HCIE-WLAN V1.0 Training Material
HCIE-WLAN V1.0 Training Material
HCIE-WLAN V1.0 Training Material
• If an 802.11ax AP detects an OBSS with the same color, the AP can change its
own BSS color to reduce co-channel interference. If two APs have the same BSS
color field, a BSS color collision occurs. If an 802.11ax AP hears different BSS
color fields from other APs or STAs connected to it, a color collision is detected.
• If a STA detects a color collision, it sends a color collision report to the associated
AP. In the report, the STA sends BSS coloring information about all OBSSs it can
monitor.
• Each generation of new Wi-Fi standards can extend the battery life of STAs by
supporting faster and longer transmission to lower their power consumption. Wi-
Fi 6 introduces target wakeup time (TWT), which allows an AP to inform a STA
of when to sleep and provide the STA with a scheduling table of when to wake
up. Even though the STA sleeps for a short period of time each time, multiple
sleeps significantly prolong the battery life of the STA.
• TWT wakes up the Wi-Fi function of STAs on demand, reducing the power
consumption of the STAs by 30%.
• TWT was first proposed in the 802.11ah standard. This mechanism is designed to
save energy for IoT devices, especially devices with low traffic volume such as
smart meters. TWT allows IoT devices to stay in the sleep state as long as
possible, reducing power consumption. After a TWT agreement is established, a
STA wakes up after a longer period of time, without the need of waiting for a
Beacon frame. The 802.11ax standard improves on TWT by defining rules for STA
behavior and implementing channel access control on the premise of meeting
energy saving requirements. TWT is classified into unicast TWT and broadcast
TWT.
• By referring to the security architecture defined in ITU-T X.805, Huawei divides
the network into the management plane, control plane, and forwarding plane
and divides each plane into the device layer, network layer, and application layer.
Based on this, Huawei provides a plane-based, layered network security
architecture model to guide a wide range of solutions to analyze network
security threats and develop security policies and schemes.
▫ Control plane: WLAN devices must run various protocols to transmit service
traffic. The services must be protected against attacks or spoofing.
▫ Forwarding plane: WLAN devices use the destination MAC and IP addresses
of packets to search for routes for forwarding the packets. Security
measures must be taken in the forwarding routes to prevent attacks on
WLAN devices and spreading of attack traffic over the IP network.
• By isolating the control, management, and forwarding planes, WLAN devices can
ensure that attacks on any of the planes do not affect other planes.
• Unified entry, facilitating expansion and reducing maintenance costs.
▫ USB ports and standard Mini PCI Express (PCI-E) interfaces are available for
easy IoT service expansion.
• Application layer: carries LBS applications to develop the upper-layer application
platform or develop and display applications by invoking APIs in the customer's
existing systems such as the production management system and administrative
management system.
• Platform layer: consists of the positioning engine, iMaster NCE, and GIS/map
platform.
• Network layer: deploys APs to provide Wi-Fi and Bluetooth signal coverage and
management. (Determine whether to deploy iBeacons based on site
requirements. In most cases, iBeacons are required in mobile phone navigation
scenarios.)
▫ An AP scans the RSSI data of Wi-Fi terminals and reports the data.
▫ The AP scans the RSSI data of Bluetooth terminals and reports the data.
▫ Fault locating within minutes: uses the fault inference engine to locate
issues within minutes, identify root causes of the issues, and provide
effective fault rectification suggestions.
▫ Predictive optimization: identifies edge APs and predicts the load trend of
APs based on historical data analysis, performs predictive optimization on
wireless networks, and compares the gains before and after the
optimization. This practice improves the network-wide performance by
50%+ (certified by Tolly).
• The service process of a common network project includes requirement
clarification, high-level design, site survey, detailed design, installation and
commissioning, optimization, and acceptance.
• In high-density scenarios, network planning and optimization can be performed
based on network construction standards in high-density scenarios. Wi-Fi 6 triple-
radio APs (smart antennas) can be used to increase the number of STAs accessed
by a single AP. In addition, technologies such as radio resource management,
load balancing, and QoS can be used to ensure user experience.
• CD
• In scenarios with densely distributed rooms, such as dormitories, hotels, and
wards, a large number of packets will be sent to the WAC if the WAC + Fit AP
architecture (with one AP deployed in each room) is used. As a result, the WAC
may become a performance bottleneck on the network. To address the
performance bottleneck and signal coverage problems, we can deploy the APs on
a corridor and install antennas in each room to provide signal coverage.
However, this solution has restrictions on the coverage distance because the
signal attenuation increases with the distance. In addition, if multiple rooms
share one AP, the signal quality and performance are poor. To address this, the
agile distributed architecture is introduced.
• Customer benefits of the agile distributed architecture:
• Simple management: A WAC only needs to manage a small number of central
APs. For example, only 200 APs need to be managed by a WAC to provide
wireless coverage for about 10,000 rooms.
• Flexible deployment and full signal coverage without coverage holes: A central
AP connects to RUs through Ethernet cables, causing no wall penetration loss or
feeder loss and providing high-quality signal coverage. The RUs support various
mounting modes such as junction box-, wall-, and ceiling-mounting.
• Ultra-long coverage range: Different from traditional APs with antennas that
support only a 15 m coverage range, the central AP can connect to RUs through
Ethernet cables at a maximum distance of 100 m, expanding the network
deployment scope by several folds. If the central AP is deployed in a corridor, it
can provide long-distance coverage (> 100 m).
• Some micro and small enterprises need to build their own WLANs that are
managed independently due to lack of a cloud management architecture. If the
Fat AP architecture is used, APs cannot be managed and maintained in a unified
manner, and roaming experience for STAs may be affected. If the WAC + Fit AP
architecture is used, only a few APs are required because the target coverage
area is relatively small, which cannot accommodate so many STAs. Additionally,
the WAC and license costs are high in this architecture. If an AP can manage
other APs and provide unified O&M and continuous roaming capabilities, the
enterprises' requirements can be met. The leader AP architecture designed by
Huawei will work.
• Huawei's cloud management platform, iMaster NCE-Campus, functions as the
core component of Huawei's CloudCampus Solution and centrally manages
Huawei network devices, such as APs, ARs, switches, and firewalls. iMaster NCE-
Campus can implement unified multi-tenant management, allow plug-and-play
of network devices, support batch network service deployment, and provide
Application Programming Interfaces (APIs) to interconnect with 3rd-party
platforms for VASs.
• Compared with the traditional WAC + Fit AP architecture, the cloud management
architecture has the following advantages:
▫ All cloud managed NEs are monitored and managed on the cloud
management platform.
• Navi AC: provides security, control, and management for STAs, implementing
identity authentication, authorization, and accounting.
• CAPWAP tunnel between a Local AC and the Navi AC: carries data packets from
the Local AC to the Navi AC for centralized forwarding.
▫ There are reachable routes between the local AC and Navi AC.
• Configuration roadmap.
▫ On the Navi AC, create and configure a VAP profile, enable the Navi AC
function, specify a local AC address, and bind the VAP profile to the local
AC.
▫ On the local AC, specify the Navi AC address, create and configure a VAP
profile, and bind the VAP profile to the AP group. The VAP profile
configuration on the local AC must be the same as that on the Navi AC.
• You can associate a STA to the management SSID of a leader AP for
management, facilitating O&M. The management SSID has the following
features:
▫ By default, the tunnel forwarding mode is used. After a STA connects to the
management SSID, it obtains an IP address from the leader AP. The default
gateway for STAs is deployed on the leader AP and has an IP address of
192.168.1.1.
▫ All APs advertise the management SSID. The default SSID name is
HUAWEI-Leader AP.
• A wireless mesh network saves cables required between mesh nodes while
providing path redundancy and rerouting functions as a distributed network.
▪ After receiving the RANN frame, an MP reduces the TTL of the frame
by 1, updates the path metric, and broadcasts the frame. After an MP
reads a RANN frame, the MP checks whether the gateway specified in
the RANN frame exists in the local gateway list. If so, the MP updates
the gateway list based on the information in the RANN frame. If not,
the MP adds a gateway information entry to the gateway list.
▫ PREQ and PREP frames: In on-demand routing mode, the source node
broadcasts a PREQ frame to establish a route to the destination node. After
receiving the PREQ frame, an MP responds with a PREP frame.
• A mesh network supports the on-demand and proactive routing modes.
▫ On-demand routing: The source node broadcasts a PREQ frame to establish
a route to the destination node. After receiving the PREQ frame, a middle
node checks the sequence number in the frame. If the sequence number in
the PREQ frame is greater than or equal to that in the previous frame but
the metric in this frame is lower, the middle node creates a route to the
source node or updates the existing one. If no route to the destination node
is available, the middle node continues forwarding the PREQ frame.
▫ Proactive routing: An MPP periodically broadcasts a RANN frame. When an
MP receives a RANN frame and needs to create or update the route to the
MPP, the MP unicasts a PREP frame to the MPP and broadcasts the RANN
frame. Then, the MPP creates a reverse path from the root node to the
source node, and the MP creates a forwarding path from the root node to
the source node.
• HWMP combines the previous two routing modes to ensure that data frames are
always transmitted on mesh links with the best transmission quality.
• Huawei develops and optimizes a proprietary mesh routing protocol based on the
802.11s standard. This mesh routing protocol has the following characteristics:
▫ 1. Reduces the number of times frames are forwarded during the wireless
link setup.
▫ 2. Constructs a forwarding topology based on the path with only a few
hops from the source node to the destination node.
• After MP1 is powered on, it exchanges Mesh Peering Open and Mesh Peering
Confirm frames with MP2, which has associated with the WAC using information
including the default mesh ID and PSK. MP1 sets up a temporary, insecure mesh
link with MP2 and further establishes a route to the MPP.
• MP1 obtains an IP address for itself and the IP address of the WAC from the
DHCP server through the mesh link.
• MP1 discovers and associates with the WAC through the mesh link and
establishes a temporary CAPWAP tunnel to obtain the configuration from the
WAC.
• After MP1 obtains the new configuration, it sends a Mesh Peering Close frame to
tear down the temporary mesh link.
• MP1 exchanges Mesh Peering Open and Mesh Peering Confirm frames with MP2
using the new mesh configuration for key negotiation. After MP1 and MP2
negotiate the key for communication, the two MPs set up a formal, secure mesh
link.
• MP1 re-establishes a secure CAPWAP tunnel with the WAC using the new
configuration.
• If MP1 cannot set up a mesh link with MP2 within a long period of time, the
default configuration is restored. The whole process starts from step 1 until MP1
establishes a secure CAPWAP tunnel with the WAC using the new configuration.
• Mesh wireless bridging applies to wireless signal coverage for small-sized squares
and can provide a larger coverage area by directly connecting remote MPs to an
MPP through mesh links.
• An MP can detect other MPs on a mesh network and establish mesh links with
them. This may generate redundant mesh links. Mesh routing can be configured
for such a network topology to selectively block redundant links and eliminate
loops. When a mesh link is faulty, a backup link is available to ensure reliability.
• After MPs establish mesh links with an MPP, they run on the same channel as
the MPP. If network coverage is required for different areas, configure multiple
MPPs and enable them to work on different channels. This prevents MPs
connected to the MPPs from preempting channels and thereby improves
coverage performance. Each MP can select an MPP with the minimum hops from
itself as the gateway to connect to the wired network.
• A mesh network supports only transparent transmission of STP BPDUs. An STP-
enabled AP does not forward STP BPDUs to the wireless side but forwards STP
BPDUs only to its wired side.
• In scenario 1, the switch forms a single loop with mesh links. To break the loop,
enable STP on the switch and ensure that STP is not enabled on GE0/0/1
connecting the WAC to the MPP.
• In scenario 2, the WAC, SW1, SW2, and MPP form loop 1, and SW3, SW4, and
MP3 form loop 2. If STP BPDUs can be transparently transmitted over mesh links,
SW3 and SW4 on loop 2 will be incorrectly calculated into loop 1. To prevent
miscalculations, enable STP on the MPP and MP3 so that STP BPDUs from loop 1
and loop 2 will not be transparently forwarded to the wireless side. The MPP
implements STP calculation for loop 1 and blocks wired-side interfaces based on
the calculation results. MP3 implements STP calculation for loop 2 and blocks
wired-side interfaces based on the calculation results.
• Mesh networks support mesh link redundancy. To prevent loops, use mesh
routing to decide on the forwarding path.
• A vehicle-ground fast link handover network is a single-hop Layer 2 mesh
network composed of the WAC, trackside APs, and vehicle-mounted APs.
▫ Trackside APs: Fit APs deployed along the track. They function as MPPs and
communicate with the WAC in wired mode at Layer 2.
▫ Vehicle-mounted APs: Fat APs deployed in the front and rear of a train.
They function as MPs to set up mesh links with trackside APs.
▫ While a train is moving, the vehicle-mounted APs in the front and rear can
both work to load balance traffic. The two APs work on different channels
to communicate with trackside APs.
• Mesh link setup and teardown:
▫ The vehicle-mounted AP sets up mesh links with multiple trackside APs and
chooses one mesh link with the optimal quality as the active link to
transmit data. Other links act as candidate links. As the train moves
forward, the vehicle-mounted AP chooses the candidate link of the best
quality as the active link to implement fast handover so that quality of
vehicle-ground communications is always at the optimal level.
▫ The RSSI range of a candidate area is from the minimum RSSI threshold to
the maximum RSSI threshold of the mesh link. Candidate links with RSSI
values in this range are considered within the candidate area. Otherwise,
the candidate links are outside the candidate area.
▫ A holding time is specified for the active link to prevent frequent handovers.
The serving time of the active link must be longer than or equal to the
specified holding time. Otherwise, the vehicle-mounted AP can only
implement an emergency handover, not a common handover.
• If the current active link is disconnected due to a trackside AP fault or when the
train leaves the originating station, no active link is available. The vehicle-
mounted AP then performs an emergency handover. The vehicle-mounted AP
selects the candidate link with the best quality as the active link from the
candidate area. If no candidate link is available in the candidate area, the vehicle-
mounted AP selects the candidate link with the highest RSSI in other areas as the
active link.
▫ The WLAN mesh function and WLAN WDS function are mutually exclusive.
If the WLAN WDS function has been configured, the WLAN mesh function
cannot be configured.
▫ If WDS or mesh services are deployed on a radio, the radio can work only in
normal mode, even if it is configured to work in monitor mode.
▫ Avoid using radar channels to configure mesh links. It takes several minutes
or dozens of minutes longer to establish mesh links on radar channels than
longer than that to establish mesh links on non-radar channels.
• Configuration roadmap.
▫ Configure mesh services to enable APs (MPs) in AP2 and AP3 to go online
on the WAC through mesh links.
• In this example, the AP8130DN that provides radios 0 and 1 is used.
• Radio 1 of the AP8130DN is used as an example. The parameter coverage
distance indicates the radio coverage distance, which is 3 (unit: 100 m) by
default. This example sets the radio coverage distance parameter to 4. You can
configure the parameter based on site requirements.
• After mesh services take effect, run the display wlan mesh link all command to
check mesh link information.
• GRE is easy to implement and increases only a few loads on devices on both ends
of a tunnel.
• GRE sets up tunnels over an IPv4 network to connect networks running different
protocols, leveraging the original network architecture and reducing costs.
• GRE enlarges the operation scope of network protocols that support limited hop
counts, allowing for flexible topologies on enterprise networks.
• Encapsulation:
▫ The X protocol checks the destination address in the packet header and
searches the routing table or the forwarding table for the outbound
interface. If the outbound interface is a GRE tunnel interface, the ingress PE
adds a GRE header to the packet.
▫ The ingress PE searches the IP routing table for the outbound interface
based on the destination address in the IP header (tunnel destination
address) and transmits the packet over the IP transport network.
• Decapsulation:
▪ After receiving the packet from the GRE tunnel interface, the egress
PE analyzes the IP header in the packet and finds that itself is the
destination of the packet. Then the egress PE removes the IP header
and delivers the packet to the GRE protocol for processing.
▪ The GRE protocol removes the GRE header and delivers the packet to
the X protocol.
• The Keepalive detection function is implemented as follows:
▫ The remote end sends a reply packet to the source end after receiving a
probe.
▫ If the source end receives a reply packet before the counter value reaches
the preset value, it considers the remote end reachable. If the source does
not receive any reply packet before the counter reaches the preset value,
specifically, the retry times, the source considers the peer unreachable and
resets the counter. Then, the source closes the tunnel connection. In this
case, the source interface still sends Keepalive probes to the remote
interface. When the remote interface becomes Up, the source interface
becomes Up too and sets up a tunnel with the remote interface.
• Note:
▫ WAC1 performs Layer 2 forwarding within the device based on the MAC
address and VLAN tag, and finds the outbound interface VE0/0/1.
▫ VE0/0/1 on WAC1 processes the Ethernet packet and forwards the packet
to Tunnel0/0/1 bound to itself. Tunnel0/0/1 encapsulates the Ethernet
packet using GRE (with the protocol code of 0x6558) and forwards the
encapsulated packet to WAC2 over a GRE tunnel.
• Data encryption: The sender encrypts data packets and transmits them in
ciphertext on the Internet. The receiver decrypts or directly forwards the received
data packets.
• Data integrity: The receiver verifies the received data to determine whether the
packets have been tampered with.
▫ Both AH and ESP can provide data origin authentication and data integrity
check using the following authentication algorithms: Message Digest 5
(MD5), Secure Hash Algorithm 1 (SHA1), SHA2-256, SHA2-384, SHA2-512,
and Senior Middle 3 (SM3).
• The keys used for IPsec encryption and authentication can be manually
configured or dynamically negotiated using the Internet Key Exchange (IKE)
protocol. IKE works in the Internet Security Association and Key Management
Protocol (ISAKMP) framework. It uses the Diffie-Hellman (DH) algorithm to
securely deliver keys and authenticate identities over an insecure network,
ensuring data transmission security. IKE improves key security and simplifies IPsec
management.
• In tunnel mode, AH checks the integrity of the entire IP packet including the new
IP header. ESP checks the integrity of the ESP header, raw IP header, transport-
layer protocol header, data, and ESP trailer, excluding the new IP header.
Therefore, ESP cannot protect the new IP header. ESP encrypts the raw IP header,
transport-layer protocol header, data, and ESP trailer.
• Note: In this example, the ESP trailer and authentication data are not shown in
the figure.
• In transport mode, AH checks the integrity of the entire IP packet. ESP checks the
integrity of the ESP header, transport-layer protocol header, data, and ESP trailer,
excluding the IP header. ESP cannot protect the IP header. ESP encrypts the
transport-layer protocol header, data, and ESP trailer.
• Note: In this example, the ESP trailer and authentication data are not shown in
the figure.
• Because SAs are unidirectional, at least two SAs are required to protect incoming
and outgoing data flows between IPsec peers.
▫ Key generation mode: In manual mode, all the parameters used to establish
an SA, including the encryption key and authentication key, need to be
manually configured and updated, leading to high key management costs
on large- and medium-sized networks. In IKE auto-negotiation mode, the
encryption key and authentication key are generated using the DH
algorithm and can be dynamically updated, reducing key management
costs and improving security.
• Based on the differences, the manual mode applies to small-sized networks with
a small number of IPsec peers. The IKE auto-negotiation mode is recommended
on large- and medium-sized networks.
• IKE is an application-layer protocol based on UDP and is the signaling protocol of
IPsec.
• This figure shows the relationship between IKE and IPsec. Two peers establish an
IKE SA for identity authentication and key exchange. Protected by the IKE SA, the
peers negotiate a pair of IPsec SAs using the configured AH or ESP parameters.
Subsequently, data is encrypted and transmitted between the peers in an IPsec
tunnel.
• GRE over IPsec encapsulates packets using GRE and then IPsec. GRE over IPsec
supports the transport and tunnel encapsulation modes. The tunnel mode uses
an extra IPsec header, which increases the packet size and makes packets more
likely to be fragmented. Therefore, the transport mode is recommended.
• In the IP header added during IPsec encapsulation, the source IP address is the IP
address of the interface to which the IPsec policy is applied, and the destination
IP address is the IP address of the peer interface to which the IPsec policy on the
remote peer is applied.
• IPsec protects the data flows from the GRE source address to the GRE destination
address. In the IP header added during GRE encapsulation, the source and
destination addresses are the source and destination addresses of a GRE tunnel.
• This example focuses on the IPsec configuration.
• Navi AC: provides security, control, and management for STAs, implementing
identity authentication, authorization, and accounting.
▫ MP: a mesh-capable node that uses IEEE 802.11 MAC and PHY protocols for
wireless communication. This node supports automatic topology discovery,
automatic route discovery, and data packet forwarding. They can provide
both mesh service and user access service.
▫ Peer MP: a neighboring MP that has established a mesh link with an MP.
• ABC
WLAN Reliability
Foreword
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
2. HSB Technologies
4. N+1 Backup
3 Huawei Confidential
Overview of WLAN Reliability
⚫ There are various WLAN reliability technologies, which can be classified into the following
types based on network faults resolved by them:
Fault detection technologies: focus on fault detection and diagnosis. For example, Bidirectional
Forwarding Detection (BFD) is a universal fault detection technology and can detect faults at any
layer. Ethernet operation, administration and maintenance (OAM) is a link-layer fault detection
technology.
Protection switching technologies: focus on network recovery, back up hardware, link, and routing
information, and perform fast switching to ensure service continuity.
Bypass technologies: focus on WLAN service guarantee upon network faults. Failover policies are
deployed to achieve uninterrupted WLAN services and prevent STAs from being disconnected.
4 Huawei Confidential
Deployment of
primary and
backup WACs Not supported Supported Supported Supported
at different
places
The models and software versions of the primary and backup The software versions of the primary and backup WACs must be the same.
WACs must be the same. No constraint is placed on the WAC model.
Constraints
One WAC serves as a backup for
One WAC serves as a backup only for one WAC.
multiple WACs, lowering device costs.
High reliability
requirement High reliability requirement
Applicable Low reliability requirement
No need for WAC Need for WAC deployment at Low reliability requirement
scope High cost control requirement
deployment at different different places
places
5 Huawei Confidential
CAPWAP Link Failover Overview
⚫ In the WAC + Fit AP architecture, CAPWAP tunnels are used to forward control
packets between a WAC and APs. If a CAPWAP link is faulty, STAs on the connected
AP are brought offline, and new STAs cannot access the AP. In an HQ-branch
scenario, APs at branches are typically connected to a WAC at the HQ over the WAN
for centralized management. The WAN quality, however, cannot be guaranteed.
Connections between the WAC and APs suffer from high failure risks. A CAPWAP
link disconnection will significantly degrade the overall network quality.
⚫ CAPWAP link failover allows online STAs to stay and new STAs to access the WLAN
when a CAPWAP link fails. This improves reliability of the enterprise network.
6 Huawei Confidential
Contents
2. HSB Technologies
4. N+1 Backup
7 Huawei Confidential
HSB Overview
⚫
In HSB mode, two WACs back up each other. When a fault occurs on one WAC, the physical link between an AP and the WAC, or the
upper-layer link of the WAC, STAs do not need to be authenticated again, and their services are automatically switched to the other
WAC.
⚫
HSB for WACs can be classified into Virtual Router Redundancy Protocol (VRRP) HSB and dual-link HSB based on the key
technologies in use.
WAC1 WAC2
10.1.1.3 10.1.1.2 WAC1 WAC2
HSB channel 10.1.1.3 HSB channel 10.1.1.2
VRRP master VRRP backup
VRRP
Virtual WAC
10.1.1.1/24
Active link Standby link
CAPWAP tunnel
8 Huawei Confidential
• To support HSB, the two WACs must have the same product model, networking,
and configurations (except configurations that must be different on the WACs,
such as the IP addresses of the management interface).
• Note:
▫ Dual-link: An AP sets up CAPWAP links with both the primary and backup
WACs.
▫ VRRP is short for Virtual Router Redundancy Protocol.
• In dual-link HSB mode, APs establish CAPWAP tunnels with both the primary and
backup WACs. The sequence in which APs or AP groups select the primary WAC
can be specified to allow the APs to support different scenarios, achieving load
balancing on the primary and backup WACs.
• Based on VRRP HSB, two WACs function as one virtual WAC. Therefore, load
balancing is not supported. In VRRP HSB mode, two WACs exchange VRRP
packets to negotiate their master and backup states. VRRP packets can be
transmitted only over Layer 2 networks but not over Layer 3 networks. Therefore,
VRRP HSB is applicable to WACs only in Layer 2 networking.
• In an HSB scenario, WIDS entries on the primary WAC cannot be backed up to
the backup WAC. After an active/standby switchover, WIDS entries are lost.
Provides a data
backup channel.
