and bind it to the Mesh profile test.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-handover-profile name handover
[HUAWEI-wlan-mesh-handover-handover] quit
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] mesh-handover-profile handover
Related Topics
11.10.6 mesh-handover-profile
Format
config-agent permit ip-address ip-addrress { net-mask | mask-len }
undo config-agent permit ip-address
Parameters
Parameter Description Value
Views
IoT profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To prevent unauthorized devices from attacking an AP, you can configure trusted host
computers. In this way, only hosts within the specified IP address range can communicate
with the AP functioning as a server and send the AP the configuration to be delivered the IoT
card.
Precautions
Example
# Configure the IP address of a trusted host computer and its mask.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] iot-profile name wlan-IoT
[HUAWEI-wlan-iot-prof-wlan-IoT] config-agent permit ip-address 129.102.0.1
255.255.255.0
Function
The display iot-profile command displays the configuration of a specific IoT profile or all
IoT profiles.
Format
display iot-profile { name profile-name | all }
Parameters
Parameter Description Value
name profile- Specifies the name of an IoT profile. The value is a string of
name 1 to 35 case-insensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run this command to view the configuration of a specific IoT profile or all IoT
profiles.
Precautions
This command takes effect only on the AP4050DN-E.
Example
# Display the configuration of all IoT profiles.
<HUAWEI> display iot-profile all
--------------------------------------------------------------------------------
Profile name Reference
--------------------------------------------------------------------------------
1 0
profile1 0
wlan-IoT 1
--------------------------------------------------------------------------------
Total:3
Table 11-200 Description of the display iot-profile name wlan-IoT command output
Item Description
Item Description
Related Topics
11.11.1 config-agent permit ip-address
11.11.13 management-server
11.11.17 share-key
Format
display references iot-profile name profile-name
Parameters
Parameter Description Value
name profile- Specifies the name of an IoT profile. The IoT profile name
name must exist.
Views
All views
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run this command to view reference information about an IoT profile.
Precautions
This command takes effect only on the AP4050DN-E.
Example
# Display reference information about IoT profile wlan-IoT.
<HUAWEI> display references iot-profile name wlan-IoT
--------------------------------------------------------------------------------
Reference type Reference name Reference card
--------------------------------------------------------------------------------
AP group ap-group1 Card-1
--------------------------------------------------------------------------------
Total:1
Table 11-201 Description of the display references iot-profile name wlan-IoT command
output
Item Description
Format
display references serial-profile name profile-name
Parameters
Parameter Description Value
name profile- Specifies the name of a serial profile. The serial profile name
name must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run this command to view reference information about an IoT card serial profile.
Precautions
Example
# Display reference information about serial profile wlan-serial.
<HUAWEI> display references serial-profile name wlan-serial
--------------------------------------------------------------------------------
Reference type Reference name Reference card
--------------------------------------------------------------------------------
AP group ap-group1 Card-1
--------------------------------------------------------------------------------
Total:1
Item Description
Function
The display serial-profile command displays configuration information about a specified IoT
card serial profile or all serial profiles.
Format
display serial-profile { name profile-name | all }
Parameters
Parameter Description Value
name profile- Specifies the name of a serial profile. The value is a string of
name 1 to 35 case-insensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run this command to view the configuration information about a specified IoT card
serial profile or all serial profiles.
Precautions
Example
# Display the configuration of all serial profiles.
<HUAWEI> display serial-profile all
--------------------------------------------------------------------------------
Profile name Reference
--------------------------------------------------------------------------------
profile1 1
wlan-serial 1
preset-enjoyor-toeap 13
--------------------------------------------------------------------------------
Total:3
Item Description
Item Description
Table 11-204 Description of the display serial-profile name wlan-serial command output
Item Description
Related Topics
11.11.18 speed (serial profile view)
11.11.14 parity (serial profile view)
11.11.19 stopbits (serial profile view)
11.11.6 frame-format (serial profile view)
11.11.7 frame-length (serial profile view)
11.11.8 frame-start (serial profile view)
11.11.9 frame-stop (serial profile view)
Format
frame-format { fixed-length | frame-start-stop }
undo frame-format
Parameters
Parameter Description Value
Views
Serial profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If parameter settings in preset profiles cannot meet your needs, you can create new serial
profiles, customize serial communication parameters and framing parameters, and apply the
settings to IoT card interfaces.