HSB group HSB group
9 Huawei Confidential
• HSB service modules: establishes and maintains an HSB channel (through Hello
packets), and notifies the related service modules of channel connect/disconnect
events.
• Currently, the WAC supports the configurations of only one HSB service and one
HSB group.
• HSB heartbeat packets are frequently exchanged between the primary and
backup WACs, and directly affect the working and negotiation results of the
primary and backup WACs. To ensure normal running of the HSB system and
prevent backup data loss, it is recommended that an independent physical link be
planned for the HSB channel.
VRRP HSB
⚫ Two WACs are added to a VRRP group to share a virtual IP address. The
master WAC synchronizes service information to the backup WAC
WAC1 WAC2
10.1.1.3 10.1.1.2 through an HSB channel.
HSB channel
VRRP master VRRP backup
⚫
By default, the master WAC functions as the virtual WAC. If the master
VRRP
WAC fails, the backup WAC takes over services. All APs establish
CAPWAP tunnels with the virtual WAC.
Virtual WAC
10.1.1.1/24
⚫ The switchover between WACs is determined by the VRRP. To APs, there
is only one WAC.
⚫
This mode restricts deployment locations of the two WACs but supports
a faster switchover speed than other backup modes.
⚫
More protection features are available:
BFD+VRRP for uplink monitoring
CAPWAP tunnel MSTP for loop prevention in the downlink
10 Huawei Confidential
• HSB service backup in real time involves backup for the following information:
▫ User data information
▫ CAPWAP tunnel information
▫ AP entries
▫ DHCP address information
• The HSB channel can be carried by the direct physical link between two WACs or
by a switch. For example, the HSB channel can reuse the physical channel where
VRRP packets are exchanged.
Working Process of VRRP HSB
11 Huawei Confidential
VRRP Master/Backup Negotiation
⚫ Two WACs send VRRP packets carrying priority information through an HSB channel for master/backup
negotiation.
⚫ The master WAC sends gratuitous ARP packets to notify other devices of the virtual MAC address.
⚫ The master WAC periodically sends VRRP Advertisement packets to WAC to advertise its working status.
0 3 7 15 23 31
IP Address (1)
......
IP Address (n)
12 Huawei Confidential
Data Synchronization Process of VRRP HSB
Master WAC Backup WAC
13 Huawei Confidential
• When the master WAC fails, service traffic can be switched to the backup WAC
only if the backup WAC has the same session entries as the master WAC.
Otherwise, the session may be interrupted. Therefore, data synchronization is
required between the master and backup WAC.
• In VRRP HSB, information including user entries, CAPWAP link information, and
AP entries can be backed up in real time, in batches, or periodically.
▫ Batch backup: The master WAC synchronizes all existing session entries to a
new backup WAC at a time to ensure information consistency between the
WACs. Batch backup is triggered when the master and backup WACs are
determined.
▫ Real-time backup: When the master WAC generates new session entries,
the service module on the master WAC synchronizes them to the service
module on the backup WAC through HSB in real time.
CAPWAP tunnel
14 Huawei Confidential
▫ Active
▫ Inactive
▫ Independent
▫ Switching
• Three states are defined in a VRRP state machine: Initialize, Master, and Backup.
Only the WAC in Master state can forward packets destined for the virtual IP
address.
VRRP Master/Backup Switchover upon a Fault of the Master
WAC
WAC1 WAC2
VRRP master VRRP backup ⚫
When the master WAC fails, the HSB channel is
HSB channel
disconnected and the HSB module cannot notify WAC2 of
the failure. WAC2 enters the Independent state. When
detecting the abnormal VRRP state, WAC2 instructs APs to
change their states. The switchover is completed.
CAPWAP tunnel
15 Huawei Confidential
• By default, the interval for sending HSB heartbeat packets is 3 seconds and the
number of retransmissions is 5. Therefore, the HSB channel heartbeat is 15
seconds. When the VRRP heartbeat timeout period is shorter than the heartbeat
timeout period of the HSB channel, the VRRP status change is first detected when
the master WAC is powered off and restarted.
• Then the WAC checks the status of the HSB group. The HSB group find that it is
in Backup state, and does not instruct the service module to change the AP
status. The HSB group changes to the Independent state only after the heartbeat
timer of the HSB channel expires. In this case, the service module is instructed to
change the AP status to Normal. The active/standby switchover is complete.
• When the timeout interval of VRRP heartbeat is longer than that of the HSB
channel, the HSB status changes before the VRRP status changes. After the VRRP
timeout interval expires, the HSB group instructs service modules to change the
AP status.
VRRP Master/Backup Switchover upon an Uplink
Disconnection
CAPWAP tunnel
16 Huawei Confidential
• When the uplink interface of the master WAC becomes faulty, VRRP cannot
detect the status change of interfaces outside the VRRP group, which may cause
service interruption. You can associate a VRRP group with the interface status.
When the monitored interface becomes faulty, the priority of the master WAC is
reduced. This triggers a master/backup switchover and reduces the impact of the
uplink interface fault on service forwarding.
• When the fault is rectified, the original master WAC restores its priority to take
over the master role again and begins forwarding traffic.
• When the association between VRRP and the interface status is configured, the
master and backup WACs in the VRRP group must work in preemption mode. It
is recommended that immediate preemption be configured on the backup WAC
and delayed preemption be configured on the master WAC.
VRRP Master/Backup Switchback
⚫
When the link of the original master WAC (WAC1) recovers, an
Master WAC1 Backup WAC2 active/standby switchback is triggered after the preemption delay
expires. The switchback process is as follows:
After WAC1 recovers, the VRRP state of WAC1 changes from Initialize to
Restore the connection and Backup, and WAC1 listens to VRRP packets.
listen on VRRP packets. After 3 seconds, when determining that WAC2 receives the receiving a
3 seconds
VRRP packet VRRP packet from WAC2, WAC1 starts the preemption delay.
After the preemption delay expires, the VRRP status of WAC1 changes
Wait for a to master and sends VRRP packets with a higher priority to notify WAC2
preemption delay. of a switchback.
Send high-priority VRRP packets. Upon receiving the VRRP packets with a higher priority, WAC2 changes
Roll back to the its own VRRP status back to backup.
backup state.
17 Huawei Confidential
• After the original master WAC recovers, it becomes the master WAC if it is in
preemption mode or remains in backup state if it is in non-preemption mode.
Configuring VRRP HSB - Configuration Roadmap
WAC1 WAC2
VRRP master VRRP backup
HSB channel
Configuration roadmap
18 Huawei Confidential
19 Huawei Confidential
Virtual WAC Create HSB service 0 on WAC2 and configure the IP addresses
10.23.100.3/24
and port numbers for the active and standby channels. Set the
number of retransmission attempts and interval of HSB packets.
[WAC2] hsb-service 0
[WAC2-hsb-service-0] service-ip-port local-ip 10.23.102.2 peer-ip
10.23.102.1 local-data-port 10241 peer-data-port 10241
[WAC2-hsb-service-0] service-keep-alive detect retransmit 3 interval 6
20 Huawei Confidential
Configuring VRRP HSB - Configuring an HSB Group
10.23.102.1/30 10.23.102.2/30
Create HSB group 0 on WAC1, and bind HSB service 0 and the
HSB channel
10.23.100.1 10.23.100.2 management VRRP group to the HSB group.
WAC1 VLAN 100 WAC2 [WAC1] hsb-group 0
VRRP master VRRP VRID 1 VRRP backup [WAC1-hsb-group-0] bind-service 0
[WAC1-hsb-group-0] track vrrp vrid 1 interface vlanif 100
[WAC1-hsb-group-0] quit
Virtual WAC
Create HSB group 0 on WAC2, and bind HSB service 0 and the
10.23.100.3/24
management VRRP group to the HSB group.
[WAC2] hsb-group 0
[WAC2-hsb-group-0] bind-service 0
[WAC2-hsb-group-0] track vrrp vrid 1 interface vlanif 100
[WAC2-hsb-group-0] quit
21 Huawei Confidential
Configuring VRRP HSB - Binding Services to the HSB Group
and Enabling the HSB Group
10.23.102.1/30 10.23.102.2/30
HSB channel On WAC1, bind the NAC, WLAN, and DHCP services to the HSB
10.23.100.1 10.23.100.2
VLAN 100
group, and enable the HSB group.
WAC1 WAC2
VRRP master VRRP VRID 1 VRRP backup [WAC1] hsb-service-type access-user hsb-group 0
[WAC1] hsb-service-type ap hsb-group 0
[WAC1] hsb-service-type dhcp hsb-group 0
[WAC1] hsb-group 0
[WAC1-hsb-group-0] hsb enable
Virtual WAC
10.23.100.3/24
On WAC2, bind the NAC, WLAN, and DHCP services to the HSB
group, and enable the HSB group.
[WAC2] hsb-service-type access-user hsb-group 0
[WAC2] hsb-service-type ap hsb-group 0
[WAC2] hsb-service-type dhcp hsb-group 0
[WAC2] hsb-group 0
[WAC2-hsb-group-0] hsb enable
22 Huawei Confidential
Configuring VRRP HSB - Verifying the Configuration
Run the display hsb-group group-index command to check Run the display hsb-service service-index command to check
HSB group information. HSB service information.
23 Huawei Confidential
Dual-Link HSB Overview
• An AP sets up CAPWAP tunnels with the primary and backup WACs
at the same time. Service information is synchronized between the
WAC1 WAC2 WACs through an HSB channel.
10.1.1.3/24 10.1.1.2/24 • When the link between the AP and primary WAC fails, the AP
HSB channel
instructs the backup WAC to take over services from the primary
WAC.
• The primary and backup WACs are determined based on WAC
priorities. When WACs have the same priority, the primary and
backup WACs are determined based on the WAC load (number of
online APs and STAs).
• In addition to the active/standby HSB mode, the load balancing
mode is supported. In load balancing mode, you can specify WAC1 as
Active link Standby link the primary WAC for some APs and WAC2 as the backup WAC for
other APs, so that the APs set up active CAPWAP links with their own
primary WACs.
• Dual-link HSB frees primary and backup WACs from location
restrictions and allows for flexible deployment. The two WACs can
implement load balancing to make efficient use of resources.
Data traffic
However, service switching takes a relatively long time.
CAPWAP tunnel
24 Huawei Confidential
25 Huawei Confidential
• HSB service backup in real time involves backup for the following information:
▫ User data information
▫ CAPWAP tunnel information
▫ AP entries
▫ Load balancing is supported.
Active/Standby Negotiation in Dual-Link HSB
AP Primary WAC Backup WAC ⚫ Active link establishment:
In the Discovery phase, the primary WAC is
preferentially selected.
CAPWAP Discovery Request
The other steps are the same as those in normal
CAPWAP Discovery Request
CAPWAP Discovery Response CAPWAP tunnel establishment.
(carrying information such as the IP address, priority, and load)
CAPWAP Discovery Response (carrying information such as the IP ⚫ Standby link establishment:
address, priority, and load)
To prevent repeated service configuration
The primary WAC is selected based on the priority and
load, and the active link is established. delivery, the AP starts to set up the standby link
with the backup WAC only after the active
Deliver configurations.
CAPWAP link is set up with the primary WAC and
CAPWAP Discovery Request (unicast) configurations are delivered.
CAPWAP Discovery Response (carrying information such as the
IP address, priority, and load)
26 Huawei Confidential
28 Huawei Confidential
• In a dual-link HSB scenario, services are directly bound to the HSB service. In this
way, service data is backed up using HSB, and the active/standby status is
maintained based on the HSB mechanism.
• The primary and backup WACs back up user access authentication information
through the HSB channel. In this way, more STA encryption authentication
modes are supported, ensuring service continuity during an active/standby
switchover or switchback. HSB modes include real-time backup, batch backup,
and periodic synchronization.
Active/Standby Switchover in Dual-Link HSB
⚫
In dual-link HSB mode, an AP determines whether to perform
an active/standby switchover. When the primary WAC is
HSB channel
WAC1 WAC2 faulty or the downlink is disconnected, an active/standby
switchover is triggered.
After setting up links with the primary and backup WACs, the AP
periodically sends Echo messages to the WACs for CAPWAP
Heartbeat packet timeout heartbeat detection to monitor the CAPWAP link status.
As shown in the figure, the link between WAC1 and the switch is
Standby link
disconnected or WAC1 is faulty. In this case, if heartbeat packets
Active link
from WAC1 time out for a specified number of times, the AP
determines that the active CAPWAP link is faulty.
29 Huawei Confidential
Active/Standby Switchback in Dual-Link HSB
⚫ The AP periodically sends Discovery Request messages to check whether the original active link
recovers. If so, the AP switches STA data back to this link with a higher priority.
30 Huawei Confidential
• To prevent the frequent switchovers caused by network flapping, the WACs are
informed of the active/standby switchback after 20 Echo intervals elapse. At the
same time, the AP sends the STA service data to the new primary WAC.
• The network stabilization of active and standby links is determined based on the
Echo packet loss rate. The active/standby link switchover is performed when the
following conditions are met:
▫ An AP collects statistics about Echo packets on the current link for a
specified number of times, and determines that the packet loss rate of the
link exceeds the packet loss rate start threshold.
▫ The packet loss rate of the link in use is higher than that of the other link,
and the difference between the two is higher than the packet loss rate
difference threshold.
Configuring Dual-Link HSB - Configuration Roadmap
Configuration roadmap
WAC1 HSB channel WAC2
Primary Backup • Configure dual-link backup.
• (Optional) Configure the active/standby
link switchover mode.
• Configure the HSB function.
• Verify the configuration.
31 Huawei Confidential
Configuring Dual-Link HSB - Configuring Dual-Link Backup
On WAC1, specify the IP address of WAC2 and the priority of
WAC1 to implement dual-link backup.
10.23.102.1/30 10.23.102.2/30 [WAC1-wlan-view] ac protect enable
HSB channel Warning: This operation maybe cause AP reset, continue?[Y/N]:y
WAC1 WAC2
[WAC1-wlan-view] ac protect protect-ac ip-address 10.23.100.3
Primary Backup [WAC1-wlan-view] ac protect priority 0
10.23.100.1 10.23.100.2
Management VLAN 100 Management VLAN 100
On WAC2, specify the IP address of WAC1 and the priority of
WAC2 to implement dual-link backup.
[WAC2-wlan-view] ac protect enable
Warning: This operation maybe cause AP reset, continue?[Y/N]:y
[WAC2-wlan-view] ac protect protect-ac ip-address 10.23.100.2
[WAC2-wlan-view] ac protect priority 1
[WAC2-wlan-view] quit
32 Huawei Confidential
• To configure dual-link cold backup on a WDS or mesh network, set the CAPWAP
heartbeat interval to 25 seconds and the number of heartbeat packet
transmissions to at least 6. If this configuration is not performed, a WAC sends
heartbeat packets for three times at an interval of 25 seconds by default. This
may cause unstable WDS or mesh link status and result in STA access failures.
• If you set the CAPWAP heartbeat detection interval and the number of CAPWAP
heartbeat packet transmissions smaller than the default values, CAPWAP link
reliability is degraded. Exercise caution when you set the values. The default
values are recommended.
Configuring VRRP HSB - (Optional) Configuring the Link
Switchover Mode
⚫
The following link switchover modes are supported:
Priority mode (default): enables an AP to preferentially switch service traffic to the active link.
Network stabilization mode: enables an AP to preferentially use a link with high network stabilization, which is determined based on the Echo packet
loss rate.
To change the link switchover mode from priority to network stabilization, run the following commands:
[WAC1-wlan-view] ap-system-profile name wlan-net
[WAC1-wlan-ap-system-prof-wlan-net] ac protect link-switch mode network-stabilization
[WAC1-wlan-ap-system-prof-wlan-net] ac protect link-switch packet-loss echo-probe-time 30
[WAC1-wlan-ap-system-prof-wlan-net] ac protect link-switch packet-loss start-threshold 30
Configure the number of times Echo packets are sent within a statistics collection interval.
[WAC1-wlan-view] ac protect link-switch packet-loss echo-probe-time 20
Configure the packet loss rate start and difference thresholds for an active/standby link switchover.
[WAC1-wlan-view] ac protect link-switch packet-loss gap-threshold 15
[WAC1-wlan-view] ac protect link-switch packet-loss start-threshold 20
33 Huawei Confidential
• By default, the packet loss rate start and difference thresholds for an
active/standby link switchover are 20% and 15%, respectively.
Configuring Dual-Link HSB - Configuring HSB
Create HSB service 0 on WAC1 and configure the IP addresses
and port numbers for the active and standby channels.
10.23.102.1/30 10.23.102.2/30
HSB channel [WAC1] hsb-service 0
WAC1 WAC2
[WAC1-hsb-service-0] service-ip-port local-ip 10.23.102.1 peer-ip
Primary Backup 10.23.102.2 local-data-port 10241 peer-data-port 10241
10.23.100.2 [WAC1-hsb-service-0] quit
10.23.100.1
Management VLAN 100 Management VLAN 100
Bind the WLAN and NAC services to the HSB service on WAC1.
[WAC1] hsb-service-type ap hsb-service 0
[WAC1] hsb-service-type access-user hsb-service 0
34 Huawei Confidential
Configuring Dual-Link HSB - Verifying the Configuration
Run the display ac protect command on WAC1 and WAC2 Run the display hsb-service 0 command on WAC1 and WAC2
to view the dual-link backup configurations. to check the HSB service status. If the value of the Service State
[WAC1] display ac protect field is Connected, the HSB channel has been established.
------------------------------------------------------------
Protect state : enable [WAC1] display hsb-service 0
Protect AC IPv4 : 10.23.100.3 Hot Standby Service Information:
Protect AC IPv6 :- ----------------------------------------------------------
Priority :0 Local IP Address : 10.23.102.1
Protect restore : enable Peer IP Address : 10.23.102.2
... Source Port : 10241
------------------------------------------------------------ Destination Port : 10241
[WAC2] display ac protect Keep Alive Times :5
------------------------------------------------------------ Keep Alive Interval :3
Protect state : enable Service State : Connected
Protect AC IPv4 : 10.23.100.2 Service Batch Modules : AP
Protect AC IPv6 :- Shared-key :-
Priority :1 ----------------------------------------------------------
Protect restore : enable
...
------------------------------------------------------------
35 Huawei Confidential
Contents
2. HSB Technologies
4. N+1 Backup
36 Huawei Confidential
Dual-Link Cold Backup Overview
37 Huawei Confidential
Working Process of Dual-Link Cold Backup
1. Establish active and standby links: The primary WAC is
preferentially selected and the active link is
WAC1 WAC2 established. After the primary WAC delivers
10.1.1.3/24 10.1.1.2/24
configurations, the standby link is established.
2. Active/standby switchover: When the primary WAC
fails or the downlink is disconnected, a switchover is
triggered between the primary and backup WACs to
Active link Standby link
activate the standby link. Original STAs on the AP go
offline and then online again.
3. Active/standby switchback: Global switchback is
enabled. After an active/standby switchover is
Data traffic
performed, a switchback is triggered when the link of
CAPWAP tunnel the original primary WAC recovers.
38 Huawei Confidential
Active/Standby CAPWAP Link Setup Process in Dual-Link
Cold Backup
AP Primary WAC Backup WAC
⚫ Active link establishment.
In the Discovery phase, the primary WAC is
CAPWAP Discovery Request
preferentially selected.
CAPWAP Discovery Request
The other steps are the same as those in normal
CAPWAP Discovery Response (carrying information
such as the IP address, priority, and load) CAPWAP tunnel establishment.
CAPWAP Discovery Response (carrying information such as
the IP address, priority, and load) ⚫ Establish the standby link.
The primary WAC is selected based on the priority
and load, and the active link is established.
To prevent repeated service configuration delivery,
the AP starts to set up the standby link with the
Deliver configurations.
backup WAC only after the active CAPWAP link is set
CAPWAP Discovery Request up with the primary WAC and configurations are
CAPWAP Discovery Response (carrying information such as the delivered.
IP address, priority, and load)
39 Huawei Confidential
• The process of establishing the active and standby links is the same as that in
dual-link HSB.
Active/Standby Switchover in Dual-Link Cold Backup
⚫ After setting up links with the primary and backup WACs, an AP periodically sends Echo messages carrying information about the
active and standby links to the WACs.
⚫
Upon detecting a failure of the active link, the AP sends an Echo Request message carrying primary WAC information to the backup
WAC. Upon receiving this message, the backup WAC determines that its link becomes the active link and takes over services from
the primary WAC. During this process, original STAs on the AP go offline and then online again.
AP Primary WAC Backup WAC
Echo Request
40 Huawei Confidential
▫ When a link is faulty, the WAC cannot respond to Echo messages from the
AP. If the primary WAC does not respond after the specified number of
CAPWAP heartbeat detections within the CAPWAP heartbeat interval, the
AP determines that the primary link has failed.
• To configure dual-link cold backup on a WDS or mesh network, set the CAPWAP
heartbeat interval to 25 seconds and the number of heartbeat packet
transmissions to at least 6. If this configuration is not performed, the WAC sends
heartbeat packets for three times at an interval of 25 seconds by default. This
may cause unstable WDS or mesh link status and result in STA access failures.
Active/Standby Switchback in Dual-Link Cold Backup
⚫ The AP periodically sends Discovery Request messages to check whether the original active link recovers. If so, the
AP switches STA data back to this link with a higher priority.
⚫ To prevent the frequent switchovers caused by network flapping, the WACs are informed of the active/standby
switchback after 20 Echo intervals elapse. At the same time, the AP sends the STA service data to the new primary
WAC.
AP Primary WAC Backup WAC
Discovery Request
Discovery Response
41 Huawei Confidential
• Dual-link cold backup also supports the network stability mode. The switching
mode is the same as that described in dual-link HSB.
Configuring Dual-Link Cold Backup - Configuration
Roadmap
WAC1 WAC2
Primary Backup
Configuration roadmap
42 Huawei Confidential
Configuring Dual-Link Cold Backup - Configuring Dual-Link
Backup
On WAC1, specify the IP address of WAC2 and the priority of
WAC1 to implement dual-link backup. Enable dual-link backup
WAC1 WAC2 and revertive switching globally, and restart all APs to make the
Primary Backup
dual-link backup function take effect.
10.23.100.1 10.23.100.2
Management VLAN 100 Management VLAN 100 [WAC1-wlan-view] ac protect protect-ac ip-address 10.23.100.2
[WAC1-wlan-view] ac protect priority 0
[WAC1-wlan-view] undo ac protect restore disable
[WAC1-wlan-view] ac protect enable
Warning: This operation maybe cause AP reset, continue?[Y/N]: y
43 Huawei Confidential
• To configure dual-link cold backup on a WDS or mesh network, set the CAPWAP
heartbeat interval to 25 seconds and the number of heartbeat packet
transmissions to at least 6. If this configuration is not performed, a WAC sends
heartbeat packets for three times at an interval of 25 seconds by default. This
may cause unstable WDS or mesh link status and result in STA access failures.
• If you set the CAPWAP heartbeat detection interval and the number of CAPWAP
heartbeat packet transmissions smaller than the default values, CAPWAP link
reliability is degraded. Exercise caution when you set the values. The default
values are recommended.
• By default, dual-link backup is disabled. In this case, when the ac protect enable
command is run, a message is displayed indicating that all APs will be restarted.
After the APs are restarted, the dual-link backup function takes effect.
• If the dual-link backup function has been enabled, running the ac protect enable
command does not restart the APs. You need to run the ap-reset command on
the active WAC to restart the APs to make the dual-link backup function take
effect.
Configuring Dual-Link Cold Backup - (Optional) Configuring
the Link Switchover Mode
⚫ The following link switchover modes are supported:
Priority mode (default): enables an AP to preferentially switch service traffic to the active link.
Network stabilization mode: enables an AP to preferentially use a link with high network stabilization, which is determined
based on the Echo packet loss rate.
To change the link switchover mode from priority to network stabilization, run the following commands:
[WAC1-wlan-view] ap-system-profile name wlan-net
[WAC1-wlan-ap-system-prof-wlan-net] ac protect link-switch mode network-stabilization
[WAC1-wlan-ap-system-prof-wlan-net] ac protect link-switch packet-loss echo-probe-time 30
[WAC1-wlan-ap-system-prof-wlan-net] ac protect link-switch packet-loss start-threshold 30
Configure the number of times Echo packets are sent within a statistics collection interval.
Configure the packet loss rate start and difference thresholds for an active/standby link switchover.
[WAC1-wlan-view] ac protect link-switch packet-loss gap-threshold 15
[WAC1-wlan-view] ac protect link-switch packet-loss start-threshold 20
44 Huawei Confidential
• By default, the packet loss rate start and difference thresholds for an
active/standby link switchover are 20% and 15%, respectively.