Precautions
Example
# Configure a fixed-length frame format.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] serial-profile name profile1
[HUAWEI-wlan-serial-prof-profile1]frame-format fixed-length
Related Topics
11.11.7 frame-length (serial profile view)
11.11.8 frame-start (serial profile view)
11.11.9 frame-stop (serial profile view)
Format
frame-length frame-length-value
undo frame-length
Parameters
Parameter Description Value
Views
Serial profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If parameter settings in preset profiles cannot meet your needs, you can create new serial
profiles, customize serial communication parameters and framing parameters, and apply the
settings to IoT card interfaces.
Precautions
Example
# Set the frame length to 270 bytes.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] serial-profile name profile1
[HUAWEI-wlan-serial-prof-profile1]frame-length 270
Related Topics
11.11.6 frame-format (serial profile view)
11.11.8 frame-start (serial profile view)
11.11.9 frame-stop (serial profile view)
Function
The frame-start command configures the start flag byte for serial frames on an IoT card slot.
The undo frame-start command restores the configured start flag byte to the default value.
Format
frame-start frame-start-value
undo frame-start
Parameters
Parameter Description Value
frame-start-value Specifies the start flag byte of a frame. The value ranges
from 0 to ff.
Views
Serial profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If parameter settings in preset profiles cannot meet your needs, you can create new serial
profiles, customize serial communication parameters and framing parameters, and apply the
settings to IoT card slots.
Prerequisites
This parameter is valid only when the frame format is set to frame-start-stop.
Precautions
Example
# Set the start flag byte to bb.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] serial-profile name profile1
[HUAWEI-wlan-serial-prof-profile1]frame-start bb
Related Topics
11.11.6 frame-format (serial profile view)
11.11.7 frame-length (serial profile view)
11.11.9 frame-stop (serial profile view)
Function
The frame-stop command configures the stop flag byte for serial frames on an IoT card slot.
The undo frame-stop command restores the configured stop flag byte to the default value.
Format
frame-stop frame-stop-value
undo frame-stop
Parameters
Parameter Description Value
frame-stop-value Specifies the stop flag byte of a frame. The value ranges
from 0 to ff.
Views
Serial profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If parameter settings in preset profiles cannot meet your needs, you can create new serial
profiles, customize serial communication parameters and framing parameters, and apply the
settings to IoT card slots.
Prerequisites
This parameter is valid only when the frame format is set to frame-start-stop.
Precautions
Example
# Set the stop flag byte to ff.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] serial-profile name profile1
[HUAWEI-wlan-serial-prof-profile1]frame-stop ff
Related Topics
11.11.6 frame-format (serial profile view)
11.11.7 frame-length (serial profile view)
11.11.8 frame-start (serial profile view)
11.11.10 card
Function
The card command displays the IoT card interface view.
Format
card card-number
Parameters
Parameter Description Value
card-number Specifies the IoT card interface number. The value is an integer
that ranges from 1 to 3.
Views
AP group view, AP specific view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Each IoT card interface uses independent serial communication parameters and framing
parameters. By default, an IoT card interface is bound with the preset serial profile preset-
enjoyor-toeap.
Precautions
The preset card configuration profile starts with "preset-", which cannot be modified or
deleted. User-defined profiles cannot start with "preset-".
This command takes effect only on the AP4050DN-E.
Example
# Display the IoT card interface view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-group name group1
[HUAWEI-wlan-ap-group-group1] card 1
[HUAWEI-wlan-group-card-group1/1]
Format
iot-profile name profile-name
Parameters
Parameter Description Value
name profile- Specifies the name of an IoT profile. The value is a string of
name 1 to 35 case-insensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end
with double quotation
marks (" ").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
An AP functions as a server or client to communicate with the host computer in bi-directional
mode. When the AP reports data to the host computer, the AP functions as a client and the
host computer functions as a server. When the AP receives data from the host computer, the
AP functions as a server and the host computer functions as a client.
Precautions
This command takes effect only on the AP4050DN-E.
Example
# Create IoT profile profile1 and display the IoT profile view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] iot-profile name profile1
[HUAWEI-wlan-serial-prof-profile1]
Format
iot-profile profile-name config-agent udp-port port
undo iot-profile
Parameters
Parameter Description Value
Views
IoT card interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run this command to bind an IoT profile and configure the local UDP port number
for the IoT card interface when the AP functions as a server.
Precautions
This command takes effect only on the AP4050DN-E.
Example
# Bind IoT profile profile1 and set the local UDP port number to 10000.
<HUAWEI> system-view
[HUAWEI] wlan
11.11.13 management-server
Function
The management-server command configures a host computer.
Format
management-server server-ip server-ip server-port server-port-num
Parameters
Parameter Description Value
server-port Specifies the port number of a host computer. The value is an integer
server-port- that ranges from 1025
num to 55535.
Views
IoT profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Precautions
NOTE
You can configure multiple host computers. An RFID card supports a maximum of four host computers.
You cannot modify the host computer configurations. If four host computers have been configured, you
must delete a host computer so that you can add a new host computer.
Example
# Configure the IP address and port number of a host computer.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] iot-profile name profile1
[HUAWEI-wlan-serial-prof-profile1] management-server server-ip 129.102.0.1 server-
port 3000
Function
The parity command configures the parity bit for serial data on an IoT card slot.
The undo parity command restores the configured parity bit to the default value.
Format
parity { none | odd | even | mark | space }
undo parity
Parameters
Parameter Description Value
Views
Serial profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If parameter settings in preset profiles cannot meet your needs, you can create new serial
profiles, customize serial communication parameters and framing parameters, and apply the
settings to IoT card slots.
Precautions
This command takes effect only on the AP4050DN-E.
Example
# Set parity to odd parity.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] serial-profile name profile1
[HUAWEI-wlan-serial-prof-profile1]parity odd
Format
serial-profile name profile-name
undo serial-profile { name profile-name | all }
Parameters
Parameter Description Value
name profile- Specifies the name of a serial profile. The value is a string of
name 1 to 35 case-insensitive
characters. It does not
contain question marks
(?) or spaces, and
cannot start or end with
double quotation marks
(" ").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If parameter settings in preset profiles cannot meet your needs, you can create new serial
profiles, customize serial communication parameters and framing parameters, and apply the
settings to IoT card slots. User-defined profiles cannot start with "preset-".
Precautions
Preset serial profiles can be bound to facilitate the card configuration. A preset profile name is
in the format of "preset-vendor name-model", which cannot be modified or deleted. User-
defined profiles cannot start with "preset-".
This command takes effect only on the AP4050DN-E.
Example
# Create serial profile profile1 and display the serial profile view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] serial-profile name profile1
[HUAWEI-wlan-serial-prof-profile1]
Format
serial-profile profile-name
undo serial-profile
Parameters
Parameter Description Value
Views
IoT card interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If parameter settings in preset profiles cannot meet your needs, you can create new serial
profiles, customize serial communication parameters and framing parameters, and apply the
settings to IoT card slots.
Precautions
This command takes effect only on the AP4050DN-E.
Example
# Bind serial profile profile1 to AP group group1.
<HUAWEI>system-view
[HUAWEI]wlan
[HUAWEI-wlan-view]ap-group name group1
[HUAWEI-wlan-ap-group-group1]card 1
[HUAWEI-wlan-group-card-group1/1]serial-profile profile1
11.11.17 share-key
Function
The share-key command configures a shared key.
The undo share-key command deletes a shared key.
Format
share-key key-value
undo share-key
Parameters
Parameter Description Value
Views
IoT profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To enhance communication security, you can configure a shared key for encrypting
communication data between the AP and host computers. The shared key must be the same on
the AP and host computers.
Precautions
Example
# Set the shared key to aabb0011@11.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] iot-profile name profile1
[HUAWEI-wlan-iot-prof-profile1] share-key aabb0011@11
Format
speed speed-value
undo speed
Parameters
Parameter Description Value
speed-value Specifies the baud rate for serial The unit is bit/s and
communication on an IoT card slot. the value can be:
l 9600 bit/s
l 19200 bit/s
l 38400 bit/s
l 57600 bit/s
l 115200 bit/s
Views
Serial profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
An IoT card and an AP communicate with each other in serial mode. Each IoT card interface
uses independent serial communication parameters and framing parameters. By default, an
IoT card interface is bound with the preset serial profile preset-enjoyor-toeap.