Configuring Dual-Link Cold Backup - Verifying the
Configuration
Run the display ac protect command to check the dual-link Run the display ap-system-profile name xxx command on
backup status, revertive switchover status, and priorities of WAC1 and WAC2 to check the dual-link information on the two
WACs, and the backup WAC's IP address in the WLAN view. WACs.
45 Huawei Confidential
Contents
2. HSB Technologies
4. N+1 Backup
46 Huawei Confidential
N+1 Backup Overview
⚫
One WAC serves as a backup for multiple primary WACs.
Backup WAC Enterprise HQ In this example, the WAC in the enterprise HQ can function as
the backup WAC for local WACs in branch 1 and branch 2.
⚫
In normal cases, an AP sets up a CAPWAP link only with the
primary WAC to which it associates.
WAN ⚫
When the primary WAC fails or the link between the
primary WAC and AP is faulty, the backup WAC establishes
a link with the AP to manage and provide services for the
AP.
Primary Primary
WAC WAC
⚫ Active/standby switchover and switchback are supported.
47 Huawei Confidential
• When the CAPWAP link between an AP and the primary WAC is disconnected,
the AP attempts to establish a CAPWAP link with the backup WAC. After the new
CAPWAP link is established, the AP restarts and obtains configurations from the
backup WAC. During this process, services are affected.
Working Process of N+1 Backup
WAN
the CAPWAP link between the primary WAC and AP is
faulty, the backup WAC sets up a CAPWAP link with
the AP and the AP goes online again.
Primary
3. Active/standby switchback: Global switchback is
Primary
WAC WAC enabled. After an active/standby switchover is
performed, a switchback is triggered when the link of
the original primary WAC recovers.
Enterprise Enterprise CAPWAP tunnel
branch 1 branch 2
48 Huawei Confidential
Selecting Primary and Backup WACs in N+1 Backup
49 Huawei Confidential
• When planning an N+1 backup network, ensure that the primary WAC can be
selected based on WAC priorities so that all APs can go online on the predefined
primary WAC. Otherwise, the APs select the primary WAC based on loads and IP
addresses, and may go online on WACs other than the predefined primary WAC.
Alternatively, ensure that the primary WAC can be selected among the specified
primary and backup WACs.
• The AP selects the primary WAC based on the following rules:
▫ Check whether any primary WACs are specified. If only one primary WAC is
specified, the AP selects it as the primary WAC. If multiple primary WACs
are specified, the AP selects the WAC with the lowest load as the primary
WAC. If the loads are the same, the AP selects the WAC with the smallest IP
address as the primary WAC.
▫ Compare WAC loads, that is, numbers of access APs and STAs. The AP
selects the WAC with the lowest load as the primary WAC. The number of
allowed APs is compared ahead of the number of allowed STAs. When the
numbers of allowed APs are the same on WACs, the AP selects the WAC
that can connect more STAs as the primary WAC.
▪ Number of allowed APs = Maximum number of access APs – Number
of online APs
▪ Number of allowed STAs = Maximum number of access STAs –
Number of online STAs
▫ If no primary WAC is specified, check whether any backup WACs are
specified. If only one backup WAC is specified, the AP selects this WAC as
the primary WAC. If multiple backup WACs are specified, the AP selects the
WAC with the lowest load as the primary WAC. If the loads are the same,
the AP selects the WAC with the smallest IP address as the primary WAC.
▫ If no backup WAC is specified, the AP compares WAC priorities and selects
the WAC with the highest priority as the primary WAC. A smaller priority
value indicates a higher priority.
▫ If the WAC priorities are the same, the AP selects the WAC with the lowest
load as the primary WAC.
▫ When the loads are the same, the AP compares the WACs' IP addresses and
selects the WAC with the smaller IP address as the primary WAC.
WAC Priority
⚫ A WAC has two types of priorities:
Global priority: WAC priority configured for all APs.
Individual priority: WAC priority configured for a single AP or APs in a specified AP group.
CAPWAP
Backup WAC3 tunnel
Global priority: 5
Primary WAC1 Switch Primary WAC2
51 Huawei Confidential
• When receiving a Discovery Request packet from an AP, a WAC checks whether
an individual priority has been specified for the AP. If not, the WAC replies a
Discovery Response packet carrying the global priority. If so, the WAC replies a
Discovery Response packet carrying the individual priority. Configure proper
priorities on the primary and backup WACs to control access of APs on the two
WACs.
▫ In the Discovery phase, AP_1 sends a Discovery Request packet to all WACs.
▫ When WAC1 receives the Discovery Response packet from AP_1, WAC1
returns the individual priority 3 for AP_1.
▫ There is no individual priority for AP_1 on WAC2 or WAC3, so WAC2 returns
the global priority 6 and WAC3 returns the global priority 5 to AP_1.
▫ AP_1 compares WAC priorities in the Discovery Response packets and
selects WAC1, which has the highest priority, as the primary WAC to send
an association request.
▫ If WAC1 or the CAPWAP link between WAC1 and AP_1 fails, and no backup
WAC is designated, AP_1 sends new Discovery Request packets to obtain
priorities of the remaining WACs. WAC2 returns the global priority 6, and
WAC3 returns the global priority 5. AP_1 compares WAC priorities and
selects WAC3 with a higher priority as the backup WAC to send an
association request.
Active/Standby Switchover in N+1 Backup
⚫
In normal cases, an AP sets up a CAPWAP link only with the
CAPWAP tunnel
primary WAC and periodically exchanges heartbeat packets
Backup WAC3
CAPWAP tunnel with the primary WAC to monitor the CAPWAP link status.
Global priority: 5
⚫
When the AP detects a heartbeat packet transmission
Primary WAC1 timeout, it considers the link disconnected and sets up a
Switch
Primary WAC2 CAPWAP link with the backup WAC.
⚫
After the CAPWAP link is established, the backup WAC
delivers configurations to the AP again. To ensure that
primary and backup WACs deliver the same WLAN service
⚫
To ensure that APs can work properly after an active/standby
switchover, the specifications of the backup WAC must be
fully considered during design.
52 Huawei Confidential
• The AP sets up a CAPWAP link with the backup WAC in the following situations:
▫ If the IP address of the backup WAC is configured on the primary WAC, the
AP sets up a CAPWAP link with the backup WAC directly.
▫ If the IP address of the backup WAC is not configured on the primary WAC,
the AP broadcasts Discovery Request packets to discover WACs and selects
the backup WAC to establish a CAPWAP link.
• To ensure that the AP works properly after an active/standby switchover, the
following conditions must be met:
▫ The number of online APs supported by the backup WAC cannot be smaller
than the number of online APs on any of the primary WACs.
▫ The total number of online APs on all primary WACs cannot exceed the
configurable number of APs on the backup WAC.
• Determine the value of N in N+1 backup based on the configurable number of
APs on the backup WAC and the number of APs managed by the N primary
WACs. The number of APs managed by the N primary WACs cannot exceed the
configurable number of APs on the backup WAC.
Active/Standby Switchback in N+1 Backup
⚫ After an AP sets up a CAPWAP tunnel with the
CAPWAP tunnel
Backup WAC3 backup WAC, the AP obtains the IP address of its
CAPWAP tunnel
Global priority: 5
primary WAC from the backup WAC and sends
53 Huawei Confidential
Configuring N+1 Cold Backup - Configuration Roadmap
Backup WAC3
Configuration roadmap
Primary WAC1 Primary WAC2
Switch • Configure the global priorities of the primary
and backup WACs.
• Configure revertive switching.
• (Optional) Configure heartbeat detection.
• (Optional) Configure the active/standby link
switchover mode.
54 Huawei Confidential
55 Huawei Confidential
• WAC priorities determine the WAC roles. The WAC with a higher priority is the
primary WAC, and that with a lower priority is the backup WAC.
• A smaller value indicates a higher priority.
• If multiple WACs have the same priority, the WAC that supports access of more
APs is the primary WAC.
• If the numbers of allowed APs are the same on WACs, the WAC that can connect
more STAs is used as the primary WAC.
• If the preceding conditions are the same, the WAC with a smaller IP address is
the primary WAC.
Configuring N+1 Cold Backup - Configuring Revertive
Switching
Backup WAC3
10.23.100.4
Global priority: 5
AP_1 AP_2
56 Huawei Confidential
• WAC priorities determine the WAC roles. The WAC with a higher priority is the
primary WAC, and that with a lower priority is the backup WAC.
• A smaller value indicates a higher priority.
• If multiple WACs have the same priority, the WAC that supports access of more
APs is the primary WAC.
• If the numbers of allowed APs are the same on WACs, the WAC that can connect
more STAs is used as the primary WAC.
• If the preceding conditions are the same, the WAC with a smaller IP address is
the primary WAC.
Configuring N+1 Cold Backup - Enabling N+1 Backup
On WAC1, enable N+1 backup and restart all APs to make the
function take effect.
[WAC_1-wlan-view] undo ac protect enable
Backup WAC3
Info: Backup function has already disabled.
10.23.100.4
Global priority: 5 [WAC_1-wlan-view] ap-reset all
Warning: Reset AP(s), continue?[Y/N]:y
Primary WAC1 Primary WAC2 On WAC2, enable N+1 backup and restart all APs to make the
Switch
function take effect.
[WAC_2-wlan-view] undo ac protect enable
10.23.100.2 10.23.100.3
Global priority: 6 Info: Backup function has already disabled.
Global priority: 6
Individual priority for Individual priority [WAC_2-wlan-view] ap-reset all
AP_1: 3 for AP_1: 3
Warning: Reset AP(s), continue?[Y/N]:y
57 Huawei Confidential
• By default, N+1 backup is enabled. The system displays an Info message when
you run the undo ac protect enable command. Run the ap-reset all command on
the primary WAC to restart all APs. After the APs are restarted, N+1 backup
starts to take effect.
Configuring N+1 Cold Backup - Verifying the Configuration
Run the display ac protect and display ap-system-profile Run the display ac protect and display ap-system-profile
commands on WAC1 and WAC2 to check N+1 backup information. commands on WAC3 to check N+1 backup information.
[WAC_1-wlan-view] display ac protect [WAC_3-wlan-view] display ac protect
------------------------------------------------------------ ------------------------------------------------------------
Protect state : disable Protect state : disable
Protect AC IPv4 : 10.23.100.4 Protect AC IPv4 :-
Protect AC IPv6 :- Protect AC IPv6 :-
Priority :6 Priority :5
Protect restore : enable Protect restore : enable
... ------------------------------------------------------------
------------------------------------------------------------ [WAC_3-wlan-view] display ap-system-profile name ap-system
[WAC_1-wlan-view] display ap-system-profile name ap-system ------------------------------------------------------------
------------------------------------------------------------ AC priority :-
AC priority :3 Protect AC IP address : 10.23.100.2
Protect AC IP address :- Primary AC :-
Primary AC :- Backup AC :-
Backup AC :- ------------------------------------------------------------
... [WAC_3-wlan-view] display ap-system-profile name ap-system1
------------------------------------------------------------ ------------------------------------------------------------
AC priority :-
Protect AC IP address : 10.23.100.3
Primary AC :-
Backup AC :-
------------------------------------------------------------
58 Huawei Confidential
Contents
2. HSB Technologies
4. N+1 Backup
59 Huawei Confidential
Overview of CAPWAP Link Failover
⚫ In direct forwarding mode on a WLAN, if a CAPWAP link fails, a failover policy can
be deployed to achieve uninterrupted WLAN services and retain original online STAs.
⚫ CAPWAP link failover policies include:
Service holding upon CAPWAP link disconnection.
Enabling the backup VAP upon CAPWAP link disconnection.
WAN authentication bypass.
60 Huawei Confidential
▫ After a CAPWAP link is disconnected, the original VAP is disabled, and the
backup VAP is automatically enabled. All STAs go offline from the original
VAP. You need to manually associate the STAs with the backup VAP so that
the STAs can access the backup SSID generated by the backup VAP.
Service Holding upon CAPWAP Link Disconnection in Direct
Forwarding Mode
Campus
network Function description
1. User data is forwarded in direct mode. If the CAPWAP link between the AP and
WAC is disconnected, services of online users are not interrupted and user data
can be forwarded normally.
WAC 2. After the function of allowing new user access upon CAPWAP link disconnection is
enabled, upon CAPWAP link disconnect between the AP and WAC, STA
authentication, association, and key negotiation for new STAs are performed
between the AP and STAs.
3. Whether a new STA can go online depends on the authentication mode bound to
the STA.
On a small-scale WLAN without the WAC backup design, this function ensures
uninterrupted user data forwarding when an AP disconnects from a WAC, improving
Online STA New STA service reliability.
61 Huawei Confidential
• This function is valid only in direct forwarding mode, but does not work in tunnel
forwarding mode.
• When the function of allowing new STA access upon CAPWAP link disconnection
is disabled, the STA association and key negotiation are performed between the
WAC and STA. After this function is enabled, however, the STA authentication,
association, and key negotiation are performed between the AP and STA.
• For new access STAs:
Campus
network Function description
1. All existing STAs go offline and then access the network in the authentication
mode specified for the backup VAP.
2. The backup VAP supports the open system, WEP, WPA+PSK, WPA2+PSK, and
WAC WPA-WPA2+PSK authentication modes.
3. When the fault is recovered, the backup SSID is automatically disabled and the
original SSID is enabled.
4. Only the direct forwarding mode is supported.
SSID1 SSID2
Application scenario
62 Huawei Confidential
Overview of WAN Authentication Bypass
⚫ In an HQ-branch campus network scenario, branches are connected to the HQ across a WAN, a WAC is deployed at the HQ, and APs
are deployed at branches. To address these problems, you can configure WAN authentication bypass to allow new STAs to connect
to the network after disconnection of CAPWAP tunnels between the WAC at the HQ and branch APs.
Internet Internet
WAC WAC
AP AP
WAN WAN
HQ network HQ network
Branch network Branch network
RADIUS server RADIUS server
63 Huawei Confidential
Network Architecture for WAN Authentication Bypass
Router WAC
⚫ Branch AP groups are created at branches, and
services, such as user access authentication, are
Server zone processed by APs. This function makes branch
(Portal, RADIUS, Gateway
DNS, etc.) HQ
networks less dependent on the HQ network. In this
way, users at branches can still use the WLAN even if
WAN
the branch networks are disconnected from the HQ
Branch
Gateway network.
WAC: centrally monitors and manages APs.
Switch2
Branch AP group: allows for unified management of
Branch
AP group member APs.
64 Huawei Confidential
Process for STAs to Go Online on Offline Branch APs
⚫ In WAN authentication bypass scenarios, STA access is controlled by APs in distributed mode when the APs are disconnected from a
WAC. In this solution, critical services are processed by APs, reducing the probability of packet loss and delay and improving users'
service experience.
⚫
When a STA goes online on an offline branch AP, the first two phases are the same as those for a common STA to go online. The
difference lies in the association phase.
STA AP
⚫
The STA sends an Association Request frame to the AP. This
frame carries the STA's own information and the parameters
selected by the STA according to the service configuration,
including the supported rate, channel, QoS capabilities, access
authentication mode, and encryption algorithm.
Association Request ⚫ After receiving the Association Request frame, the AP
performs access control on the STA.
Access control ⚫
The AP sends an Association Response frame to the STA.
Association Response processing
65 Huawei Confidential
Implementation of WAN Authentication Bypass: The WAC
Delivers Configurations to APs
Access authentication
⚫ A WAN interruption will disconnect the WAC and APs configuration on APs
that communicate over the WAN. In this case, the APs
need to use the local authentication function to
authenticate new STAs. Therefore, the WAC needs to VAP profile Branch AP group
deliver access authentication configurations to the APs.
⚫ Delivered configurations to an AP are divided into: Authentication Local account
profile
Delivery of the same configuration information on the AP
Authentication
and WAC. 802.1X access profile
scheme
Delivery of different configurations on the AP and WAC.
Built-in RADIUS
MAC access profile
server
Same configuration
Different configuration
66 Huawei Confidential
• Note:
67 Huawei Confidential
CAPWAP tunnel
AC AC
Flow of traffic Flow of traffic
Flow of traffic Flow of traffic
after roaming after roaming
before roaming before roaming
Roam Roam
68 Huawei Confidential
• STAs stay in the same subnet before and after Layer 2 roaming. The FAP
forwards packets of Layer 2 roaming STAs in the same way as those of new
online STAs, that is, it directly forwards the packets on the local network.
• STAs stay in different subnets before and after Layer 3 roaming. To enable the
STAs to access the original network after roaming, ensure that user traffic is
forwarded to the original subnet over CAPWAP tunnels.
CAPWAP Link Recovery (1)
⚫ Service holding upon CAPWAP link disconnection:
When a non-open authentication mode is used, all STAs are forced to go offline and need
to go online again.
When open system authentication mode is used, STAs are processed differently depending
on whether an AP restarts during the CAPWAP link disconnection period:
◼ If so, all STAs are brought offline.
◼ If not, STAs that are online before link disconnection are not brought offline, but new STAs that
go online during the link disconnection period will be.
69 Huawei Confidential
CAPWAP Link Recovery (2)
⚫ WAN authentication bypass:
All STA entries are synchronized to the WAC, and STAs are re-authenticated on the WAC.
Before re-authentication succeeds, all STAs retain the network permissions before the link
disconnection. If re-authentication succeeds, the WAC delivers new network permissions
to the STAs, and the STAs can properly access the network without the need to go online
again. If re-authentication fails, the STAs are brought offline and need to go online again.
⚫ Enabling the backup VAP upon CAPWAP link disconnection
The AP automatically disables the backup VAP and restores the original VAP. All STAs go
offline from the backup VAP and need to go online again on the original VAP.
70 Huawei Confidential
Comparing CAPWAP Link Failover Policies
Applicable Networking and
Failover Policy Authentication Mode After a Failover Advantage Disadvantage
Authentication Mode
Services of online STAs are held, and new STAs can access the
network as follows:
• Open system, WEP, or WPA/WPA2-PSK: The authentication Not secure
• Applicable networking: direct
Service holding mode of new STAs does not change. In some
forwarding networking in all Simple
upon CAPWAP scenarios • MAC address, Portal, or MAC address-prioritized Portal authentication modes,
deployment
link disconnection authentication: New STAs can access the network without new STAs cannot
• Authentication mode: all access the network.
authentication.
• Other authentication modes: New STAs cannot access the
network.
• Applicable networking: direct
forwarding networking in HQ- New STAs can
branch scenarios be
• Authentication mode: authenticated Complex deployment
WAN
Services of online STAs are held, and the authentication mode of locally on APs This failover policy is
authentication WPA/WPA2-PPSK new STAs does not change. after the not available in many
bypass
MAC address CAPWAP link is authentication modes.
disconnected,
802.1X which is secure.
MAC address + 802.1X
71 Huawei Confidential
Configuring Service Holding and Enabling the Backup VAP
upon CAPWAP Link Disconnection
Configure globally service holding upon CAPWAP link disconnection in the AP system profile.
Configure service holding upon CAPWAP link disconnection in the VAP profile, which has a higher priority than that in the AP system profile.
Configure the device to disable the running VAP and automatically enable the backup VAP after the CAPWAP link is disconnected . The following
example assumes that the original VAP profile is normalvap and the backup VAP profile is backupvap.
72 Huawei Confidential
• To enable offline APs to allow access of new STAs in Portal or MAC address
authentication, configure the parameter no-auth when you run the keep-service
enable allow new-access no-auth command.
• The command does not take effect on a WDS network.
• The device detection and containment functions are mutually exclusive with the
function of enabling offline APs to provide access to new STAs. After new STA
access upon CAPWAP link disconnection is enabled, an AP continues to provide
data services after it goes offline. If the wids device detect enable or wids contain
enable command is executed, the WAC considers the AP as a rogue or interfering
device and adds it to the containment list. The containment mechanism prevents
new STAs from accessing the AP. In this case, the new STA access function does
not take effect after the AP goes offline.
Branch HQ
Configuration roadmap
AP Switch WAC
• Create and configure a branch AP group.
WAN
• Configure local authentication for the branch
AP group.
• Configure a local user in the branch AP group
and the access type of the user.
STA RADIUS server
• Configure a built-in RADIUS server.
• Verify the configuration.
73 Huawei Confidential
Configuring WAN Authentication Bypass - Creating and
Configuring a Branch AP Group
Branch HQ
AP ID: 0
AP Switch WAC
Create a branch AP group named g1 and add AP 0 to the group.
WAN
[WAC-wlan-view] branch-group name g1
[WAC-wlan-branch-group-g1] ap 0
Warning: This operation may cause AP reset. Continue? [Y/N]:y
74 Huawei Confidential
75 Huawei Confidential
Configuring WAN Authentication Bypass - Configuring Local
Users in the Branch AP Group
Configure parameters of local users.
76 Huawei Confidential
Configuring WAN Authentication Bypass - Configuring a
Built-in RADIUS Server
Configure a built-in RADIUS server.
Branch HQ
[WAC-wlan-branch-group-g1] local-eap-server authentication eap-
AP ID: 0 method eap-peap eap-ttls eap-tls
AP Switch WAC
[WAC-wlan-branch-group-g1] local-eap-server authentication
WAN certificate ca format pem filename caserver.pem
[WAC-wlan-branch-group-g1] local-eap-server authentication
certificate local format pem filename serverlocal.pem
[WAC-wlan-branch-group-g1] local-eap-server authentication private-
key format pem filename server.pem password Huawei@123
STA RADIUS server [WAC-wlan-branch-group-g1] load-authentication-file
77 Huawei Confidential
• The CA certificate, local certificate, and private key file in this example are for
reference only. Configure them based on the site requirements.
Configuring WAN Authentication Bypass - Verifying the
Configuration
⚫ When the WAC is disconnected from the AP, log in to the AP. You can see that the local user has gone online.
<AP> display access-user
-----------------------------------------------------------------------------------------
UserID Username IP address MAC Status
-----------------------------------------------------------------------------------------
6 test1 10.23.11.163 e005-c5fa-b829 Success
-----------------------------------------------------------------------------------------
Total: 1, printed: 1
78 Huawei Confidential
Quiz
79 Huawei Confidential
• VRRP HSB.
• Direct forwarding.
Summary
80 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
⚫ WLAN roaming ensures that the STA's IP address remains unchanged. After
roaming, the STA can still access the initially associated network without
service interruption.
⚫ This course describes basic concepts of WLAN roaming, roaming
technologies, roaming experience optimization methods, typical roaming
scenarios, and roaming fault rectification.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
3 Huawei Confidential
What Is WLAN Roaming?
WAC
Signal strength
Distance
STA moving track
STA
Signal strength of AP1 Signal strength of AP2
4 Huawei Confidential
Conditions of and Problems Solved by WLAN Roaming
Internet
⚫ The APs on which WLAN roaming is implemented must
have the same SSID, security profiles (same
WAC1 WAC2
configurations but can be named differently),
authentication mode, and authentication parameter
settings.
⚫ WLAN roaming offers the following advantages:
Avoids packet loss or service interruption caused by long-
term authentication.
AP1 AP2
Remains STAs' authorization information unchanged.
SSID: Huawei SSID: Huawei
Roaming
Retains STAs' IP addresses.
STA STA
5 Huawei Confidential
Network Architecture of WLAN Roaming
Internet
Mobility group: STAs can roam
between WACs in the same group. This
WAC1 WAC2 group is called mobility group.
Inter-WAC tunnel (CAPWAP tunnel): is Mobility group
established using CAPWAP to synchronize
information about STAs and APs CAPWAP tunnel
managed by each WAC in a mobility
group.
Inter-WAC
roaming
roaming
STA STA STA
6 Huawei Confidential
• In this example, AP1 and AP2 are managed by WAC1, while AP3 is managed by
WAC2.
Concepts of WLAN Roaming
Internet
WAC1 WAC2
Home AC (HAC): a WAC in a mobility Mobility group Foreign AC (FAC): the WAC that a
group with which a STA first associates STA roams to
CAPWAP tunnel
roaming
roaming
Intra-AC
Inter-AC
STA STA STA
7 Huawei Confidential
• Concepts:
▫ Home AC (HAC): the WAC in a mobility group that a STA first associates
with.
▫ Home AP (HAP): the AP in a mobility group that a STA first associates with.
▫ Foreign AC (FAC): the WAC that a STA roams to.
Internet Internet
WAC WAC
8 Huawei Confidential
• Layer 2 roaming: When a STA moves between APs, the service VLAN of the APs
and the STA gateway remain unchanged before and after roaming.