Precautions
This command takes effect only on the AP4050DN-E.
Example
# Set the baud rate to 57600 bit/s.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] serial-profile name profile1
[HUAWEI-wlan-serial-prof-profile1] speed 57600
Format
stopbits { 1 | 2 }
undo stopbits
Parameters
Parameter Description Value
Views
Serial profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If parameter settings in preset profiles cannot meet your needs, you can create new serial
profiles, customize serial communication parameters and framing parameters, and apply the
settings to IoT card slots.
Precautions
This command takes effect only on the AP4050DN-E.
Example
# Set two stop bits.
<HUAWEI> system-view
[HUAWEI] wlan
Function
The ac protect cold-backup kickoff-station command enables the function of disconnecting
STAs in open system authentication mode when an active/standby switchover is implemented
between ACs that have dual-link cold backup configured.
The undo ac protect cold-backup kickoff-station command restores the default setting.
By default, STAs using open system authentication remain connected to APs when an active/
standby AC switchover is implemented.
Format
ac protect cold-backup kickoff-station
Parameters
None
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
An active/standby switchover between two ACs that have dual-link cold backup configured
causes a short service interruption.
l STAs not using open system authentication are disconnected from APs and need to go
online again after the active/standby switchover.
l By default, STAs using open system authentication remain connected to APs and do not
need to go online again after the active/standby switchover. You can run the ac protect
cold-backup kickoff-station command to configure the STAs to be disconnected when
an active/standby AC switchover is implemented.
Example
# Enable the function of disconnecting STAs in open system authentication mode when an
active/standby switchover is implemented between ACs that have dual-link cold backup
configured.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ac protect cold-backup kickoff-station
Related Topics
11.12.6 display ac protect
Format
ac protect enable
undo ac protect enable
Parameters
None
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To ensure service stability, an AP needs to establish connections with two ACs. The two ACs
work in active/standby mode. The active AC provides services for APs, whereas the standby
AC is a backup to the active AC.
Follow-up Procedure
After dual-link backup or N+1 backup is enabled globally, configure the AC priority and
standby AC IP address to implement dual-link backup or N+1 backup.
Precautions
Ensure that active and standby ACs deliver the same WLAN service configuration to an AP
that connects to the two ACs.
Example
# Enable dual-link backup globally and disable N+1 backup.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ac protect enable
Warning: This operation maybe cause AP reset, continue?[Y/N]:y
Related Topics
11.12.6 display ac protect
Function
The ac protect priority command configures the AC priority in the WLAN view.
The undo ac protect priority command restores the default AC priority in the WLAN view.
Format
ac protect priority priority
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When an AP goes online, ACs deliver their priorities to the AP. The AP selects the AC with a
higher priority as the active AC and establishes a CAPWAP tunnel with the active AC.
To implement dual-link backup on all the APs connected to an AC, configure the AC priority
and standby AC IP address in the WLAN view to reduce the configuration workload.
Precautions
If the AC priority is configured in the WLAN view and AP system profile view before an AP
goes online, the AC priority configured in the AP system profile view is delivered to the AP.
If no AC priority is configured in the AP system profile view, the AC priority configured in
the WLAN view is delivered to the AP.
Example
# Set the AC priority to 3 in the WLAN view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ac protect priority 3
Related Topics
11.12.6 display ac protect
11.12.7 priority
Format
ac protect protect-ac ip-address
undo ac protect protect-ac
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To implement dual-link backup on all the APs connected to an AC, configure the AC priority
and standby AC IP address in the WLAN view to reduce the configuration workload.
Precautions
If standby AC IP addresses are configured in both the WLAN view and AP system profile
view before an AP goes online, the standby AC IP address configured in the AP system
profile view is delivered to an AP. If no standby AC IP address is configured in the AP system
profile view, the standby AC IP address configured in the WLAN view is delivered to an AP.