• Layer 3 roaming: The service VLANs of the SSIDs before and after roaming are
different. The service networks provided by APs are different Layer 3 networks
and correspond to different STA gateways. In this case, to ensure that the STA IP
addresses remain unchanged, STA traffic needs to be sent to the AP on the
initially accessed network segment to implement inter-VLAN roaming.
• Sometimes, two subnets have the same VLAN ID. Based on the VLAN ID, the
system may incorrectly consider that STAs roaming between the two subnets
roam at Layer 2. To prevent this situation, configure a roaming domain to
determine whether the STAs roam within the same subnet. The system considers
that the STAs roam at Layer 2 only when the STAs roam within the same VLAN
and the same roaming domain; otherwise, the STAs roam at Layer 3.
Intra-WAC Roaming
Internet
HAC = FAC
9 Huawei Confidential
Inter-WAC Roaming
CAPWAP tunnel
Internet
⚫ Mobility group: WACs on a WLAN network
can be added to different groups. STAs can
roam between WACs in the same group. This
HAC FAC group is called mobility group.
⚫ Inter-WAC tunnel: Inter-WAC roaming
requires that WACs in a mobility group
synchronize STA and AP information with
each other. To achieve this, a tunnel needs to
HAP FAP be set up between WACs to synchronize data
and forward packets. An inter-WAC tunnel is
VLAN 10 Roaming VLAN 20
established using the CAPWAP protocol.
SSID: Huawei SSID: Huawei
STA STA
10 Huawei Confidential
• To enable inter-WAC roaming, you can configure one WAC as the mobility server
to maintain the membership table and deliver member information to WACs in
the mobility group. In this way, WACs in the group can identify each other and
set up inter-WAC tunnels.
▫ A mobility server can be an AC outside or inside a mobility group.
▫ A WAC can function as the mobility server of multiple mobility groups, and
can be added only to one mobility group.
11 Huawei Confidential
Proactive STA Roaming Process
⚫ A STA determines whether to trigger roaming based on the AP signal strength. If the signal strength
reaches the preset threshold, the STA triggers roaming. A typical STA roaming process involves three
phases:
Scanning: Detects visible cells (identified by BSSIDs) based on the current location of the STA, and measures
signal strength of the detected cells.
Network selection: Selects a cell as the target cell for roaming based on the signal strength of cells.
Roaming: Selects a roaming mode supported by the network based on the STA and network capability.
12 Huawei Confidential
Proactive STA Roaming: Scanning
Proactive STA scanning Passive STA scanning
Probe Request
STA1
Probe Response
STA AP AP
STA2
The STA sends a Probe Request frame containing an A STA listens on the Beacon frames that an AP
SSID over each channel to search for an AP with the periodically sends over each channel to obtain AP
same SSID. Only the AP with the same SSID returns a information. A Beacon frame contains various
Probe Response frame. information, including the SSID and supported rate.
13 Huawei Confidential
• Passive scanning: After receiving a Beacon frame from an AP, a STA discovers the
cell of the AP. The STA may not receive Beacon frames from the AP.
Internet
WAC
Cell selection rules for proactive STA roaming
⚫
A: signal strength threshold for roaming handover
HAP FAP ⚫
B: signal strength different threshold for roaming
handover
⚫
Proactive STA roaming is triggered when the
STA
following is met: (X < A)&&((Y – X) > B)
The strength of signals received by the STA from the HAP is X dBm.
The strength of signals received by the STA from the FAP is Y dBm.
14 Huawei Confidential
• A 5G network is preferred during roaming. As required, the gain of the target cell
must be at least 4 dB.
Proactive STA Roaming: Roaming
STA roaming STA joining
15 Huawei Confidential
16 Huawei Confidential
Roaming Impacts on Services
⚫ Video and voice services are sensitive to network delay and packet loss. Take the voice service as an example. Typically, the recovery
duration for the voice service should not exceed 50 ms. As a result, the number of continuously discarded packets should not exceed
3 during roaming.
Voice service packet: Generally, voice service packets are sent at a fixed interval, for example, 20 ms, as shown in the figure on the left.
Video service packet: Each video sample is forwarded via multiple packets. The number and size of packets vary with the video sample. As shown in
the figure on the right, the video samples are sent at an interval of 33 ms.
Bytes
1000 1000
200 200
Time Time
20 ms 33 ms
17 Huawei Confidential
Roaming Duration
⚫ The roaming handover duration is a key
factor that affects in-roaming WLAN service STA AP WAC RADIUS server
experience.
⚫ Compared with open system authentication,
802.1X authentication has two additional Link authentication
18 Huawei Confidential
• Open system authentication, WEP authentication, and PSK authentication last for
a short period, resulting in a short roaming duration. This ensures nonstop service
transmission.
• In contrast, 802.1X authentication takes a long time and involves a large number
of exchanged packets. Therefore, the roaming duration is longer than 200 ms.
This poses a great impact on timeliness-sensitive services, such as voice services.
Roaming Optimization Overview
⚫ Services are interrupted for a period of time during roaming handover. How long the interruption lasts for depends
on the roaming mode.
80 ms
19 Huawei Confidential
Internet 1. A STA accesses the Internet through AP1 for the first time. When the
STA is authenticated by WAC1 and a PMK is generated, the STA and
WAC1 both save the PMK. Each PMK has a PMK-ID, which is
calculated based on the PMK, SSID, STA MAC address, and BSSID.
WAC1 CAPWAP tunnel WAC2 WAC1 then synchronizes the PMK information to WAC2 through the
CAPWAP tunnel between them.
2. During roaming, the STA sends AP2 a Re-association Request packet
that carries the PMK-ID.
3. AP2 notifies WAC2 that the STA needs to roam from AP1 to AP2
after receiving the packet.
4. WAC2 searches the PMK caching table for the PMK of the STA
AP1 AP2 according to the PMK-ID carried in the Re-association Request
packet. If WAC2 finds a matching PMK, it considers that 802.1X
Channel 1 Roaming Channel 6 authentication has been performed on the STA and uses the cached
PMK for key negotiation.
SSID: Huawei
STA STA
20 Huawei Confidential
3. FT Auth Response
4. FT Reassociation Request
5. FT Reassociation Response
6. Roaming to AP2
21 Huawei Confidential
• The 802.11r protocol uses the Fast BSS Transition (FT) function to reduce the
number of times information is exchanged between STAs in the same mobile
domain (MD) and does not require 802.1X authentication or key negotiation
during STA roaming. Users are unaware of service interruption and experience
low-latency data services during roaming, so their online experience is improved.
• Group Transient Key (GTK): is derived from the GMK and is used to encrypt
multicast or broadcast data frames of a specific SSID or AP.
• When a STA accesses the Internet through AP1 for the first time, the STA is
authenticated by the WAC and a PMK is generated.
▫ The WAC generates PMK-R0 (calculated based on the SSID, MDID, WAC
MAC address, and STA MAC address) and PMK-R1 of each AP based on the
PMK (calculated based on the PMK-R0, AP MAC address, and STA MAC
address), and delivers the PMK-R1 to AP1.
▫ The STA and WAC generate and install the pairwise transient key (PTK) and
the group temporal key (GTK) by performing the 4-way and 2-way
handshakes.
• During roaming, the STA sends an 802.11 FT Auth Request to AP2 and delivers
the PMK-R1 to AP2.
• After receiving the request, AP2 generates and installs a PTK according to the
PMK-R1 and information contained in the request. At the same time, AP2 starts
the reassociation timer, and sends an 802.11 FT Auth Response to the STA.
• After receiving the response, the STA generates and installs a PTK based on the
information contained in the response. The STA sends AP2 an FT Reassociation
Request.
• After receiving the request, AP2 disables the reassociation timer, and then sends
an FT Reassociation Response to the STA.
FT Auth Response
FT Reassociation Request
FT Reassociation Response
Roaming to AP2
23 Huawei Confidential
• The STA and WAC generate and install the PTK and the GTK by performing the
4-way and 2-way handshakes.
• WAC1 synchronizes the PMK information to WAC2 through the tunnel between
them.
• WAC2 generates PMK-R0 and PMK-R1 of AP2 based on the PMK, and delivers
PMK-R1 to AP2.
• During roaming, the STA initiates an 802.11 FT Auth Request to AP2 and delivers
PMK-R1 to AP2.
• After receiving the request, AP2 generates and installs a PTK according to the
PMK-R1 and information contained in the request. At the same time, AP2 starts
the reassociation timer, and sends an 802.11 FT Auth Response to the STA.
• After receiving the response, the STA generates and installs a PTK based on the
information contained in the response, and then sends AP2 a Reassociation
Request.
• After receiving the request, AP2 disables the re-association timer and sends a
Reassociation Response to the STA.
• After the STA receives the response, the roaming is complete.
Comparison of WLAN Roaming Modes
25 Huawei Confidential
• Fast roaming using PMK caching is applicable only to a few scenarios. (This
function takes effect only when a STA roams to an authenticated AP.)
Sticky STAs in Mobility Scenarios
Before the STA moves, it accesses AP1 After the STA moves, it still connects to
with the best signal quality by now. 3 AP1. However, for the STA, AP4 has the
best signal quality now.
26 Huawei Confidential
• Some STAs on networks have low roaming aggressiveness. As a result, they stick
to the initially associated APs regardless of whether they move far from the APs,
and have weak signals or low data transmission speeds. The STAs fail to roam to
neighboring APs with better signals. They are called sticky STAs.
• Sticky STAs may bring the following problems:
• Poor service experience: The STAs stick to weak-signal APs, causing a sharp
decrease in the data transmission speed of the radio channel.
• Channel performance degradation: The STAs experience poor signals or low data
transmission speeds, and packet loss and retransmissions occur frequently. As a
result, the STAs occupy the radio channels for a long time, preventing STAs with
good signals from using the radio channel for enough time.
Main Principles of Huawei Smart Roaming
Identify sticky STAs.
The current AP
Does the STA N disconnects the STA and
support 802.11v? steers the STA to roam
to another AP.
Y
27 Huawei Confidential
• To solve the sticky STA issue, Huawei proposes the smart roaming solution.
• Every roaming process consists of three phases: roaming measurement, roaming
decision, and roaming execution.
28 Huawei Confidential
Smart Roaming: Neighboring AP Information Collection
802.11k-capable STA 802.11k-incapable STA
⚫ When detecting a sticky STA, an AP proactively triggers ⚫ For an 802.11k-incapable STAs, an AP discovers
the STA to collect neighboring AP information based on neighboring APs of the STA through proactive channel
the 802.11k mechanism. scanning.
AP AP AP AP
29 Huawei Confidential
• Sticky STAs require the network to help them select more appropriate APs.
Therefore, the network side needs to collect information about neighboring APs
of the STAs through the measurement and information collection mechanism
defined in the 802.11k protocol. This mechanism, however, is not applicable to
802.11k-incapable STAs. For STAs that do not support 802.11k, APs discover
neighboring APs of the STAs through proactive channel scanning.
Smart Roaming: Roaming Steering and Handover Process
802.11v-capable STA 802.11v-incapable STA
Before roaming STA After roaming Before roaming STA After roaming
BSS Transition
Management Request Disassociation
BSS Transition
Management Response
Probe Request Probe Request Probe Request
Association Response
Reassociation Response
30 Huawei Confidential
• For an 802.11v-capable STA, the network side selects the most suitable AP for
the STA to roam to. The entire process is as follows: The HAP sends the target AP
information (for example, the AP's working channel) to the STA through a BSS
Transition Management Request frame. The STA returns a BSS Transition
Management Response frame. After the STA and the target AP exchange
authentication information, the STA gets associated with the target AP through
reassociation frames.
31 Huawei Confidential
Contents
32 Huawei Confidential
Roaming Issues in a Typical Smart Warehousing Scenario
Application
system
AGV scheduling system Stock-in/out management system
Network
⚫
Passive roaming: A STA initiates roaming
only after it is disconnected, leading to
unstable performance.
⚫
Long roaming latency: During STA
roaming, the network is interrupted for
more than 2s, affecting services.
⚫ Abnormal in-roaming disconnection:
Coordinated roaming control module between APs and AGVs
STA STAs go offline abnormally, coupled with
decreased access speed and sudden stops.
AGV Manual intervention is required.
33 Huawei Confidential
• With the automation wave, the IT investment in the global logistics industry
keeps growing rapidly. Warehousing is one of the most important parts in the
logistics industry. As the industry is developing rapidly, automatic robot control
and scheduling pose unprecedented requirements over the real-time performance,
reliability, and concurrency of WLAN communication.
• The 802.11v and 802.11r protocols that can be used to accelerate roaming are
not mandatory. A large proportion of STAs do not support these protocols. As a
result, STAs need to scan all channels after disconnecting from the currently
associated BSS and before roaming. This is disastrous for continuous and delay-
sensitive network services.
• In a smart warehousing scenario, a WLAN network is deployed to report the
location and status information about AGVs and deliver operation control
instructions so as to implement automatic goods sorting and distribution. In this
scenario, the automatic navigation roaming optimization function is enabled so
that the WLAN network can correctly and reliably send running control
information to the target device in real time.
Key Technologies of Lossless Roaming: Efficient Lossless
Scanning (1)
⚫ Issues: Only channels 36 and 149
need to be scanned.
Roaming timeliness depends on the scanning
efficiency.
The duration for scanning all channels is too long
(100 ms x 13 or even 100 ms x 24).
34 Huawei Confidential
• Huawei implements lossless roaming for AGVs in the smart warehousing scenario
as follows:
• Huawei lossless roaming technology selects proper neighboring channels to be
scanned by STAs based on the network topology and sends the channel set
information to STAs. The resulting benefits include more timely and reliable
scanning results and much higher channel scanning efficiency of STAs.
• In addition, before a STA performs channel scanning for roaming handover, it
notifies the AP of the scanning initiation. The AP then buffers the packets
destined for the STA and delays packet transmission. This ensures that no packet
is lost during channel scanning.
Key Technologies of Lossless Roaming: Efficient Lossless
Scanning (2)
⚫ Issue:
When an AGV scans channels for roaming handover, the
AP continues sending packets to the AGV, causing packet
loss.
⚫ Optimization solution:
Scanning is completed.
Huawei solution: Before scanning channels for roaming 2 Resume packet
transmission.
handover, the AGV notifies its associated AP not to Start to scan channels
and notify the AP to stop 1
transmit packets to it. The AP then buffers the packets and
transmitting packets.
delays packet transmission. After channel canning is
completed, the STA instructs the AP to transmit packets to
it again. This ensures zero packet loss during channel
scanning.
35 Huawei Confidential
Key Technologies of Lossless Roaming: Lossless Roaming
Handover
⚫ Issue: WAC
After an AGV roams to another AP, its Start to buffer packets
previously associated AP discards the packets and send the buffered
packets to the WAC. 2 The WAC forwards
3 the buffered packets
that are not sent to the AGV before roaming.
to AP2.
⚫ Optimization solution:
AP1 (before roaming) AP2 (after roaming)
Before roaming, the AGV instructs the AP to
buffer packets destined for the AGV.
The AP starts to buffer packets.
After the AGV roams to another AP, the AP2 forwards the
4 buffered packets
buffered packets then are sent to the AGV. 1
to the AGV.
Instruct AP1 to buffer
packets destined for
the AGV.
36 Huawei Confidential
Key Technologies of Lossless Roaming: Enhanced Anti-
Interference
⚫ Issue:
Currently, applications on an AGV produce light traffic
volume, but pose high requirements over network
reliability. If the network environment deteriorates,
network reliability decreases, adversely affecting AGV
services.
Increase the priority
⚫ Optimization solution: of service packets
from BE to VO.
QoS optimization: Priorities of the uplink and downlink Decrease the data
transmission
AGV service packets are both increased to VO. speed upon
interference.
When the network environment deteriorates, the AMC
algorithm of the AGV's associated VAP reduces the data
transmission speed to improve the anti-interference
capability.
37 Huawei Confidential
Configuring Roaming Optimization in a Typical Smart
Warehousing Scenario
Enable automatic navigation roaming optimization.
Precautions:
• The 2.4 GHz radio is vulnerable to severe interference. Therefore, you are advised to use the automatic
navigation roaming optimization function on the 5 GHz radio.
• The automatic navigation roaming optimization function takes effect only when the forwarding mode is
tunnel forwarding.
38 Huawei Confidential
Healthcare Scenario: Agile Distributed SFN Roaming
Roaming
WAN
RU RU RU
Agile distributed Same Frequency Network (SFN) roaming
RU RU RU STA is unaware of the roaming process, and services are not interrupted.
39 Huawei Confidential
Beacon Beacon
Authentication Request
Authentication Request
Authentication
Authentication Response Response
Add a STA
association table. Key negotiation
41 Huawei Confidential
• STA access:
▫ All RUs broadcast Beacon frames to STAs using the public BSSID
automatically generated by the central AP based on the MAC address.
▫ A STA sends a Probe Request frame. After receiving the Probe Request
frame, all RUs respond with a Probe Response frame using the public BSSID.
▫ The central AP selects an RU with the optimal SNR to respond to the STA
with an Association Response. Within a specified period, the central AP
discards Association Request frames reported by other RUs. Subsequently,
only the selected RU communicates with the STA.
▫ The central AP reports the Association Request frame of the STA to the
WAC. Then the WAC adds STA information to the STA association table.
▫ The central AP, RU, and STA perform unicast and multicast key negotiation.
Agile Distributed SFN Roaming Implementation: Roaming
Handover
WAC Central AP HAP STA FAP
Roaming
decision
Roaming handover
42 Huawei Confidential
• Roaming handover:
▫ The HAP (RU with which the STA first associates) periodically reports the
STA's RSSI to the central AP. The FAP (RU to which the STA roams)
periodically reports the RSSI of neighbors to the central AP.
▫ The central AP selects the optimal RU as the FAP using the roaming
decision algorithm, and synchronizes STA information to the FAP. The
central AP checks the following handover conditions in sequence. If any of
the conditions is met, a roaming handover is triggered. If multiple RUs meet
the following three conditions, the RU with the highest RSSI is selected for
the roaming handover.
▪ The cumulative RSSI change value of the STA reaches the specified
threshold.
▪ The RSSI gap between the local RU and surrounding RUs reaches the
specified value.
Data Packet Forwarding on an Internal Agile Distributed
SFN
WAN Before roaming:
1. The STA sends service packets to RU1.
2. RU1 forwards the packets to the central AP.
WAC 3. The central AP forwards the packets to the upper-layer network
through the gateway for STAs.
After roaming:
1. The STA sends service packets to RU2.
2. RU2 forwards the packets to the central AP.
Central AP 3. The central AP forwards the packets to the upper-layer network
through the gateway for STAs.
RU1 RU2
43 Huawei Confidential
Data Packet Forwarding on an External Agile Distributed
SFN
WAN
Before roaming:
1. The STA sends service packets to RU1.
WAC 2. RU1 forwards the packets to the central AP.
3. The central AP forwards the packets to the upper-layer network
through the gateway for STAs.
After roaming:
1. The STA sends service packets to RU2.
2. RU2 forwards the packets to the central AP.
Central AP
3. The central AP forwards the packets to the upper-layer network
through the gateway for STAs.
RU1 RU2
44 Huawei Confidential
Configuring Agile Distributed SFN Roaming
Enable agile distributed SFN roaming
[WAC-wlan-view] vap-profile name profile-name
[WAC-wlan-vap-prof] sfn-roam enable
Precautions:
• If agile distributed SFN roaming is enabled on both 2.4 GHz and 5 GHz radios, you are advised to use different
SSIDs. Otherwise, STAs may switch radios, affecting user experience. The automatic navigation roaming
optimization function takes effect only when the forwarding mode is tunnel forwarding.
• Agile distributed SFN roaming can be enabled for only one VAP on a radio.
• After agile distributed SFN roaming is enabled on a radio, channel scanning, channel calibration, or smart
roaming cannot be configured on the radio.
• Agile distributed SFN roaming can only be configured based on AP groups instead of APs.
45 Huawei Confidential
Contents
46 Huawei Confidential
Troubleshooting a STA Roaming Failure (1)
⚫ Check why the STA fails to go online and offline to
WAN
determine whether the STA fails to access the network
or roam to another AP.
WAC1 WAC2
Step 1: Run the display station online-fail-record sta-mac
command on the WAC to check why the STA fails to go
online. Run the display station offline-record sta-mac
command on the WAC to check the STA going-offline
records.
Step 2: If the time recorded in the STA going-online failure
AP1 AP2 reason is the same as the time when the STA fails to roam,
SSID: Huawei SSID: Huawei bring the STA online on AP2. If the STA fails to go online,
rectify the fault based on the troubleshooting roadmap for
Roaming fails
a STA association failure. If the time recorded in the STA
STA STA
going-offline failure reason is the same as the time when
the STA fails to roam, the roaming check fails.
47 Huawei Confidential
Troubleshooting a STA Roaming Failure (2)
⚫ The following lists the possible causes of a STA's failure to roam from AP1 to AP2:
The security profile configuration of AP1 is different from that of AP2.
The STA initiates Layer 3 roaming, but Layer 3 roaming is disabled on the WAC.
If AP1 and AP2 are connected to different WACs, the inter-WAC roaming configuration may be incorrect or no
service VLAN has been created.
If the STA goes offline during roaming, the APs' signal coverage may be discontinuous or the power
configuration may be improper.
Signals with the same SSID from other vendors exist on the air interface.
The threshold for disconnecting weak-signal STAs during smart roaming is improper.
AP1 and AP2 are on different subnets, but Layer 2 roaming is configured. (In Layer 2 roaming mode, AP1 and
AP2 must belong to the same VLAN.)
48 Huawei Confidential
• If the time recorded in the STA going-offline failure reason is the same as the
time when the STA fails to roam, the roaming check fails. These are the possible
causes of a STA roaming failure.
Troubleshooting a STA Roaming Failure: Checking the
Security Profile Configuration
WAN
Check whether the security profile configuration is consistent on
AP1 and AP2.
WAC1 WAC2 Enter the security profile view. Configure a new key and ensure that
the same key is configured in the security profiles of AP1 and AP2.
AP1 AP2
SSID: Huawei SSID: Huawei
Roaming fails
STA STA
49 Huawei Confidential
Troubleshooting a STA Roaming Failure: Checking the Layer
3 Roaming Configuration
Check whether Layer 3 roaming is disabled.
SSID: Huawei SSID: Huawei 2. If the STA roams at Layer 3, check whether Layer 3 roaming is
50 Huawei Confidential
• Enter the view of the VAP profile bound to the AP group to which AP1 and AP2
belong respectively, and check whether Layer 3 roaming is disabled in the VAP
profile.
▫ If the STA initiates Layer 3 roaming but Layer 3 roaming is disabled, the
roaming fails.
▫ Depending on whether a STA roams within the same subnet, STA roaming
is categorized as Layer 2 and Layer 3 roaming.
▪ In some cases, two subnets with the same VLAN ID are on different
network segments. Based on the VLAN ID, the system may incorrectly
consider that STAs roaming between these two subnets roam at Layer
2. To prevent such an error, configure a roaming domain to determine
whether the STAs roam within the same subnet. STAs are considered
roaming at Layer 2 only when they roam within the same VLAN and
same roaming domain; otherwise, the STAs roam at Layer 3.
▪ Enter the view of the VAP profile bound to the AP group to which AP1
and AP2 belong respectively, and check whether Layer 3 roaming is
disabled in the VAP profile. If the STA initiates Layer 3 roaming but
Layer 3 roaming is disabled, the roaming fails.
Troubleshooting a STA Roaming Failure: Checking Whether
the VLAN Configuration Is Correct
WAN ⚫ Check whether the VLAN configuration is correct
before and after roaming.
WAC1 WAC2
The service VLAN must be correctly created before ad
after roaming. Especially for inter-WAC roaming, service
VLANs of AP1 and AP2 must be created on all WACs
involved in roaming.
If service data is forwarded in direct mode, all ports on the
link between AP1 and AP2 must allow packets from the
AP1 AP2 service VLAN to pass through and the service VLAN must
51 Huawei Confidential
Troubleshooting a STA Roaming Failure: Checking Whether
the Mobility Group Status Is Normal
If the STA roams between WACs, check whether the
WAN
mobility group status is normal.
<WAC> display mobility-group name roam
--------------------------------------------------------------------------------
WAC1 WAC2 AC ID State IP address
--------------------------------------------------------------------------------
1 normal 192.168.10.3
2 fault 192.168.10.4
--------------------------------------------------------------------------------
52 Huawei Confidential
Troubleshooting a STA Roaming Failure: Checking Whether
the APs' Signal Coverage Is Continuous
Internet
⚫ Check whether the signal coverage of the HAP and
FAP is continuous.
If the HAP and FAP are too far away from each other,
WAC
the STA may go offline and online again due to
discontinuous signal coverage, causing a roaming
failure.
HAP FAP
Use common tools such as the CloudCampus APP to
check the APs' signal coverage.
Roaming fails
If the APs' signal coverage is discontinuous, increase
the transmit power of the APs or add more APs to
STA ensure continuous signal coverage.
53 Huawei Confidential
Troubleshooting a STA Roaming Failure: Checking Whether
the APs' Transmit Power Is Proper
Internet
STA
54 Huawei Confidential
• If the transmit power is set to a small value, signal coverage holes may exist. In
this case, run the eirp command in the radio view to increase the transmit power.
• If the transmit power is set to a large value (for example, the full power), the
STA may associate with a remote AP, causing roaming insensitivity. In this case,
run the eirp command in the radio view to reduce the transmit power or enable
smart roaming.
Troubleshooting a STA Roaming Failure: Checking an
Unauthorized SSID
⚫ Check whether an unauthorized AP with the same SSID as an authorized SSID exists on the WLAN.
<WAC> display ap neighbor ap-id 0
Radio: Radio ID of AP
......
Uncontrol AP:
----------------------------------------------------------------------------------------------------------------------------
Radio BSSID Channel RSSI(dBm) Last Update Time SSID
-----------------------------------------------------------------------------------------------------------------------------
0 d0d0-4b22-df00 1 -50 2019-08-24/15:32:18
0 c4b8-b4f0-6980 1 -44 2019-08-24/15:31:06
0 10c1-72dd-12e0 11 -41 2019-08-24/15:28:27 roam
0 9c50-ee45-6240 1 -54 2019-08-24/15:32:06
-----------------------------------------------------------------------------------------------------------------------------
Total: 4
55 Huawei Confidential
• Check whether an unauthorized AP with the same SSID exists on the WLAN. If so,
disable the SSID of the unauthorized AP.
Troubleshooting a STA Roaming Failure: Checking Whether
the Fault Is Rectified
⚫
Move the STA between two APs and run the display station roam-track command to check the STA's roaming track. If the roaming
track displayed in the command output is normal, the fault is rectified. If the roaming still fails, collect system logs and diagnostic
logs generated during the roaming, collect fault diagnosis information using the commands listed in the following table, and contact
Huawei technical support personnel.
Command Description
[WAC] trace enable Display trace information about the STA during the going-online
[WAC] trace object mac-address or roaming process.
[WAC] display station online-fail-record
Display the STA going-online or going-offline cause.
[WAC] display station offline-record
[WAC-diagnose] display wlan wsta block-sta-number all
[WAC-diagnose] display wlan wsta online-statistics
Display the STA going-online or going-offline cause code.
[WAC-diagnose] display wlan wsta online-fail-record by-mac
[WAC-diagnose] display wlan wsta peak-statistics
Display one-click diagnosis information on the WAC, including
[WAC-diagnose] display diagnostic-information the system version, patch version, current configuration, saved
configuration, exception information, and some logs.
56 Huawei Confidential
Quiz
57 Huawei Confidential
• Subnets with different VLAN IDs reside on different network segments. When
STAs roam between these subnets, they roam at Layer 3. If the two subnets have
the same VLAN ID but different roaming domains, the STAs also roam at Layer 3.
Summary
⚫ This chapter describes the network architecture of WLAN roaming and the
impacts of roaming on services. Roaming optimization modes, such as
802.11r roaming, smart roaming, and agile distributed SFN roaming,
enable smooth, fast roaming handovers and minimize the packet loss rate.
In this way, service data flows are transmitted at a low latency and users
are unaware of the service interruptions during roaming, improving user
experience.
58 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
• The following policies are available to process a redundant 2.4 GHz radio:
• If the channels of APs in hotspot areas interfere with those of other APs after the
frequency bandwidth is increased, the DBS algorithm reduces the frequency
bandwidth of the APs in hotspot areas to mitigate interference on the network.
• After global radio calibration is enabled, the WAC requests APs to start neighbor
probing.
• The APs periodically perform neighbor probing and report neighbor information
to the WAC.
• After the WAC receives neighbor information from all of the APs, it uses global
radio calibration algorithms to allocate channels, bandwidth, and power to the
APs.
▫ Global calibration algorithms include the DCA, DBS, DFA, and TPC
algorithms.
• The WAC delivers calibration results to the APs. After the WAC performs global
radio calibration for the first time, it starts the next global radio calibration until
it receives new neighbor information from all APs. The WAC continuously
performs global radio calibration for multiple times to achieve the optimal and
accurate calibration results.
• Typically, automatic radio calibration takes 20 minutes in total, with each round
taking 5 minutes.
• Neighbor probing enables APs to detect each other. Two neighbor probing
modes are available.
• After channel calibration is complete, the DCA algorithm marks APs in this
calibration group as calibrated APs and continuously performs channel
calibration for the next calibration group, until the channels of all the APs in the
calibration set are calibrated.
• The minimum and maximum power values that can be adjusted through TPC are
configured to ensure that the adjustable transmit power of AP0 is proper,
minimizing signal interference and meeting radio coverage requirements. If the
adjustable power of AP0 is less than the minimum power value that can be
adjusted through TPC, the power of AP0 is adjusted based on the minimum value.
If the adjustable power of AP0 is greater than the maximum power value that
can be adjusted through TPC, the power of AP0 is adjusted based on the
maximum value. If the adjustable power of AP0 is between the minimum and
maximum power values, the power of AP0 is adjusted based on the calculated
value.
• If the adjustable power of AP0 is greater than the maximum power specified by
local laws and regulations, the power of AP0 is adjusted based on the maximum
power specified by local laws and regulations. Otherwise, the power of AP0 is
adjusted based on the calculated value.
• Both TPC and DCA algorithms are used for automatic radio calibration, but they
are independent of each other. The TPC algorithm determines the coverage
boundary of an AP based on its distances from neighboring APs and then adjusts
the transmit power of the AP. TPC is irrelevant to the DCA result and depends
only on the distance between APs.
• Redundant radio: refers to a radio that still causes interference to surrounding
APs after power adjustment.
• Radio calibration is not applicable to scenarios where APs cannot detect each
other, for example, APs use directional antennas, are far from each other, or
have obstacles between them.
▫ When the number of access STAs on an AP exceeds the start threshold for
5G-prior access, the AP preferentially connects a new STA to the 5 GHz
radio.
▫ When receiving a Probe Request frame from a new STA, the AP parses
information about the frequency bands supported by the STA from the
Probe Request frame. If the STA supports both 2.4 GHz and 5 GHz
frequency bands, the AP suppresses Probe Response frames on the 2.4 GHz
radio and steers STAs to the 5 GHz radio.
▫ When the number of access STAs on an AP reaches the start threshold for
5G-prior access and the percentage of access STAs on the 5 GHz radio
exceeds the specified percentage threshold, a new STA freely selects a
frequency band.
• Load balancing can be implemented among APs only when the APs are
connected to the same WAC, and all these APs can be discovered by STAs.
• When implementing dynamic load balancing, an AP calculates the load
percentage of each radio in a load balancing group using the formula: Load
percentage of a radio = (Number of access STAs on the radio/Maximum number
of STAs allowed on the radio) x 100%. The WAC then compares load percentage
values of all radios in the load balancing group and obtains the minimum load
percentage value. When a new STA requests to access a radio, the AP calculates
the difference between the radio's load percentage and the minimum load
percentage value, and compares the load difference with the load difference
threshold (configured using a command). If the load difference is smaller than
the threshold, the load is balanced. Otherwise, the load is unbalanced and the
load balancing mechanism is triggered.
• Depending on whether a load balancing group needs to be manually created,
load balancing is classified as either static or dynamic load balancing.
• Static load balancing: APs providing the same services are manually added to a
static load balancing group. APs in the group periodically report information
about associated STAs to the WAC, and the WAC periodically distributes user
traffic among the APs based on the received STA information.
• Static load balancing can be implemented when the following conditions are
met:
▫ The APs have only one radio (2.4 GHz or 5 GHz radio). For APs with
multiple radios, traffic is load balanced among radios of the APs working
on the same frequency band.
▫ For example, as shown in the figure above, four STAs (STA1 to STA4) are
associated with AP1 and one STA (STA5) is associated with AP2. The start
threshold for load balancing is set to 5. AP1 and AP2 each allow access of
10 STAs at most and the load difference threshold is set to 5%.
• Spectrum analysis:
• CCA:
• BSS coloring:
▫ When detecting 802.11ax signals, STAs can identify the signals from an
overlapping basic service set (OBSS) based on the BSS color bit or MAC
address, and then determine air interface collisions and perform
interference management according to related information.
• The host maintains a training state machine, delivers training parameters,
processes training data, selects antennas after training, and delivers antenna
configurations. The target receives training parameters from the host, sends
training packets, reports training results, and enables antenna configurations to
take effect.
• In MU-MIMO scenarios, after multiple STAs are paired, the antenna mode in
multi-user (MU) mode is selected based on the antenna mode selected in single-
user (SU) mode.
• The AP reports the spectrum data to the spectrum drawing server directly or
through the WAC.
▫ Before sending data to an AP, a STA detects the channel status. When the
channel is idle, the STA sends a data frame after the Distributed Inter-
Frame Space (DIFS) times out and waits for acknowledgment. The data
frame contains its NAV information. After receiving the data frame, other
STAs update their NAV information, indicating that the channel is busy and
that data transmission will be delayed.
▫ The AP receives the data frame, waits until the Short Interframe Space
(SIFS) times out, and sends an ACK frame to the STA. After the ACK frame
transmission is complete, the channel becomes idle. After the DIFS times
out, the STAs use the exponential backoff algorithm to preempt the
channel. The STA of which the backoff counter is first reduced to 0 starts to
send data frames.
• InterFrame Space (IFS): According to the 802.11 protocol, after sending a data
frame, a STA must wait until the IFS times out to send the next data frame. The
IFS length depends on the data frame type. Higher-priority data frames are sent
earlier than lower-priority data frames. There are three IFS types:
▫ Short IFS (SIFS): refers to the time interval between a data frame and its
ACK frame. The SIFS is used for high-priority transmissions, such as
transmissions of ACK and CTS frames.
▫ PCF IFS (PIFS): The PIFS length is the SIFS plus the slot time. PCF-enabled
access points wait for the PIFS to occupy the wireless medium. If a STA
accesses a channel when the slot time starts, other STAs in the BSS detect
that the channel is busy.
▫ DCF IFS (DIFS): The DIFS length is the PIFS plus the slot time. Data and
management frames are transmitted at the DIFS interval.
• ECWmax ≤ Backoff time ≥ ECWmin.
▫ Normal ACK: The receiver must return an ACK frame each time it receives a
unicast packet.
▫ No ACK: The receiver does not need to return ACK frames after receiving
packets. This policy is applicable to environments with high communication
quality and little interference.
▫ If the communication quality is poor, the no ACK policy may cause more
packets to be lost. Therefore, it is not recommended.
• User preference (UP): represents the priority of a 802.11 packet. The UP is
contained in the QoS field of the MAC header in a 802.11 packet. The UP ranges
from 0 to 7. WMM defines the mappings between ACs and UPs. There are four
ACs, each of which maps to two UPs. An AP determines the AC of a data packet
based on the UP of the data packet, and then forwards the data packet
according to the AC priority.
• Among the four ACs, a higher-priority AC has a higher chance to occupy the
channel than a lower-priority AC. In this way, differentiated services are provided
for different ACs.
• Generally, voice and video packets in video conferences are AC_VO and AC_VI
packets respectively, and QQ voice and video packets are AC_BE packets.
• In the uplink direction, a STA converts 802.3 packets into 802.11 packets and
sends the packets through a wireless network adapter. After receiving 802.11
packets from the STA, an AP performs priority mapping for the 802.11 packets as
follows:
• In the downlink direction, the WAC forwards 802.3 packets received from the
Internet to the AP directly or through a tunnel. After receiving the 802.3 packets,
the AP maps the DSCP or 802.1p priorities of the 802.3 packets to UPs of 802.11
packets, and then sends the packets to the STA.
• An AP preferentially schedules channel resources for the user that occupies the
channel for the shortest time. In this way, each user is assigned equal time to
occupy the channel, ensuring fairness in channel usage.
• To prevent the first access users from failing to occupy the channel to transmit
data, the AP periodically clears all users' channel occupation time. In this way, all
access users have the same channel occupation weight.
• After WMM is enabled on an AP and STAs, user packets are scheduled based on
their types (service types include VI, VO, BE, and BK). For example, if one user
transmits VI packets and another user transmits VO packets, airtime fair
scheduling is not performed for the two users.
• If multiple users transmit different types of packets, airtime fair scheduling does
not take effect. For example, two users perform packet transmission: one
transmits VI packets and the other transmits VO packets. In this case, airtime fair
scheduling is not performed for the two users.
• The system analyzes service flows passing through a device, and compares the
analysis result with the signature database loaded on the device. By detecting
signatures in data packets, the system can identify applications and then
implement refined QoS policy control for voice and video applications based on
the identification result. This improves communication quality for voice and video
services.
• The configuration in the 5G radio profile wlan-radio5g is similar and is not
described here.
• Verify the configuration.
▫ Run the display ssid-profile name wlan-net command on the WAC to check
the EDCA parameter settings on STAs in the SSID profile wlan-net. The
EDCA parameter priorities of AC_VI and AC_VO packets are higher than
those of AC_BE and AC_BK packets. Therefore, voice and video services can
preferentially use wireless channels.
▫ Run the display rrm-profile name wlan-rrm command on the WAC. The
command output shows that airtime fair scheduling has been enabled in
the RRM profile. Therefore, STAs on the network can fairly use network
bandwidth.
• Verify the configuration.
▪ A WAC identifies a user as a VIP user if the user belongs to a VIP user
group. The priority field is added to the user authorization structure.
After users are added to a VIP user group and the authorization
information is delivered to the VIP user group, users in the VIP user
group inherit the priority of the VIP user group.
• In each packet sending mode, the calculated weights are sorted in descending
order. The AP selects one user (in SU mode) or multiple users (in MU mode) with
the highest weight to generate a user list.
• Broadcast is implemented between a source IP host and all the other IP hosts on
a network. All hosts can receive data from the source host, regardless of whether
they need the data.
▫ The IPv4 address space is divided into five classes: Class A, B, C, D, and E.
Class D addresses are IPv4 multicast addresses, ranging from 224.0.0.0 to
239.255.255.255. These addresses identify multicast groups and can only be
used as destination addresses of multicast packets but not source addresses.
▫ On the network layer, all hosts of a multicast group can identify the same
IPv4 multicast group address. A host can receive multicast packets destined
for a multicast group address once it joins the group.
• The first four bits of an IPv4 multicast address are fixed as 1110, mapping the
leftmost 25 bits of a multicast MAC address. Among the last 28 bits, only 23 bits
are mapped to a MAC address, and the other 5 bits are lost. As a result, 32 IPv4
multicast addresses are mapped to the same MAC address. For example,
multicast IP addresses 224.0.1.1, 224.128.1.1, 225.0.1.1, and 239.128.1.1 are all
mapped to multicast MAC address 01-00-5e-00-01-01. Address conflicts must be
considered in address assignment.
• IETF believes that this will not incur great impact because there is a very low
probability that two or more group addresses in the same LAN are mapped to
the same MAC address.
• A multicast MAC address identifies a group of devices. The rightmost bit of the
first byte in a multicast MAC address is 1, for example, in the MAC address 0100-
5e-00ab.
• A multicast MAC address identifies a group of devices that join the same
multicast group. These devices listen to the data frames whose destination MAC
addresses are the multicast MAC address. Only a unicast MAC address can be
assigned to an Ethernet interface, and a multicast or broadcast MAC address
cannot be assigned to any Ethernet interface. In other words, the two types of
MAC address cannot be used as the source MAC address of a data frame, but can
only be used as the destination MAC address.
• Source: indicates the sender of multicast traffic, such as a multimedia server. A
multicast source does not need to run any multicast protocol, but only needs to
send out multicast data.
• Multicast router: is a network device that supports multicast and runs a multicast
protocol. In fact, not only routers but also switches and firewalls (depending on
the device model) support multicast.
• IGMP is a protocol in the TCP/IP protocol suite that manages IP multicast group
members, and sets up and maintains multicast group memberships between
receivers and their directly connected multicast routers.
• Unicast packet forwarding uses a one-to-one model. In this model, a unicast
router sends an IP packet to its destination, without the need to know the source
address of the packet. Multicast data, on the other hand, is generated by a
multicast source and sent to a group of receivers. A multicast router distributes
packets from the source to the receivers. Then, how does a multicast router know
where to forward multicast data, which receivers need the multicast traffic, what
is the path along which multicast traffic is transmitted? To obtain this
information, a router must run multicast routing protocols.
• Port isolation can be used together with the proxy ARP function. In some
scenarios, data exchanged between terminals in the same VLAN needs to be
forwarded by the upper-layer device instead of the access switch, so that traffic
management and control policies can be deployed on the upper-layer device. This
transmission mode is called centralized forwarding, in which port isolation is
configured on all downstream Layer 2 devices, so proxy ARP must be configured
on the core switch that functions as the gateway. Typically, intra-VLAN proxy
ARP is used in the centralized forwarding scenario.
• Example for configuring multicast packet suppression in tunnel forwarding mode:
• [WAC] wlan
[WAC-wlan-view] traffic-profile name test
[WAC-wlan-traffic-prof-test] traffic-optimize multicast-suppression packets 100
//Set the rate limit to 100 pps for multicast packets. If multicast services are
configured, it is recommended that you configure the rate limit based on the
service traffic.
• Zero-configuration networking is widely used in home wireless networks and
enterprise office networks. It allows network devices to automatically obtain IP
addresses, resolve domain names, and discover services, without manual
configuration.
• Bonjour-capable service provider devices (such as Apple TV) advertise their
available services using a multicast address (IPv4 address 224.0.0.251). User
terminals (such as iPhone and iPad) send mDNS request packets with the
destination multicast address 224.0.0.251 to request available services on the
local network. In this way, Bonjour implements service sharing while allowing
terminals to easily access service resources.
• In the mDNS gateway solution, the service provider devices must be located on
the same network segment as the WAC working as the mDNS gateway. If the
WAC connects to service provider devices or terminals across network
segments — that is, the switch and WAC are connected over a Layer 3 network,
then mDNS packets in VLAN 10 and VLAN 20 cannot be forwarded by the switch
to the mDNS gateway. Therefore, the mDNS gateway cannot record services
provided in VLAN 10 and VLAN 20. To address this problem, the mDNS relay can
be deployed on the switch to discover services across network segments.
• Service provider devices advertise locally available services to the mDNS gateway,
so that the mDNS gateway can record information about all available services on
the network. In the information, the host name identifies the service provider
device, and the service name identifies the service that a device can provide and
records the service type.
• After a service provider device is powered on, it automatically generates a host
name and sends an mDNS request packet with the destination multicast address
being 224.0.0.251 to check whether the host name is unique on the network.
After receiving the mDNS request packet, the mDNS gateway queries its local
host name list. If the host name is found in the host name list, the host name has
been used by another service provider device, so the mDNS gateway sends a
response packet indicating a host name conflict to the service provider device.
After receiving the packet, the service provider device generates a new host name
and checks whether the host name is unique again. If no response packet is
received from the mDNS gateway within the detection period, the host name is
unique. If the host name conflict persists within the detection period, the service
provider device continues to send an mDNS request packet in the next detection
period.
• The service provider device multicasts an mDNS request packet to advertise its
host name and IP address. After receiving the mDNS request packet, the mDNS
gateway records the host name and IP address of the service provider device.
• A service provider device sends an mDNS request packet with the destination
multicast address being 224.0.0.251 to check whether the service name is unique
on the network. After receiving the mDNS request packet, the mDNS gateway
queries its local service name list. If the service name is found in the service name
list, the service name has been used by another service provider device, so the
mDNS gateway sends a response packet indicating a service name conflict to the
service provider device. After receiving the packet, the service provider device
generates a new service name and checks whether the service name is unique
again. If no response packet is received from the mDNS gateway within the
detection period, the service name is unique.
• In this phase, when an mDNS relay is deployed, the process of sending request
packets to the mDNS gateway is similar to the process in which an mDNS service
provider advertises its mDNS services.
• After the mDNS gateway receives the query request from the terminal, it
searches for the requested service in the online service list and domain name
table, and returns the search result to the mDNS relay.
• The mDNS gateway sends a unicast UDP packet in reply to the terminal's request
packet. In the unicast UDP packet, the source IP address (Src IP) is the gateway IP
address, the destination IP address (Dst IP) is the relay IP address, and the
destination port number (Dest Port) is 5353.
• The mDNS relay has a table recording the mappings between terminal IP
addresses, terminal VLANs, and transaction IDs. After receiving the response
packet from the mDNS gateway, the mDNS relay searches the mapping table for
information about the terminal that sends the corresponding request packet
based on the transaction ID in the response packet, and modifies the response
packet as follows: It changes the destination address (Dest IP) to 224.0.0.251,
source IP address (Src IP) to the relay IP address, transaction ID to 0, and TTL to
255. After modifying the response packet, the mDNS relay multicasts the
response packet to the VLANs to which the terminal and service provider belong,
and then deletes the mapping entries.
• In a VLAN with only mDNS service providers that have started before network
connection, the service providers do not proactively notify the mDNS gateway of
the services that they provide. Instead, the mDNS relay or gateway needs to
periodically detect available services, and update its service list and the host
status of service providers.
• After an mDNS gateway is configured on a network and the clients access the
network, the clients can detect all service provider devices connected to this
mDNS gateway, meaning that the clients and service provider devices cannot be
precisely matched. For example, when a mobile phone accesses a network
through an AP, the mobile phone can discover both the Apple TV connected to
this AP and the Apple TVs connected to the other APs. It is not easy for the
mobile phone to distinguish between these Apple TVs, posing security risks.
• IGMP snooping, multicast-to-unicast conversion, multicast CAC, multicast packet
suppression, etc.
WLAN Security and Defense
Foreword
⚫ WLANs use radio waves instead of network cables to transmit data, and
are therefore easier to deploy. On the other hand, the particularity of radio
waves results in more prominent security issues for WLANs.
⚫ The course briefly describes WLAN security threats and security solutions,
and details WLAN security solutions in terms of the management plane,
control plane, and forwarding plane.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
3 Huawei Confidential
WLAN Security Objectives
4 Huawei Confidential
Common WLAN Security Threats
Security MAC address An unauthorized user uses a tool to capture data packets, obtains
spoofing
threats a valid MAC address, and launches MAC address spoofing attacks.
5 Huawei Confidential
WLAN Network Architecture and Security Solution (1)
1. Content: Focus on the security of applications and service data of management
plane security
Management
users, that is, the security of management information.
Control plane
1. Content: Focus on the security of various protocols running on devices.
security
2. Threats: CPU overload caused by ARP, ICMP, TCP, UDP, or flooding.
plane security
1. Content: focus on data security on forwarding paths to prevent attacks from
6 Huawei Confidential
▫ Forwarding plane: WLAN devices use the destination MAC and IP addresses
of packets to search for routes for forwarding the packets. Security
measures must be taken in the forwarding routes to prevent attacks on
WLAN devices and spreading of attack traffic over the IP network.
• By isolating the control, management, and forwarding planes, WLAN devices can
ensure that attacks on any of the planes do not affect other planes.
Contents
7 Huawei Confidential
Security Protection Capabilities of the WLAN
Management Plane
⚫ To ensure proper running of operating systems and management applications,
the management plane provides the following security protection capabilities:
WLAN device login security
AAA user management security
SNMP device management security
Prohibition of insecure management protocols from accessing the service plane
Information center security
AP management security - CAPWAP control tunnel encryption
8 Huawei Confidential
WLAN Device Login Security
Login through the console port
9 Huawei Confidential
Campus
network Attack behavior
WAC
access rights by traversing key information, such as user names
and passwords.
Security policy
11 Huawei Confidential
• Enable local account locking. Set the authentication retry interval to 6 minutes,
maximum number of consecutive incorrect password attempts to 4, and account
locking period to 6 minutes.
• Then users who fail in authentication for the maximum number of times will be
blocked for a period, decreasing the attempt success rate and hardening WLAN
device security.
SNMP Device Management Security
Attacker Attack behavior
• An attacker listens on the communication between the NMS and SNMP agents to
WAC obtain information, such as user names, passwords, and community names,
therefore gaining unauthorized rights.
SNMP server
• An attacker intercepts and then reorders, delays, or retransmits SNMP messages
to affect normal operations, until obtaining unauthorized access rights.