If no standby AC IP address is configured in the WLAN view, dual-link backup is disabled.
Example
# Set the standby AC IP address to 10.33.12.56 in the WLAN view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ac protect protect-ac 10.33.12.56
Related Topics
11.12.6 display ac protect
11.12.8 protect-ac
Function
The ac protect restore disable command disables global revertive switching.
The undo ac protect restore disable command enables global revertive switching.
Format
ac protect restore disable
Parameters
None.
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
AC1 is the active AC and AC2 is the standby AC. When the link between AC1 and an AP
fails, AC2 takes the active role.
When the link between AC1 and the AP recovers, the AP detects that AC1 priority is higher
than AC2 and instructs AC1 and AC2 to perform revertive switching. AC1 then becomes the
active AC again.
Precautions
l The undo wlan ac protect restore disable command must be used before an AP goes
online and dual-link backup is implemented. In this way, the AC delivers the revertive
switching configuration to the AP when the AP goes online.
l If global revertive switching is disabled, traffic of an AP cannot be switched back to
AC1 when the link between AC1 and the AP restores.
l The command takes effect after an AP restart.
Example
# Disable global revertive switching.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ac protect restore disable
Related Topics
11.12.6 display ac protect
Function
The display ac protect command displays AC dual-link backup configuration.
Format
display ac protect
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
This command displays AC dual-link backup configuration.
Example
# Display AC dual-link backup configuration.
<HUAWEI> display ac protect
------------------------------------------------------------
Protect state : disable
Protect AC : -
Priority : 0
Protect restore : enable
Coldbackup kickoff station: disable
------------------------------------------------------------
Item Description
Related Topics
11.12.1 ac protect cold-backup kickoff-station
11.12.2 ac protect enable
11.12.3 ac protect priority
11.12.4 ac protect protect-ac
11.12.5 ac protect restore disable
11.12.7 priority
Function
The priority command sets the AC priority in the AP system profile view.
The undo priority command restores the AC priority to the default setting in the AP system
profile view.
Format
priority priority-level
undo priority
Parameters
Parameter Description Value
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When an AP goes online, ACs deliver their priorities to the AP. The AP selects the AC with
the highest priority as the active AC and establishes a CAPWAP tunnel with the active AC.
Precautions
If the AC priority is configured in the WLAN view and AP system profile view before an AP
goes online, the AC priority configured in the AP system profile view is delivered to the AP.
If no AC priority is configured in the AP system profile view, the AC priority configured in
the WLAN view is delivered to the AP.
If ACs deliver the same priorities to the AP, the AP selects the AC with the lowest AP load as
the active AC. If both AC priorities and AP load are the same, the AP selects the AC with the
lowest STA load as the active AC. If AC priorities, AP load, and STA load are the same, the
AP selects the AC with the smallest IP address as the active AC to establish a CAPWAP
tunnel. The AP or STA load equals the number of allowed APs or STAs minus the number of
existing APs or STAs.
Example
# Set the AC priority to 3 in the AP system profile view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] priority 3
Related Topics
11.12.3 ac protect priority
11.1.112 display ap-system-profile
11.12.8 protect-ac
Function
The protect-ac command configures the standby AC's IP address in the AP system profile
view.
The undo protect-ac command restores the standby AC's IP address to the default setting in
the AP system profile view.
Format
protect-ac ip-address ip-address
undo protect-ac
Parameters
Parameter Description Value
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To connect an AP to two ACs (active and standby ACs) to implement dual-link backup, you
can run the protect-ac command to configure the standby AC's IP address in the AP system
profile view.
Precautions
If standby AC's IP addresses are configured in both the WLAN view and AP system profile
view, the standby AC's IP address configured in the AP system profile view is delivered to an
AP. If no standby AC's IP address is configured in the AP system profile view, the standby
AC's IP address configured in the WLAN view is delivered to an AP.
Example
# Set the standby AC's IP address to 10.3.3.3 in the AP system profile view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ap-system-profile name ap-system1
[HUAWEI-wlan-ap-system-prof-ap-system1] protect-ac ip-address 10.3.3.3
Related Topics
11.12.4 ac protect protect-ac
11.1.112 display ap-system-profile