Security policy
12 Huawei Confidential
• SNMP is a protocol used to manage network devices and has three versions:
SNMPv1, SNMPv2c, and SNMPv3.
• SNMPv1 and SNMPv2c have low security, and support ACL and view-based
access control model (VACM). Associate an ACL and a MIB view with a
community name to limit the NMSs and nodes that can access a WLAN device,
enhancing system security to some extent.
• SNMPv3 supports the User-based Security Model (USM), Message Digest 5
(MD5) and Secure Hash Algorithm (SHA) authentication, and Data Encryption
Standard (DES) and Advanced Encryption Standard (AES) algorithms. By
authenticating and encrypting communication data, SNMPv3 resolves security
issues, such as message forgery, tampering, and leakage.
Security policy
Service interface
WAC
• Service interfaces on WLAN devices support management
Management
Ethernet port protocols by default, and management protocols allow for
login to the WLAN devices through a dedicated management
Mgmt
network Ethernet port. If the customer network has planned a
management plane that manages devices only through the
management Ethernet port, you can prohibit device login using
management protocols over service interfaces.
Online STA Attacker
13 Huawei Confidential
• To prohibit service plane access using management protocols for a WLAN device
with a dedicated management Ethernet port, run the deny command in the
attack defense policy view to set the action on Telnet, SSH, HTTP, SNMP, FTP,
and ping (ICMP) packets sent to the CPU to discard.
▫ <HUAWEI> system-view
▫ [HUAWEI] cpu-defend-policy 1
Information Center Security
Attack behavior
Security policy
14 Huawei Confidential
AP Management Security - CAPWAP Control Tunnel
Encryption
Security risk
Security policy
15 Huawei Confidential
• Enable DTLS encryption for CAPWAP control tunnels and set the pre-shared key
for DTLS encryption to huawei@123.
▫ <HUAWEI> system-view
16 Huawei Confidential
Common Configurations for Security Protection on the
WLAN Management Plane (2)
WLAN device login security: login through SSH WLAN device login security: login through the web system
[WAC] stelnet server enable [WAC] http server enable
[WAC] ssh server port 55535 //Change the port number to a [WAC] http server port 55536 //Change the port number to a non-
non-well-known port number. well-known port number.
[WAC] acl 2000 [WAC] acl 2000
[WACI-acl-basic-2000] rule permit source 10.1.1.1 0 [WAC-acl-basic-2000] rule 5 permit source 10.10.10.1 0
[WAC] user-interface vty 14 //Configure an ACL to allow only the device with the source IP
[WAC-ui-vty14] acl 2000 inbound address of 10.10.10.1 to log in to the WLAN device through HTTP.
//Configure an ACL to allow only users with the source IP address of [WAC] http acl 2000
10.1.1.1 to log in to the WLAN device. //Configure the HTTP service to reference the ACL.
//To prevent users with an IP address or on an IP address segment
from logging in to a WLAN device, use the inbound parameter. To
prevent a logged-in user from logging in to other WLAN devices, use
the outbound parameter.
17 Huawei Confidential
Common Configurations for Security Protection on the
WLAN Management Plane (3)
AAA user management: Configure the maximum number of consecutive authentication failures and the
authentication retry interval.
[WAC] aaa
[WAC-aaa] local-aaa-user wrong-password retry-interval 6 retry-time 4 block-time 6
//By default, the local account locking function is enabled, the authentication retry interval is 5 minutes, the maximum numb er of
consecutive authentication failures is 3, and the account locking period is 5 minutes.
Configure a WLAN device to send information to a log host with the IPv4 address of 192.168.2.2. Configure
the device to transmit information in TCP mode and encrypt packets using the SSL policy named huawei123.
[WAC] ssl policy huawei123 type client
[WAC-ssl-policy-huawei123] quit
[WAC] info-center loghost 192.168.2.2 transport tcp ssl-policy huawei123
Enable DTLS encryption for CAPWAP control tunnels and set the pre-shared key for DTLS encryption to huawei@123.
[WAC] capwap dtls psk huawei@123
[WAC] capwap dtls control-link encrypt
18 Huawei Confidential
Contents
19 Huawei Confidential
WLAN Control Plane Security
⚫ Huawei WLAN provides the following protection measures to protect the air
interface against various security threats:
Wireless user access security
WIDS/WIPS
URL filtering
Intrusion detection
Antivirus
20 Huawei Confidential
• Attacks on the control plane are diversified, and so are protection measures. In
addition to the protection measures listed on this slide, there are also local attack
defense, attack defense based on service and management isolation, device
attack defense, ARP spoofing attack defense, ARP flood attack defense, bogus
DHCP server defense, DHCP flood attack defense, routing protocol security, and
multicast security. This course focuses only on major control plane security
technologies.
Wireless User Access Security: WPA/WPA2
• For some small and medium-sized WLANs, deploying a dedicated authentication server is costly and
difficult to maintain.
• WPA/WPA2 provides a simplified mode, that is, WPA/WPA2 pre-shared key (WPA/WPA2-PSK) mode.
• No dedicated authentication server is required. Only a pre-shared key needs to be set on each WLAN
node (such as the WLAN server, wireless router, and network adapter). A client can access the
WPA/WPA2
WLAN if its pre-shared key is the same as that configured on the WLAN device.
Personal
• The pre-shared key is not used for encryption; therefore, it will not bring security risks like the WEP
shared key authentication.
WPA/WPA2
WPA/WPA2 • The RADIUS server and Extensible Authentication Protocol (EAP) are used for authentication.
Enterprise • Users provide authentication information, including the user name and password, and are
authenticated by an authentication server (generally a RADIUS server).
21 Huawei Confidential
• WEP shared key authentication uses the Rivest Cipher 4 (RC4) symmetric stream
cipher to encrypt data. Therefore, the same static key must be preconfigured on
the server and clients. Both the encryption mechanism and algorithm, however,
are prone to security threats. The Wi-Fi Alliance developed WPA to overcome
WEP defects. In addition to the RC4 algorithm, WPA defines the Temporal Key
Integrity Protocol (TKIP) encryption algorithm on the basis of WEP, uses the
802.1X identity authentication framework, and supports Extensible Authentication
Protocol-Protected Extensible Authentication Protocol (EAP-PEAP) and EAP-
Transport Layer Security (EAP-TLS) authentication. Subsequent to WPA, IEEE
802.11i defined WPA2, which uses a more secure encryption algorithm: Counter
Mode with CBC-MAC Protocol (CCMP).
• Both WPA and WPA2 support 802.1X access authentication and the TKIP or
CCMP encryption algorithm, giving better compatibility. With almost the same
security level, they mainly differ in the protocol packet format.
• The WPA/WPA2 security policy involves four phases: link authentication, access
authentication, key negotiation, and data encryption. Two authentication
methods are available: WPA/WPA2-PSK authentication and WPA/WPA2-802.1X
authentication.
• Two authentication methods are available: WPA/WPA2-PSK authentication and
WPA/WPA2-802.1X authentication.
▫ WPA/WPA2-PSK authentication: Both WPA and WPA2 support PSK
authentication and the TKIP or AES encryption algorithm. They have almost
the same security level and mainly differ in the protocol packet format.
WPA/WPA2-PSK authentication applies to individual, home, and Small
Office and Home Office (SOHO) networks that do not require high security.
No authentication server is required. If STAs support only WEP encryption,
PSK+TKIP can be implemented without a hardware upgrade, whereas
PSK+AES may require a hardware upgrade.
▫ WPA/WPA2-802.1X authentication: Both WPA and WPA2 support 802.1X
authentication and the TKIP or AES encryption algorithm. They have almost
the same security level and mainly differ in the protocol packet format.
WPA/WPA2-802.1X authentication applies to networks that require high
security, such as enterprise networks. An independent authentication server
is required. If STAs support only WEP encryption, 802.1X+TKIP can be
implemented without a hardware upgrade, whereas 802.1X+AES may
require a hardware upgrade.
• STAs vary and support different authentication and encryption modes. To enable
various types of STAs to access the network and facilitate management,
configure both WPA and WPA2. If the security policy is WPA-WPA2, STAs
supporting WPA or WPA2 can be authenticated. If the encryption mode is TKIP-
AES, any STAs supporting TKIP or AES can encrypt service packets.
WPA/WPA2 Key Overview
⚫ 802.11i defines two key hierarchies: pairwise key hierarchy and group key hierarchy. The
pairwise key hierarchy protects unicast data exchanged between STAs and APs. The
group key hierarchy protects broadcast or multicast data exchanged between STAs and
APs.
⚫ During key negotiation, a pairwise transient key (PTK) and a group temporal key (GTK)
are generated based on the pairwise master key (PMK) generated in access
authentication.
PMK: a pre-shared key configured for generating a PTK. It is not used for data encryption or
decryption.
PTK: encrypts unicast packets.
GTK: encrypts multicast and broadcast packets.
23 Huawei Confidential
WPA/WPA2 Key Negotiation
STA AP WAC
SSID
24 Huawei Confidential
WLAN Security Encryption
⚫ After a WLAN user is authenticated and authorized to access a WLAN, the WLAN must use a mechanism to
protect data of the user from tampering and eavesdropping. Encryption is the most commonly used
mechanism, which ensures that only devices with correct keys can decrypt received packets.
⚫ WLAN encryption mode:
Temporal Key Integrity Protocol (TKIP)
Counter Mode with CBC-MAC Protocol (CCMP)
⚫ WPA uses the TKIP encryption algorithm, provides the key reset mechanism, and increases the valid key
length, which greatly compensates for the weakness of WEP.
⚫ WPA2 uses the CCMP encryption mechanism, which uses the Advanced Encryption Standard (AES) encryption
algorithm. AES is a symmetric block encryption technology and is more difficult to crack than TKIP.
⚫ Both WPA and WPA2 can use the TKIP or AES encryption algorithm, ensuring better compatibility. The two
protocols provide almost the same security level.
25 Huawei Confidential
• As wireless networks use open transmission media, data will face greater risks if
no encryption mechanism is used on transmission links. Anyone who has an
appropriate tool can intercept unprotected data transmitted on open
transmission media.
• Major objectives of communication security are confidentiality, integrity, and
authentication. When data is transmitted on a network, data protection protocols
must help network administrators achieve these objectives.
26 Huawei Confidential
Wireless User Access Security: WPA3
Open: no encryption WEP: weak encryption WPA: strong encryption WPA2: strong encryption WPA3: strongest encryption
• Introduced in 1999 • Introduced in 2003 • Introduced in 2004 • Currently the most secure
• Cracked in 2001 • Replaced by WPA2 in 2004 • Cracked in October 2017 • Meeting high security
requirements
27 Huawei Confidential
• Compared with WPA and WPA2, WPA3 has the following improvements:
▫ WPA3 introduces Simultaneous Authentication of Equals (SAE), which is a
more secure handshake protocol. Theoretically, SAE provides forward
secrecy. Even if an attacker knows the password on a network, the attacker
cannot decrypt the obtained traffic. A WPA2 network, however, is
vulnerable to password cracking attacks. That is, an attacker can decrypt
obtained traffic using the password. Therefore, the use of SAE makes WPA3
much more secure than earlier WPA standards.
▫ The algorithm strength is enhanced and Suite B cryptography is supported.
That is, WPA3 supports AES-GCM with a 256-bit key and elliptic curve
cryptography with a 384-bit curve.
• Based on application scenarios and security requirements, there are two WPA3
modes: WPA3-Enterprise and WPA3-Personal, that is, WPA3-802.1X and WPA3-
SAE.
• WPA3-Personal introduces the SAE handshake protocol. Compared with
WPA/WPA2-PSK authentication, WPA3-SAE can effectively defend against offline
dictionary attacks and mitigate brute force cracking posed by weak passwords. In
addition, the SAE handshake protocol provides forward secrecy. Even if an
attacker knows the password on the network, the attacker cannot decrypt the
obtained traffic, greatly improving the security of a WPA3-Personal network.
• WPA3-Enterprise still uses the authentication system of WPA2-Enterprise and
uses the Extensible Authentication Protocol (EAP) for identity authentication.
However, WPA3 enhances the algorithm strength by replacing the original
cryptography suite with the Commercial National Security Algorithm (CNSA)
Suite defined by the Federal Security Service (FSS). The CNSA Suite has a
powerful encryption algorithm and applies to scenarios with extremely high
security requirements.
• WPA3-Enterprise supports Suite B, which uses 192-bit minimum-strength security
and supports Galois Counter Mode Protocol-256 (GCMP-256), Galois Message
Authentication Code-256 (GMAC-256), and SHA-384.
• WPA2 is still widely used. To enable WPA3-incapable STAs to access a WPA3-
enabled network, the Wi-Fi Alliance defines the WPA3 transition mode. That is,
WPA3 and WPA2 can coexist for a period of time in the future. This mode applies
only to WPA3-Personal.
• In V200R019C00, WACs and APs support WPA3 authentication. In V200R019C10,
only WACs support WPA3 authentication.
Wireless User Access Security: STA Blacklist and Whitelist
The STA blacklist and whitelist function allows you to specify conditions
for filtering STAs to control their access to a WLAN.
29 Huawei Confidential
• If the STA whitelist or blacklist function is enabled but the whitelist or blacklist is
empty, all STAs can connect to the WLAN.
• Multiple STA whitelist and blacklist profiles can be configured on a WLAN device
and applied to different virtual access point (VAP) profiles or AP system profiles.
In a VAP profile or an AP system profile, either the STA whitelist profile or STA
blacklist profile takes effect at one time.
Wireless User Access Security: Anti-Brute Force Cracking
Brute force password cracking Password anti-brute force cracking
• Brute force password cracking is a method for cracking passwords. • During user authentication, the AP checks whether the number of
• It is actually an exhaustive method, which determines the range of key negotiation failures within a specified period exceeds the
answers based on the conditions of a question and verifies the threshold. If so, the AP considers that the user is cracking the
answers one by one until an answer meets the conditions of the password and reports an alarm to the WAC.
question. • If the dynamic blacklist function is also enabled, the AP adds the
user's STA to the blacklist and discards all packets from the STA until
the dynamic blacklist entry ages.
Hacker AP WAC
4 The STA is added to the
blacklist and cannot connect 3
to the network even if the
The WAC adds the STA to the blacklist
password is correct.
and delivers the blacklist to the AP.
30 Huawei Confidential
• Attack behavior:
▫ During a brute force attack, the attacker searches for a password by trying
to use all possible password combinations. This method is also called the
exhaustive attack method. For example, a password that contains only 4
digits may have a maximum of 10,000 combinations. Therefore, the
password can be decrypted after a maximum of 10,000 attempts.
Theoretically, brute force can decrypt any password. Attackers, however, are
always looking for ways to shorten the time required to decrypt passwords.
When a WLAN uses WPA/WPA2-PSK, WAPI-PSK, or WEP-Shared-Key as the
security policy, attackers can use the brute force method to decrypt the
password.
• Security policy:
▫ Defense against brute-force key cracking can prolong the time needed to
decrypt passwords. An AP checks whether the number of key negotiation
failures during WPA/WPA2-PSK, WAPI-PSK, or WEP-Shared-Key
authentication exceeds the configured threshold. If the threshold is
exceeded, the AP considers that the user is using the brute force method to
decrypt the password and reports an alarm to the WAC. If the dynamic
blacklist function is also enabled, the AP adds the user's STA to the dynamic
blacklist and discards all the packets from the STA until the dynamic
blacklist entry ages.
Wireless User Access Security: Protected Management
Frame (PMF)
⚫
In a spoofing attack, an attacker obtains information about STAs and APs by listening on and spoofs authorized devices. This
attack can be successfully launched since WPA2 encrypts only data frames but not management frames.
⚫ The PMF standard is released by the Wi-Fi Alliance based on IEEE 802.11w. It aims to apply security measures defined in
WPA2 to unicast and multicast management frames to improve network security.
Authorized Authorized AP
STA
31 Huawei Confidential
• Attack behavior:
▫ If management frames are not encrypted on a WLAN, security problems
may be generated.
• Security policy:
▫ The PMF standard is released by the Wi-Fi Alliance based on IEEE 802.11w.
It aims to apply security measures defined in WPA2 to unicast and multicast
management action frames to improve network trustworthiness.
⚫ The encryption of unicast management frames is similar to that of • The encryption mechanism of multicast management frames is
unicast data frames, except that unicast management frames similar to that of multicast data frames. Only the data part is
support only the CCMP algorithm. The same PTK as that of data calculated and the message integrity check (MIC) value is added.
frames is used for encryption of unicast management frames. The However, the multicast management frames use the IGTK that is
key generation, negotiation, delivery, and management as well as independent of the GTK. The generation, negotiation, delivery, and
frame encryption and decryption are the same as those for data management mechanisms of the IGTK are the same as those of the
frames. GTK. According to the protocol, the IGTK needs to be updated with
the GTK. The IGTK is delivered with the GTK through a 4-way or 2-
⚫ Because the data part is encrypted, the Protected Frame bit in the
way handshake.
Frame Control field of the MAC frame header is used to indicate the
• The AES-128-CMAC algorithm is used for MIC calculation when
encryption of unicast management frames on the air interface.
multicast management frames are encrypted and decrypted during
transmission and reception. Bits 0 to 127 of the IGTK are used as the
AES-128-CMAC key.
• The data part of multicast management frames is not allowed to be
encrypted.
• The MIME field is added to the encrypted broadcast management
frames for integrity check.
32 Huawei Confidential
Principles for Receiving and Transmitting Encrypted
Management Frames
⚫ For a STA that does not support PMF, the AP sends and receives unencrypted robust management
frames, and discards encrypted robust management frames. The STA ignores the MMIE field
when receiving encrypted multicast robust management frames.
⚫ For a STA that supports PMF, the AP is not allowed to send or receive robust management frames
(except unencrypted Disassociation and Deauthentication frames) before the PMF negotiation
succeeds (the key is obtained).
⚫ For a STA that supports PMF, after the PMF negotiation succeeds (the key is obtained), the AP
receives and sends encrypted robust management frames, and discards unencrypted robust
management frames.
⚫ The data part in multicast management frames cannot be encrypted, but the MMIE field is added
for integrity protection.
33 Huawei Confidential
WIDS and WIPS Function Overview
Attack
detection and WIPS
defense
34 Huawei Confidential
WIDS and WIPS: Rogue Device Types
WAC
35 Huawei Confidential
WIDS and WIPS: Wireless Network Device Identification
Management frame identification Data frame encryption
Bits 2 2 4 1 1 1 1 1 1 1 1
Frame Control field
36 Huawei Confidential
WIDS and WIPS: Rogue Device Determination
An AP reports information
about surrounding devices
No No
Is the AP Is the
Yes No
whitelisted? peer a rogue
AP?
No Yes
Rogue AP or
Neighbor Device Rogue STA Rogue Ad-hoc device
wireless bridge
37 Huawei Confidential
• The WAC obtains neighbor information entries reported by APs one by one and
performs the following determination by device type:
▫ AP validity: APs can be classified based on the MAC address, SSID, or OUI
whitelist. APs that are not managed by the WAC and cannot be classified
based on the MAC address, SSID, or OUI whitelist are rogue APs.
▫ STA validity: STAs associated with rogue APs are rogue STAs.
▫ Wireless bridge validity: identified in the same way as rogue APs.
Contain
rogue STAs
3 The monitor AP implements containment
Contain Ad-
based on the rogue device list delivered by
hoc devices
the WAC.
38 Huawei Confidential
WIDS and WIPS: Flood Attack Detection and Defense
⚫ Detection and defense mechanism: An AP monitors traffic from each STA. When the traffic rate from a STA
exceeds the configured threshold, the AP considers that the STA is initiating a flood attack and sends an
alarm message to the WAC. If the dynamic blacklist function is enabled, the AP adds the attacking STA to the
dynamic blacklist and discards all packets sent from the STA to protect the WLAN.
Authorized AP 4 WAC
STA 3
The AP discards all packets The WAC adds the attacker to the
sent by the malicious STA. dynamic blacklist and notifies the AP of
the updated blacklist.
39 Huawei Confidential
• attack detection flood intvalue timesvalue: specifies the interval for detecting
flood attacks and the number of packets of the same type received by the AP
within the interval.
• An AP can detect flood attacks of the following frames:
▫ Authentication Request.
▫ Deauthentication.
▫ Association Request.
▫ Disassociation.
▫ Probe Request.
▫ Action.
▫ EAPOL Start.
▫ EAPOL-Logoff.
▫ PS-Poll.
▫ 802.11 Null.
WIDS and WIPS: Spoofing Attack Detection and Defense
Authorized Authorized
STA AP Detection and defense mechanism
40 Huawei Confidential
AP WAC
Detection mechanism
User information
such as the user An AP identifies the IV of each WEP packet. When detecting
name and password The AP detects
WEP packets a packet carrying a weak IV, the AP sends an alarm to the
carrying a weak IV.
WAC, to alert the user that other security policies should be
Report an alarm.
Listening and used to prevent STAs from using the weak IV for encryption.
Attacker cracking
41 Huawei Confidential
• When WEP is used for encryption on a WLAN, a 24-bit IV is generated for each
packet. When a WEP packet is sent, the IV and shared key are used together to
generate a key string. The plaintext is encrypted using the key string to generate
a ciphertext. A weak IV is an IV generated using insecure methods. For example,
repeated IVs are generated frequently or the same IV is generated all the time.
When a STA sends a packet, the IV in the packet header is sent in plaintext.
Therefore, an attacker can easily crack the shared key and access network
resources.
• Weak IV detection identifies the IV of each WEP packet to prevent attackers from
decrypting the shared key. When an AP detects a packet carrying a weak IV, the
AP sends an alarm to the WAC so that users can use other security policies to
prevent STAs from using the weak IV for encryption.
URL Filtering
⚫ With the rapid development of Internet applications and the popularity of computer networks,
acquisition, sharing, and dissemination of information have become more widespread than ever,
which brings unprecedented threats to enterprises.
Visiting non-work-related websites during working hours reduces work efficiency.
Visiting illegitimate or malicious websites may expose confidential information or even incur threats such
as worms, viruses, and Trojan horses.
During times of high network activity leading to intranet congestion, employees may be unable to access
work-related websites (such as the company homepage and search engines), reducing work efficiency.
⚫ When users send HTTP or HTTPS requests for accessing URLs, URL filtering can be used to permit,
generate alarms for, or block the requests. After URL filtering is enabled:
Users' access requests to legitimate websites are permitted.
Users' access requests to illegitimate websites are blocked.
42 Huawei Confidential
• The URL service needs to be deployed on different network devices based on the
forwarding modes of wireless users' service data packets.
▫ Tunnel forwarding: A CAPWAP tunnel is established between a WAC and an
AP to centrally forward user data packets. In this case, the URL service is
deployed on the WAC. Service data packets of wireless users are
encapsulated into CAPWAP packets on the AP and sent to the WAC through
the CAPWAP tunnel between the AP and WAC. The WAC decapsulates the
CAPWAP packets and performs URL filtering on the original service data
packets of wireless users.
▫ Direct forwarding: Service data packets do not need to be forwarded by a
WAC. In this case, the URL service is deployed on an AP. After receiving
service data packets, the AP directly performs URL filtering on the original
data packets.
URL Filtering Mechanism
www.huawei.com
3
3. A user visits www.huawei.com. The
traffic is permitted, and the user
can access the website normally.
43 Huawei Confidential
URL Structure
⚫ A URL describes the address of a web page or other resources on the Internet.
⚫ The common format of a URL is protocol://hostname:port/path?query.
protocol: application protocol, with HTTP being the most common one.
hostname: domain name or IP address of the web server.
:Port: communication port, which is optional. Application protocols have default ports. For example, the default port for
HTTP is 80. If the server uses the default port, you do not need to configure the port number in a URL filtering rule. If the
server uses a non-default port, the port number is mandatory in a URL filtering rule.
path: directory or file path on the web server, which is a character string that can be separated by slashes (/).
?query: transmits parameters to dynamic web pages, which is optional.
http://wwwexample.com:8080/news/education.aspx?name=tom&age=20
:port ?query
44 Huawei Confidential
URL Matching Modes
⚫ The priorities of URL matching modes are as follows:
Exact matching > suffix matching > prefix matching > keyword matching.
Matching
Definition Item Matching Result
Mode
All URLs that start with www.example are matched. For
Prefix Matches all URLs that start with the specified example:
www.example*
matching character string. • www.example.com
• www.example.com/solutions.do
All URLs that end with aspx are matched. For example:
Suffix Matches all URLs that end with the specified • www.example.com/news/solutions.aspx
*aspx
matching character string. • www.example.com/it/price.aspx
• 10.1.1.1/sports/abc.aspx
All URLs that contain sport are matched. For example:
Keyword Matches all URLs that contain the specified character • sports.example.com/news/solutions.aspx
*sport*
matching string. • sports.example.com/it/
• 10.1.1.1/sports/
The following URLs can match the rule:
First matches the URL against the specified character
• www.example.com
string. If the URL does not match the string, removes
• www.example.com/news
Exact the last directory in the URL and matches the www.example.co
• www.example.com/news/en/
matching remaining part against the string. If the URL is still m
The following URLs do not match the rule:
not matched, removes the second last directory and
• www.example.com.cn/news
matches the remaining part against the string.
• www.example.org/news/www.example.com
45 Huawei Confidential
• The four matching modes apply to the entire URL. By default, only HTTP URLs
are filtered. After the HTTPS proxy or encrypted traffic filtering function is
enabled, HTTPS URLs can be filtered.
• HTTP mode: The system directly extracts the URLs from the HTTP packets and
matches the URLs against the configured URL blacklist and whitelist.
• HTTPS mode: HTTPS is carried over SSL. SSL encrypts the entire content
transmitted through HTTP. Only the SNI, CN, and SAN fields in the SSL protocol
can be identified, from which URLs are extracted for matching against the
configured URL blacklist and whitelist.
URL Filtering Mode
⚫ After URL filtering is configured, the device processes URL information as follows:
⚫ The device matches the URL against the whitelist.
If the URL matches the whitelist, the device permits the URL access request.
If the URL does not match the whitelist, the device goes to the next step.
46 Huawei Confidential
▫ When the URL in the network access request matches the whitelist, no
further processing is performed, helping improve the matching efficiency.
The WAC reassembles IP The WAC identifies multiple The WAC matches the After the detection, the WAC
fragments and TCP flows to common application-layer extracted characteristics processes the packets that
ensure the continuity of protocols based on the packet against the IPS signatures. match the signature based
application-layer data and content. If a match is found, the on the configured action.
effectively detect attacks After identifying the protocol of WAC responds
that evade intrusion packets, the WAC performs accordingly.
prevention. refined analysis based on the
specific protocol analysis
solution and extracts packet
characteristics.
47 Huawei Confidential
• Predefined signatures are those in the IPS signature • User-defined signatures are created by the administrator
database. Predefined signatures cannot be created, based on user-defined rules.
modified, or deleted. • The signature database may not have a signature for a new
• Each predefined signature has a default action, which type of attack. If you understand the attack, you can create a
can be: user-defined signature for it.
Allow: The device permits the packet matching the • After a user-defined signature is created, the system
signature and does not generate a log. automatically checks its validity to prevent a waste of system
Alert: The device permits the packet matching the resources.
signature and generates a log. • The action for a user-defined signature can be block or alert.
Block: The device discards the packet matching the You can configure a response action when creating a user-
signature, blocks the data flow to which the packet defined signature.
belongs, and generates a log.
49 Huawei Confidential
• You are advised to configure a user-defined signature for an attack only when
you understand the characteristics of the attack. Incorrect signatures may be
useless, cause packet loss, or interrupt services.
• Signature filter:
▫ After a device has its signature database updated, a large number of
signatures exist on the device, remaining unclassified. The characteristics
contained in some signatures do not exist on the local network and need to
be filtered out. Therefore, a signature filter is configured for signature
management. Administrators can analyze the characteristics of common
threats on their networks and configure a signature filter to filter out
signatures containing the characteristics, preventing potential intrusions.
51 Huawei Confidential
• When a data flow matches multiple signatures, the actual action for the data
flow is as follows:
▫ If the actions for all the matched signatures are alert, the action for the
data flow is alert.
▫ If the action for any matched signature is block, the action for the data
flow is block.
• When a data flow matches multiple signature filters, the action for the signature
filter with the highest priority is performed on the data flow.
Antivirus
⚫ The WAC employs the professional Intelligent Awareness Engine (IAE) and constantly updates antivirus
signature database to detect and remove viruses.
Security center platform
Internet
Allow
Signature matching
Yes
Virus file
Application protocol
Virus detection
identification
Network traffic No
Yes
No virus detection
Exception action (allow/alert/block)
performed
Virus detection by the IAE Antivirus handling
52 Huawei Confidential
• Antivirus is a security mechanism that can identify and process virus files to
ensure network security and avoid data corruption, permission change, and
system crash caused by virus files.
Antivirus: Virus Detection by the IAE
Perform in-depth traffic • The IAE performs in-depth traffic analysis and identifies its protocol type and file
analysis. transfer direction.
Check whether virus • The WAC supports virus detection for files transmitted using the following protocols:
detection applies to the FTP, HTTP, POP3, SMTP, IMAP, NFS, SMB
protocol used for file • The WAC supports virus detection in upload and download directions:
transfer and the file
Upload: indicates file transfer from a client to a server.
transfer direction.
Download: indicates file transfer from a server to a client.
• The IAE extracts signatures of applicable files and compares the extracted signatures
with virus signatures in the virus signature database.
Detect viruses.
If a match is found, the file is considered infected and processed according to the
action specified in the profile.
If no match is found, the file is permitted.
53 Huawei Confidential
• If a detected virus is considered as a false positive, you can add the virus ID to the virus exception list.
• If the virus file matches a virus exception, the WAC allows the file transfer.
• If the virus file does not match any virus exception, the WAC checks whether it matches an
application exception. If it matches an application exception, it is processed according to the action
(allow, alert, or block) for the application exception.
• When configuring the response action, note the following:
If the action for a protocol is defined but no action is defined for any application, the action for the
protocol applies to all applications that use the protocol.
If the action for a protocol and the action for an application that uses the protocol are both
defined, the action for the application is used.
54 Huawei Confidential
Antivirus Processing (2)
3. Takes the action for the protocol and file transfer direction configured in the profile.
• If the virus file does not match any virus exception or application exception, the WAC takes
the action for the protocol and file transfer direction specified in the profile.
• The WAC supports different response actions for files of different protocols in different file
transfer directions.
55 Huawei Confidential
Local Attack Defense
⚫ In addition to numerous normal service packets, CPUs of devices on a network may also receive large
numbers of attack packets. If a CPU is busy processing attack packets for an extended period, other services,
or even the system itself, will experience breakdown. Similarly, if a large number of normal packets are sent
to the CPU, the CPU usage will surge and device performance will deteriorate, adversely affecting services.
⚫ To ensure that the CPU can properly process and respond to normal services, the device provides the local
attack defense function, which has been specifically designed for packets sent to the CPU and is primarily
used to protect the device from attacks and ensure consistency of existing services when an attack occurs.
⚫ Local attack defense includes:
CPU attack defense
Attack source tracing
56 Huawei Confidential
• Level 1: rate-limits the packets sent to the CPU based on When detecting SSH, Telnet, SSHv6, Telnetv6, or FTP
the protocol type. session data, the device enables the active link protection
• Level 2: schedules packets sent to the CPU based on the function for the session. If subsequent packets match the
protocol priority. session characteristics, the packets are sent at a high rate,
ensuring the reliability and stability of services related to
• Level 3: uniformly rate-limits all packets sent to the CPU
the session.
and randomly discards the excess packets.
57 Huawei Confidential
• CPU attack defense can rate-limit packets destined for the CPU so that only a
limited number of packets are sent to the CPU within a certain period of time.
This ensures that the CPU can properly process services. Multi-level security
mechanisms are used to protect the device.
• The device provides hierarchical protection through the following policies:
▫ Level 1: rate-limits the packets sent to the CPU based on the protocol type,
preventing excess packets of a protocol from being sent to the CPU.
▫ Level 2: schedules packets sent to the CPU based on the protocol priority to
ensure that packets with higher protocol priorities are preferentially
processed.
▫ Level 3: uniformly rate-limits all packets sent to the CPU and randomly
discards the excess packets to ensure CPU security.
• CPU packet rate limiting in active link protection: When detecting SSH, Telnet,
SSHv6, Telnetv6, or FTP session data, the device enables the active link protection
function for the session. If subsequent packets match the session characteristics,
the packets are sent at a high rate, ensuring the reliability and stability of
services related to the session.
Local Attack Defense: Attack Source Tracing
⚫ Attack source tracing defends against DoS attacks. A device enabled with attack source tracing analyzes packets sent to the
CPU, collects statistics on the packets, and allows a user to set a packet rate threshold for the packets. Packets sent at a
threshold-crossing rate are considered as attack packets. The device finds the source user address or source interface of the
attacker by analyzing the attack packets and generates logs or alarms to alert a network administrator. The network
administrator then takes measures to defend against the attack or configure the device to discard packets sent by the attack
source.
Attack source tracing involves four steps: parsing packets, analyzing traffic, identifying an attack source, and sending logs or alarms to the
network administrator or implementing punishment.
When the attack source is located, the network administrator blocks traffic sent from the attack source by configuring ACLs or blacklists to
protect the CPU.
Attack source tracing
Chip-based forwarding
58 Huawei Confidential
Service and Management Isolation
⚫ As shown in the figure, devices on the 192.168.10.X network segment are connected to the independent
management interface on the WAC, and devices on the 192.168.20.X network segment are connected to the
service interface GE0/0/1 on the WAC. They can access the WAC properly. If the management interface is not
isolated, the devices on 192.168.20.X can ping devices on 192.168.10.X. As a result, the management interface
address is exposed and vulnerable to attacks.
59 Huawei Confidential
Common Configurations for Security Protection on the
WLAN Control Plane: WPA3 Configuration
# Configure WPA2-WPA3 hybrid authentication and set the user password to huawei@123.
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name p1
[HUAWEI-wlan-sec-prof-p1] security wpa2-wpa3 psk-sae pass-phrase huawei@123 aes
60 Huawei Confidential
Common Configurations for Security Protection on the
WLAN Control Plane: WIDS and WIPS Configuration
# Configure an AP group and enable rogue device detection and containment. # Bind the WIDS profile wlan-wids to the AP group ap-group1.
[AC-wlan-view] ap-group name ap-group1 [AC-wlan-view] ap-group name ap-group1
[AC-wlan-ap-group-ap-group1] radio 0 [AC-wlan-ap-group-ap-group1] wids-profile wlan-wids
[AC-wlan-group-radio-ap-group1/0] work-mode normal [AC-wlan-ap-group-ap-group1] quit
[AC-wlan-group-radio-ap-group1/0] wids device detect enable
[AC-wlan-group-radio-ap-group1/0] wids contain enable # Verify the configuration. You can run the display wlan ids
contain ap command to view AP2 that has been contained.
# Configure an AP group and enable rogue device detection and containment. [AC-wlan-view] display wlan ids contain ap
[AC-wlan-ap-group-ap-group1] radio 1 #Rf: Number of monitor radios that have contained the device
[AC-wlan-group-radio-ap-group1/1] work-mode normal CH: Channel number
[AC-wlan-group-radio-ap-group1/1] wids device detect enable ----------------------------------------------------------------------------
-------
[AC-wlan-group-radio-ap-group1/1] wids contain enable MAC address CH Authentication Last detected time #Rf
SSID
----------------------------------------------------------------------------
# Create a WIDS profile named wlan-wids and configure the WAC to contain -------
rogue APs with spoofing SSIDs. 000b-6b8f-**** 11 wpa-wpa2 2014-11-20/16:16:57 1
wlan-net
[AC-wlan-view] wids-profile name wlan-wids ----------------------------------------------------------------------------
[AC-wlan-wids-prof-wlan-wids] contain-mode spoof-ssid-ap Total: 1, printed: 1
61 Huawei Confidential
Contents
62 Huawei Confidential
WLAN Forwarding Plane Security
⚫ For the security of the WLAN forwarding plane, pay attention to data security on the
forwarding path to prevent attacks from spreading on the network. The following
approaches can be taken:
Traffic suppression
ACL
MAC address anti-flapping
Port isolation
CAPWAP data tunnel encryption
Navi WAC
IPsec VPN
63 Huawei Confidential
Traffic Suppression
⚫ Traffic suppression is a security technology used to control broadcast, unknown-unicast, and multicast traffic
(BUM traffic) and prevent broadcast storms caused by such traffic. Traffic suppression limits traffic based on
the configured threshold.
Traffic suppression mechanism
BUM • When a Layer 2 Ethernet interface on a WLAN device receives broadcast, multicast,
or unknown unicast packets, the WLAN device forwards these packets to other
WAC Layer 2 Ethernet interfaces in the same VLAN if the outbound interfaces cannot be
determined based on the destination MAC addresses of these packets. In this case,
a broadcast storm may occur, degrading forwarding performance of the WLAN
device.
• In the inbound direction, the device supports traffic suppression for the three types
AP of packets based on the packet rate.
• The device monitors the rates of the three types of packets and compares them
with the configured thresholds. When the incoming traffic rate exceeds the
configured threshold, the device discards excess traffic.
64 Huawei Confidential
ACL – IPv4
Applicable
Type Function Description
IP Version
A basic IPv4 ACL is called a basic ACL for
Defines rules based on the source address, fragmentation information,
Basic ACL IPv4 short. The number ranges from 2000 to
and time range of IPv4 packets.
2999.
Defines rules based on the source IP address, destination IP address, IP
An advanced IPv4 ACL is called an
Advanced precedence, ToS value, DSCP value, IP protocol type, ICMP type, TCP
IPv4 advanced ACL for short. The number
ACL source interface/destination interface, and UDP source
ranges from 3000 to 3999.
interface/destination interface of IPv4 packets.
Defines rules based on the information in Ethernet frame headers of
Layer 2
IPv4 packets, such as the source MAC address, destination MAC address, and The number ranges from 4000 to 4999.
ACL
Ethernet frame protocol type.
Defines rules based on the source IP address, source user group,
destination IP addresses, destination user group, destination domain
User ACL IPv4 name, IP precedence, ToS value, DSCP value, IP protocol type, ICMP The number ranges from 6000 to 6999.
type, TCP source interface/destination interface, and UDP source
interface/destination interface of IPv4 packets.
65 Huawei Confidential
66 Huawei Confidential
MAC Address Anti-flapping
⚫ MAC address flapping occurs on a network when the network encounters a routing loop or
attack.
67 Huawei Confidential
• Users in the same VLAN are isolated to secure user communication and prevent invalid
broadcast packets from affecting services.
WAC
• Data exchanged between users in the same VLAN can be centrally forwarded by the upper-
layer device.
Solution
• Simply add ports to a port isolation group to implement Layer 2 isolation between these
STA 1 STA 2 STA 3
ports.
1.1.1.1/24 1.1.1.2/24 1.1.1.3/24
• There are two port isolation modes: Layer 2 isolation but Layer 3 interworking, and Layer 2
VLAN 10 (office) and Layer 3 isolation.
To isolate broadcast packets in the same VLAN but allow users connecting to different
Enable port isolation and add the ports to the interfaces to communicate at Layer 3, you can set the port isolation mode to Layer 2
same port isolation group.
isolation but Layer 3 interworking.
To prevent interfaces in the same VLAN from communicating with each other at both
Layer 2 and Layer 3, you can set the port isolation mode to Layer 2 and Layer 3 isolation.
68 Huawei Confidential
CAPWAP Data Tunnel Encryption
CAPWAP tunnel WAC
Fit AP WAC
Data tunnel
69 Huawei Confidential
• When the data forwarding mode is tunnel forwarding, service data packets
between an AP and a WAC are transmitted over a CAPWAP data tunnel. To
improve service data security, you can run the capwap dtls data-link encrypt
enable command to enable DTLS encryption for CAPWAP data tunnels. This
configuration ensures that packets are encrypted and then transmitted over the
CAPWAP data tunnel.
• DTLS encryption for CAPWAP data tunnels can be configured in both the system
view and AP system profile view. The difference is that the function configured in
the system view takes effect for APs that go online through a WAC and support
this function, while the function configured in the AP system profile view takes
effect for APs configured with the AP system profile. The function in the AP
system profile view takes precedence over that in the system view. When this
function is enabled in both the views, the configuration in the AP system profile
view takes effect.
Navi WAC (1)
Navi WAC solution
Internet
1. During WLAN deployment, a large enterprise needs
DMZ to provide access services for both employees and
Local WAC guests. Guest data brings potential security threats
to the network.
Intranet
application server 2. To isolate guest traffic from employee traffic, the
enterprise diverts guest traffic to the Navi WAC in
Navi WAC General- Guest
the DMZ for centralized management.
purpose guest authentication
server server
1. Local WAC: manages and coordinates APs in a
Intranet
centralized manner, providing functions such as STA
authentication server
access and AP configuration delivery.
70 Huawei Confidential
Navi WAC (2)
Typical application scenario
Internet Internet
1. Employee traffic and guest traffic are isolated from each other,
decoupling guest management and control from the intranet.
2. The service egress and the operation egress are independent of each
other.
6. Guest traffic is forwarded from the local WAC to the Navi WAC, and
SSID1: Employee then goes out to the Internet.
SSID2: Guest SSID: Guest
71 Huawei Confidential
Branch 1
Headquarters
Branch n
72 Huawei Confidential
Contents
73 Huawei Confidential
Rogue AP Containment Based on Fuzzy SSID Matching
⚫ Scenario description: WLAN services are available in
public places, such as banks and airports. Users can
connect to the WLANs after associating with
WAC
corresponding SSIDs.
⚫ If a rogue AP is deployed and provides spoofing
SSIDs similar to authorized SSIDs, the users may be
misled and connect to the rogue AP, which brings AP AP
74 Huawei Confidential
Configuration Roadmap
WAC
Roadmap
Rogue AP
STA SSID: wlan-net
75 Huawei Confidential
Configuring Fuzzy Matching Rules
WAC
Create a WIDS spoof SSID profile named default and set the
fuzzy matching character for spoofing SSIDs to wlan. Use the
regular expression ^wlan$.
AP AP
[WAC-wlan-view]wids-spoof-profile name default
[WAC-default-spoof-prof-default]spoof-ssid fuzzy-match regex ^wlan$
[WAC-default-spoof-prof-default]quit
Authorized AP
SSID: wlan-net
Rogue AP
STA SSID: wlan-net
76 Huawei Confidential
• The authorized SSID is wlan-net, and there may be spoofing SSIDs wlan-nat or
wlan, so you can use the regular expression ^wlan$ to configure a fuzzy
matching rule.
Enabling Detection and Containment
Enable device detection and containment.
AP AP [WAC-wlan-ap-group-default] radio 1
[WAC-wlan-group-radio-default/1] wids device detect enable
[WAC-wlan-group-radio-default/1] wids contain enable
Authorized AP
SSID: wlan-net [WAC-wlan-view] wids-profile name default
[WAC-default-prof-default] contain-mode spoof-ssid-ap
[WAC-default-prof-default] wids-spoof-profile default
Rogue AP
STA SSID: wlan-net [WAC-wlan-ap-group-default] ap-group name default
[WAC-wlan-ap-group-default] wids-profile default
77 Huawei Confidential
Verifying the Configuration
Run the display wlan ids contain ap command to check
information about the contained AP.
Authorized AP
SSID: wlan-net
Rogue AP
SSID: wlan-net
A STA attempts to connect to the WLAN through a rogue AP, which
however is contained. Then the STA is disconnected from the rogue
STA AP and connects to the authorized AP.
78 Huawei Confidential
Quiz
1. How many bits does the WPA3 encryption key algorithm have?
79 Huawei Confidential
• 192
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
• You can also manage AAA configurations, such as AAA schemes, server
templates, and authorization information, in an authentication profile, instead of
in a domain.
• Authorization methods:
• The device marks the RADIUS server status as Down during RADIUS server status
detection.
• When system startup is complete, the RADIUS server status detection timer starts.
If the device does not receive any packet from the RADIUS server after sending
the first RADIUS Access-Request packet and the number of consecutive
unacknowledged packets (n) is greater than or equal to the threshold (dead-
count) in a detection interval, a communication interruption is recorded. If the
device still does not receive any packet from the RADIUS server, the device marks
the RADIUS server status as Down when the number of recorded communication
interruptions reaches the detection cycles.
▫ HWTACACS client: typically runs on an NAS and can locate at any node on
a network. It transmits user information to a specified HWTACACS server
and processes requests based on the responses received from the server.
• RADIUS does not support command line authorization. The commands that a
user can run depend on the user privilege level. A user can run the commands of
the same level as or lower level than the user privilege level.
• iMaster NCE-Campus is a web-based centralized management and control
system designed for the CloudCampus Solution. It supports a wide range of
functions, including network service management, network security
management, network access management, network monitoring, network quality
analysis, network application analysis, alarm management, and report
management. As well as these, it provides big data analytics capabilities and
open APIs for integration with other platforms. Enterprise users can perform
service configuration and routine O&M on iMaster NCE-Campus to centrally
manage a large number of devices.
• CN: common name, which indicates the name of an object. In this example,
"CN=User1" is an object name.
• Base DN: DN of the root node. In this example, the Base DN is "dc=HUAWEI,
dc=COM".
• The LDAP client obtains the user name and password, and sends an
administrator bind request message carrying the administrator's DN and
password to the LDAP server to obtain the search permission.
• After receiving the administrator bind request message, the LDAP server verifies
the administrator's DN and password, and sends an administrator bind response
message indicating successful binding to the LDAP client.
• After receiving the response message, the LDAP client creates a filter criterion
based on the user name, and sends a user DN search request message to the
LDAP server. For example, the client creates the filter criterion "CN=User2".
• After receiving the user DN search request message, the LDAP server searches for
the DN based on the Base DN, search range, and filter criterion. If the DN is
found, the LDAP server sends a DN search response message indicating
successful search to the LDAP client. One or more DNs may be found. In the
directory structure, for example, if the Base DN is "DC=huawei, DC=com", two
DNs will be returned: "CN=User2, Departments=R&D, OU=People, DC=huawei,
DC=com" and "CN=User2, Departments=R&D, OU=Equipment, DC=huawei,
DC=com".
• The LDAP client sends a user bind request message carrying the user's DN and
password to the LDAP server.
• An AD client is an access device integrating Kerberos and LDAP.
▫ An Authentication Server (AS) provides the tickets used to access the TGS.
▫ A Ticket Granting Server (TGS) provides the tickets used to access the AD
server.
• When accessing an AD server, a user sends the user name and password to the
AD client to initiate authentication.
• If the AD client accesses the AD server for the first time, it sends an AS-REQ
message carrying the user name in plain text to the Kerberos server integrated in
the AD server, so that the Kerberos server can authenticate the client.
• The Kerberos server searches for the user in the database according to the user
name. If the user is found, the AS server generates a session key shared between
the Kerberos server and client, as well as a ticket. The AD client can use this
ticket to request a ticket for access to the AD server from the Kerberos server. In
this way, the AD client no longer needs to be authenticated again. The AS server
then returns an AS-REP message to the client. The ticket in the AS-REP message
is encrypted using the shared key between the AS and TGS, and the encrypted
ticket and session key are then encrypted using the client's password.
• The AD client uses its own password to decrypt the AS-REP message to obtain
the session key and encrypted ticket. The AD client sends a TGS-REQ message to
the Kerberos server to request a ticket for access to the AD server. This message
contains the authenticator, encrypted ticket, client name, and AD server name.
The authenticator contains the information encrypted using the session key, such
as the client's user name, client's IP address, time, and realm name.
• The Kerberos server decrypts the ticket using the shared key between the AS and
TGS to obtain the session key, and then decrypts the authenticator using the
session key. If the Kerberos server verifies that the client name and time in the
authenticator are the same as those in the ticket, the authentication is successful.
The Kerberos server then returns a TGS-REP message encrypted using the client
password to the client. The TGS-REP message contains the session key used by
the client and AD server and the ticket encrypted using the AD server's password.
The ticket contains the session key, client name, server name, and ticket validity
period. The Kerberos client uses its own password to decrypt the TGS-REP
message, so as to obtain the session key and the encrypted ticket in the message.
The Kerberos client can use this ticket to access the AD server.
• In the networking diagram on the left, no external authentication server is
deployed. The WAC functions as the local EAP server to perform 802.1X
authentication.
• EAPoR: EAP packets are directly encapsulated into EAP over RADIUS (EAPoR)
packets, so that they can traverse a complex network to reach the authentication
server. To support EAP relay, the RADIUS protocol adds the EAP-Message and
Message-Authenticator attributes. EAP-Message is used to encapsulate EAP
packets; Message-Authenticator is used to authenticate and verify authentication
packets, protecting against spoofed packets.
• The EAP relay mode simplifies the processing on the access device and supports
various authentication methods. However, the authentication server must
support EAP and have high processing capability. The commonly used
authentication methods include EAP-TLS, EAP-TTLS, and EAP-PEAP. EAP-TLS has
the highest security because it requires a certificate to be loaded on both the
client and authentication server. EAP-TTLS and EAP-PEAP are easier to deploy
since the certificate needs to be loaded only on the authentication server, but not
the client.
• The main advantage of the EAP termination mode is that mainstream RADIUS
servers support both PAP and CHAP authentication, meaning that there is no
need to upgrade servers. However, because this mode must extract client
authentication information from EAP packets sent by clients and encapsulate it
into standard RADIUS packets, the EAP termination mode results in a heavy
workload on the device. In addition, the device does not support other EAP
authentication methods except MD5-Challenge. The major difference between
PAP and CHAP is that passwords in CHAP authentication are transmitted in
cipher text, whereas passwords in PAP authentication are transmitted in plain
text. In this aspect, CHAP provides higher security and is recommended.
• In EAP termination mode, the MD5 challenge for encrypting the user password is
randomly generated by the access device, instead of by the authentication server
in EAP relay mode. Besides, in EAP termination mode, the access device
encapsulates RADIUS packets with the user name, password encrypted by the
client, and MD5 challenge, and sends the packets to the authentication server for
authentication. In EAP relay mode, in contrast, the access device is only
responsible for encapsulating EAP packets into RADIUS packets and transparently
transmitting them to the authentication server.
• Successful authentication: If the administrator modifies parameters such as
access rights and authorization attributes of an online user on the authentication
server, reauthentication of the user must be performed to ensure user validity.
After reauthentication is configured for online 802.1X-authenticated users, the
device sends the locally saved online user authentication information to the
authentication server. If the user authentication information is the same as that
on the authentication server, the user keeps online. Otherwise, the user is logged
out and needs to be reauthenticated.
• The server logs out a user using either of the following methods:
▫ The RADIUS server sends a Disconnect Message (DM) to the access device
to log out the user.
▫ When Layer 2 authentication is used, the device can learn users' MAC
addresses and identify the users based on their MAC addresses and IP
addresses. Layer 2 authentication provides a simple authentication process
with high security. However, users must be in the same network segment
with the access device, causing inflexible networking.
▫ When Layer 3 authentication is used, the device cannot obtain the MAC
address of a client, so it identifies the user based only on the client IP
address. Layer 3 authentication allows for flexible networking and
facilitates remote control. However, users can only be identified based on
their IP addresses, leading to poor security.
▫ After receiving the Portal authentication request, the Portal server sends a
Portal challenge request packet to the access device. This step is performed
only when CHAP authentication is used between the Portal server and
access device. If PAP authentication is used, steps 7 and 8 are not
performed.
▫ The access device sends a Portal challenge response packet to the Portal
server.
▫ Forcible mode: If the access device does not receive any heartbeat packet
from a user before the user heartbeat detection timer expires, the access
device logs out the user.
▫ Automatic mode: The access device checks whether the client browser
supports the heartbeat program. If so, the forcible mode is used. If not, the
access device does not detect user heartbeats. This mode is recommended
as it prevents user logout if the browser does not support the heartbeat
program.
• Dumb terminal: Compared with other terminals, dumb terminals have limited
functions and simple interaction modes. In this document, dumb terminals refer
to terminals whose authentication information such as user names and
passwords cannot be entered.
• By default, a MAC address without hyphens (-) is used as the user name and
password for MAC address authentication, for example, 0005e0112233.
• Passwords of MAC address authentication users can be processed using PAP or
CHAP. The following MAC address authentication process uses PAP as an
example:
▫ When a terminal accesses the network, the access device detects and learns
the MAC address of the terminal, triggering MAC address authentication.
▫ The access device generates a random value (MD5 challenge), arranges the
user MAC address, password, and random value in sequence, encrypts them
using the MD5 algorithm, encapsulates a RADIUS Access-Request packet
with the encryption results, and sends the packet to the RADIUS server.
▫ The RADIUS server arranges the user MAC address, password saved in the
local database, and received random value in sequence, and encrypts them
using the MD5 algorithm. If the encrypted password is the same as that
received from the access device, the RADIUS server sends a RADIUS Access-
Accept packet to the access device, indicating that MAC address
authentication is successful and the terminal is allowed to access the
network.
▫ Different from PAP, CHAP involves password encryption twice on both the
access device and RADIUS server.
• Successful authentication: If the administrator modifies parameters such as
access rights and authorization attributes of an online user on the authentication
server, reauthentication of the user must be performed to ensure user validity.
After reauthentication is configured for online authenticated users, the device
sends the locally saved online user authentication information to the
authentication server. If the user authentication information is the same as that
on the authentication server, the user keeps online. Otherwise, the user is logged
out and needs to be reauthenticated.
▫ The RADIUS server sends a Disconnect Message (DM) to the access device
to log out the user.
• After the quiet timer function is enabled, if the number of a user's authentication
failures within 60 seconds reaches the specified value, the access device waits for
a period of time controlled by the timer. During this period, the access device
discards the MAC address authentication requests sent from the user.
• When a RADIUS server is used as the authentication server, an Access-Accept
packet indicating successful authentication also contains user authorization
information because RADIUS authorization is combined with authentication.
• The RADIUS server can assign an authorized ACL to a user in either of the
following modes:
▫ Static ACL assignment: The RADIUS server uses the standard RADIUS
attribute Filter-Id to assign an ACL ID to the user. In this mode, the ACL and
corresponding rules are configured on the access device in advance.
▫ Dynamic ACL assignment: The RADIUS server uses the Huawei extended
RADIUS attribute HW-Data-Filter to assign an ACL ID and corresponding
rules to the user. In this mode, the ACL ID and ACL rules are configured on
the RADIUS server.
• When an authentication-free rule is configured using an ACL, the ACL number is
in the range from 6000 to 6031.
• The NAC escape mechanism grants specified network access rights to users when
the authentication server is Down or to users who fail the authentication or are
in preconnection state. The escape solutions vary according to the authentication
modes. Some escape solutions are shared by all authentication modes, while
some are supported only in specific authentication modes. For details, see "NAC
Escape Mechanism" in the product documentation.
• 5W1H:
▫ Where: user access location, for example, local (within a campus) or remote
access;
▫ What: type of the access terminal, for example, a mobile phone, PC, or
laptop;
▫ When: time range when a user accesses the network, for example, in the
daytime or at night;
• Static resource groups include servers, interfaces of network devices, and special
terminals that can access the network using fixed IP addresses without
authentication.
• The NAC escape mechanism grants specified network access rights to users when
the authentication server is Down or to users who fail the authentication or are
in preconnection state. The escape solutions vary according to the authentication
modes.
• For Portal authentication, the NAC escape function is supported only when HTTP
packets are sent to trigger authentication.
• VLAN-based authorization is not supported for online Portal authentication users.
• The device assigns network access rights according to the configuration of the
following user authorization policies in descending order of priority:
▫ If the authentication server is Down: network access rights upon an
authentication server Down event > network access rights for users who fail
authentication > network access rights for users in preconnection state >
user authorization based on whether the function of keeping users who fail
to be authenticated and do not have any network access rights in the
preconnection state is enabled.
▫ If users fail authentication: network access rights for users who fail
authentication > network access rights for users in the preconnection state
> user authorization based on whether the function of keeping users who
fail to be authenticated and do not have any network access rights in the
preconnection state is enabled.
▫ If users are in the preconnection state: network access rights for users in the
preconnection state > user authorization based on whether the function of
keeping users who fail to be authenticated and do not have any network
access rights in the preconnection state is enabled.
▫ If a Portal server is Down: network access rights upon a Portal server Down
event > network access rights before the Portal server is Down.
• To configure the Portal escape function, run the server-detect command on the
device to enable the heartbeat detection function, and enable the heartbeat
detection function on the Portal server.
• A
• Bluetooth is a short-range wireless communication technology. With the
emergence of IoT applications such as smart wearables, smart home, and IoV, a
large number of Bluetooth products are developed, including traditional
Bluetooth-capable mobile phones, Bluetooth headsets, Bluetooth speakers,
Bluetooth mouse devices, and Bluetooth keyboards, smart wristbands, smart
watches, sports bands, vehicle-mounted devices, and smart home products.
• To enable network convergence, Huawei launched IoT APs for IoT expansion. The
APs provide many IoT connection modes such as Bluetooth, RFID, and ZigBee,
implementing a unified portal for various IoT protocols, such as Wi-Fi, Bluetooth,
and RFID.
• Bluetooth, RFID, and ZigBee cards are integrated on IoT APs, so that Wi-Fi and
IoT services can be co-sited, share backhaul resources, and are centrally managed.
This practice can reduce the costs, workload, and damage to the surrounding
environment, and achieve high flexibility and scalability.
• RFID gateway: A third-party RFID card is installed on an AP through the PCIe
interface, integrating the RFID gateway function. In this manner, the AP can
listen to broadcast data of RFID tags. The RFID gateway has an independent ID.
• RFID tag: RFID tags are installed on assets. RFID tags periodically broadcast RFID
packets that carry information such as RFID tag IDs, tag status, and device
working status (current tags).
• Exit alarm: If a baby is carried to the exit, the exit management device will detect
this event and notify the infant wristband. The RFID signal of the infant
wristband then triggers an alarm. After receiving the alarm, the system parses
the location of the exit where the alarm is generated, and takes security
measures, such as audible and visual alarming, access control, and camera
linkage.
• Cut-off alarm: The system generates such an alarm when the infant wristband
reports cut-off information or no signal from the infant wristband can be
detected (no information is reported to the system for alarm processing).
• Mother-infant detaching alarm: The mother wristband analyzes the current baby
distance based on the signal strength. When the distance exceeds a preset
threshold, an alarm is generated.
• Low-battery alarm: The infant wristband broadcasts RFID packets that carry the
battery level information. When the system detects the battery level falls below a
preset threshold, it generates a low-battery alarm.
• Infant check-out timeout alarm: The system sets the check-out time. If a baby is
not returned back to the ward when the check-out time expires, an alarm is
generated.
• Alarming upon a wristband exception:
▫ The wristband reports heartbeat packets through RFID, but the server
cannot detect the heartbeat packets. As a result, an alarm is generated.
▫ The IoT module expanded via the USB port can locate the wristband
through radio-based positioning. If a baby is carried away for a period of
time, the system generates an infant check-out timeout alarm.
▫ If a wristband is cut off, this change is reported through RFID, and a cut-off
alarm is generated. The server then identifies the cut-off alarm.
• Backtracking analysis
▫ APs equipped with IoT cards are deployed in public areas, such as corridors,
to obtain the locations of infant wristbands in real time. In this way, the
tracks of babies can be traced and analyzed when the babies are
abnormally carried out of the wards.
• Border alarming
▫ When a baby is carried to the exit, the border manager interacts with the
RFID tag of the infant wristband and identifies that the wristband location
is abnormal. The system then generates an exit alarm.
▫ When an exit alarm is generated, the system can perform linkage with the
access control system and video surveillance system.
• Platform layer: consists of the positioning engine, iMaster NCE, and GIS/map
platform.
• Network layer: deploys APs to provide Wi-Fi and Bluetooth signal coverage and
management. (Determine whether to deploy iBeacons based on site
requirements. In most cases, iBeacons are required in mobile phone navigation
scenarios.)
▫ An AP scans the RSSI data of Wi-Fi terminals and reports the data.
▫ The AP scans the RSSI data of Bluetooth terminals and reports the data.
• RSSI fingerprint: uses the field strength as the fingerprint characteristic value.
• ToA and TDoA: are used to synchronize time between base stations.
• PoA: determines the distance between two devices based on the carrier phase.
• You can obtain fingerprints in either of the following ways:
• When the RSSI fingerprinting method is used, the positioning accuracy is affected
by multiple factors, such as signal fluctuation, terminal location, and multi-path
signal transmission.
• Anchor: is a positioning base station.
• ToA: The distance to the target is determined based on the arrival time of radio
waves. Then, the target location is calculated based on the triangulation principle.
A terminal transmits signals to more than three anchors. By measuring the time
used for signals from the terminal to different anchors, the distances between
the terminal and anchors are obtained. Then a circle is drawn by using an anchor
as a center and a measured distance as a radius. The intersection point of the
three circles is the location of the terminal. However, ToA requires strict time
synchronization between the node under test and anchors, which cannot be
supported in most application scenarios.
• TDoA: The difference in distances from the target to different anchors (i.e., base
stations) is calculated based on the difference in the arrival time of signals
received by the anchors. The target location is calculated based on the hyperbola
characteristics. TDoA-based positioning works based on hyperbola positioning.
Four anchors are required for two-dimensional positioning. After the anchor time
is synchronized, the terminal sends a broadcast packet to the anchors. After
receiving the broadcast packet, an anchor marks the timestamp at which the
packet is received, and sends content of the packet to the calculation server. The
calculation server calculates the location of the terminal according to timestamps
of positioning packets from other anchors. By measuring the distance difference
between the terminal and every two anchors, a hyperbola can be drawn when
the distance difference is equal to a constant, and the label coordinates can be
determined at the intersection point of the curves.
▫ Hyperbola: A hyperbola is defined as a set of points whose distance
difference from two fixed points is a constant. The hyperbola focus is the
target location.
• AoA is a positioning algorithm based on the signals' arrival angle. It uses
hardware devices to sense the direction of arrived signals from the transmitter,
calculates the relative azimuth or angle between the receiver and an anchor, and
then uses the triangulation or other methods to calculate the location of an
unknown node.
• The positioning accuracy of the preceding wireless positioning solutions is
affected by multiple factors, such as the installation environment, deployment
density, deployment height, and installation angle of APs, and spatial obstacle
distribution. The actual positioning accuracy may differ from the theoretical value.
During delivery, onsite commissioning is required.
• Wi-Fi positioning can also locate rogue APs that are not uniformly deployed and
non-Wi-Fi interference sources (such as microwave ovens).
• The WAC can report location information to the positioning engine using UDP or
HTTP packets.
• Network planning suggestions:
• ABC
• The IANA is responsible for assigning global Internet IP addresses. The IANA
assigns some IPv4 addresses to continent-level RIRs, and then each RIR assigns
addresses in its regions. The five RIRs are as follows:
▫ RIPE: Réseaux IP Européens, which is a European IP address registration
center and serves Europe, Middle East, and Central Asia.
▫ LACNIC: Latin American and Caribbean Internet Address Registry, which is
an Internet address registration center for Latin America and the Caribbean
and serves the Central America, South America, and the Caribbean.
▫ ARIN: American Registry for Internet Numbers, which is an Internet number
registration center in the United States and serves North America and some
Caribbean regions.
▫ AFRINIC: Africa Network Information Centre, which serves Africa.
▫ APNIC: Asia Pacific Network Information Centre, which serves Asia and the
Pacific.
• IPv4 has proven to be a very successful protocol. It has survived the development
of the Internet from a small number of computers to hundreds of millions of
computers. However, this protocol is designed to support the network scale
several decades ago. With the expansion of the Internet and the launch of new
applications, IPv4 has shown more and more limitations.
• In the 1990s, the IETF launched technologies such as network address translation
(NAT) and classless inter-domain routing (CIDR) to delay IPv4 address
exhaustion. However, these transition solutions can only slow down the speed of
address exhaustion, but cannot fundamentally solve the issue.
• Nearly infinite address space: This is the most obvious advantage over IPv4. An
IPv6 address consists of 128 bits. The address space of IPv6 is about 8 x 1028
times that of IPv4. It is claimed that IPv6 can allocate a network address to each
grain of sand in the world. This makes it possible for a large number of terminals
to be online at the same time and unified addressing management, providing
strong support for the Internet of Things (IoT).
• Hierarchical address structure: IPv6 addresses are divided into different address
segments based on application scenarios thanks to the nearly infinite address
space. In addition, the continuity of unicast IPv6 address segments is strictly
required for IPv6 address segments, which facilitates IPv6 route summarization to
reduce the size of IPv6 address tables.
• Plug-and-play: Any host or terminal must have a specific IP address to obtain
network resources and transmit data. Traditionally, IP addresses are assigned
manually or automatically using DHCP. In addition to the preceding two
methods, IPv6 supports SLAAC.
• E2E network integrity: NAT widely used on IPv4 networks damages the integrity
of E2E connections. After IPv6 is used, NAT devices are no longer required, and
online behavior management and network monitoring become simple. In
addition, applications do not need complex NAT adaptation code.
• Enhanced security: IPsec was initially designed for IPv6. Therefore, IPv6-based
protocol packets (such as routing protocol and neighbor discovery packets) can
be encrypted in E2E mode, despite the fact that this function is not widely used
currently. The security capability of IPv6 data plane packets is similar to that of
IPv4+IPsec.
• IPv6 unicast address: identifies an interface. Since each interface belongs to a
node, the IPv6 unicast address of any interface on the node can identify the node.
Packets sent to an IPv6 unicast address are delivered to the interface identified by
this address. IPv6 defines multiple types of unicast addresses, including the
unspecified address, loopback address, LLA, GUI, and ULA.
▫ The IPv6 unspecified address is 0:0:0:0:0:0:0:0/128 or ::/128, indicating that
an interface or a node does not have an IP address. It can be used as the
source IP address of some packets, such as Neighbor Solicitation (NS)
messages in duplicate address detection.
▫ The IPv6 loopback address is 0:0:0:0:0:0:0:1/128 or ::1/128. Similar to the
IPv4 loopback address 127.0.0.1, the IPv6 loopback address is used when a
node needs to send IPv6 packets to itself. This IPv6 loopback address is
usually used as the IP address of a virtual interface such as a loopback
interface.
▫ An IPv6 GUI is an IPv6 address with a global unicast prefix, and is similar to
an IPv4 public address. IPv6 GUIs support routing prefix aggregation,
helping limit the number of global routing entries. A global unicast address
consists of a global routing prefix, subnet ID, and interface ID.
▫ LLAs are used only in communication between nodes on a local link. An LLA
uses the link-local prefix of FE80::/10 as the leftmost 10 bits (1111111010 in
binary) and an interface ID as the rightmost 64 bits. When IPv6 runs on a
node, an LLA that consists of the fixed prefix and an interface ID in EUI-64
format is automatically assigned to each interface of the node. This
mechanism enables two IPv6 nodes on a link to communicate without any
additional configuration. Therefore, LLAs are widely used in neighbor
discovery and stateless address configuration.
• You can apply for a GUA from a carrier or the local IPv6 address management
organization.
• DAD checks whether an IPv6 unicast address is being used before the address is
assigned to an interface. DAD is required if IPv6 addresses are configured
automatically. An IPv6 unicast address that is assigned to an interface but not
verified by DAD is called a tentative address. An interface cannot use a tentative
address for unicast communication.
• Router Advertisement (RA) message: Each routing device (including the IPv6
WAC) periodically multicasts RA messages carrying network prefixes and flags to
declare its existence to hosts and devices on a Layer 2 network.
▫ Alternatively, you can specify either the outbound interface or next hop,
depending on the interface type: For point-to-point (P2P) interfaces, specify
the outbound interface.
▫ For non-broadcast multiple access (NBMA) interfaces, specify the next hop.
▫ For broadcast interfaces, specify the outbound interface. If the next hop
address is also specified, it does not need to be a link-local address.
• Specifying the same preference value for static routes to the same destination
implements load balancing among these routes. Conversely, specifying different
preference values for static routes to the same destination implements route
backup among the routes.
• If the destination IP address and mask are set to all 0s, the default IPv6 static
route is configured. By default, no default IPv6 static route is configured.
▫ If no preference is set for a static route, the static route uses the default
preference 60.
▫ If the destination address and mask of a static route are all 0s, the static
route is a default route.
• The OSS is a support platform used for network service development and
operation. On a typical network, the OSS may be a network management
platform or an SDN controller.
• The ipv6 nd autoconfig managed-address-flag command sets the M flag of
stateful autoconfiguration in an RA message. If the M flag is set, a host obtains
an IPv6 address through stateful autoconfiguration.
• In this example, the WAC and AP belong to the same VLAN. The AP sends a
multicast CAPWAP Discovery Request packet to discover the WAC.
• ND provides powerful functions but lacks security mechanisms. Attackers often
use ND to attack network devices. Attackers often use ND to attack network
devices.
▫ Address spoofing attack: An attacker uses the IP address of host A to send
Neighbor Solicitation (NS) or neighbor advertisement (NA) packets to host
B or the gateway. Host B or the gateway then modifies their ND entries. As
a result, host B cannot receive packets or communicate with other hosts. In
addition, the attacker can intercept the packets of host A to obtain the
game and bank passwords of host A. Host A will suffer a huge loss.
▫ RA attack: An attacker uses the IP address of the gateway to send the
Router Advertisement (RA) packet to hosts. The hosts then modify their ND
entries or record incorrect IPv6 parameters. As a result, the hosts cannot
communicate with each other.
▫ The WAC provides the ND snooping function to prevent ND attacks.
• ND snooping:
▫ Deploy ND snooping on APs, configure the AP's interface connected to the
authorized router (WAC) as a trusted interface, and enable ND protocol
packet validity check on the user-side interface.
▫ When receiving NA/NS/RS packets from a user-side interface, the AP checks
packet validity against the dynamic ND snooping binding table and filters
out forged NA/NS/RS packets.
▫ The AP discards RA messages received from user-side interfaces (untrusted
interfaces by default) and processes only RA messages received from
trusted interfaces. This prevents attacks caused by forged RA messages.
• Bogus DHCP server attack: If a bogus DHCP server sends a bogus DHCP Reply
message with the incorrect gateway address, DNS server address, and IP address
to a DHCP client, the DHCP client cannot obtain the correct IP address and
required information. The authorized user then fails to access the network and
user information security is affected.
• DHCP flood attack: An attacker sends a large number of DHCP messages to a
device in a short period to generate a huge impact on the device performance. As
a result, the device may fail to work.
• Bogus DHCP message attack: An attacker pretends to be an authorized user to
continuously send DHCP Request messages to the DHCP server to renew the IP
address; therefore, the IP address cannot be reclaimed and other authorized
users cannot obtain IP addresses.
• DHCP server DoS attack: A large number of attackers maliciously apply for IP
addresses. As a result, IP addresses on the DHCP server are exhausted and
authorized users cannot obtain IP addresses.
• The DHCP snooping function ensures that DHCP clients obtain IP addresses from
the authorized DHCP server.
▫ If a bogus DHCP server is deployed on the network, DHCP clients may
obtain incorrect IP addresses and network configuration parameters and
cannot communicate properly. The DHCP snooping function controls the
source of DHCP Reply messages to prevent bogus DHCP servers from
assigning IP addresses and other configurations to DHCP clients.
▫ DHCP snooping involves two interface roles: trusted interface and untrusted
interfaces. Trusted interfaces receive DHCP ACK, DHCP NAK, and DHCP
Offer messages from a DHCP server.
▫ The device discards DHCP ACK messages, NAK messages, and Offer
messages on untrusted interfaces.
• Answer 1: Unlimited address space, hierarchical address structure, plug-and-play,
simplified packet header, security features, mobility, and enhanced QoS features.
• Answer 2:
▫ Security options are supported. IPv6 provides optimal support for IPsec,
allowing the upper-layer protocols to omit many security options.
▫ https://serviceturbo-cloud-
cn.huawei.com/serviceturbocloud/dist/#/toolappmarket
• The registration center is a public cloud service provided by Huawei on the
Internet and can therefore be considered a cloud platform. It is mainly used to
implement plug-and-play of devices on the user network. During the deployment
configuration of network devices, the most important thing is to register them
with iMaster NCE and enable them to be managed by iMaster NCE. Huawei
CloudCampus Solution supports the public cloud deployment mode and MSP-
owned cloud deployment mode. Therefore, multiple iMaster NCE instances may
exist on the Internet. The problem is which iMaster NCE should a device register
with after the device is powered on and connected to the network?
▫ A device identifies a user as a VIP if the user belongs to a VIP user group.
The priority field is added to the user authorization structure. After users
are added to a VIP user group and the authorization information is
delivered to the VIP user group, users in the VIP user group inherit the
priority of the VIP user group.
• D
• Wired, wireless, and IoT network convergence, allowing diversified terminals and
services
▫ Huawei S series switches integrate the WLAN access controller (WAC)
functionality to implement wired and wireless convergence and provide
unified wired and wireless management and experience. Huawei APs
integrate IoT modules to provide functions of IoT base stations,
implementing converged Wi-Fi and IoT networks as well as simplified
management. Huawei's solution provides unified authentication and access
policy control for wired and wireless users by integrating the user
authentication, user management, and policy association functions.
Administrators can obtain consistent user management experience and
simplify O&M of wired and wireless networks.
• All-scenario WLAN: ideal for differentiated access requirements of customers
▫ Huawei provides Wi-Fi 6 APs, high-density APs, and an agile distributed Wi-
Fi solution tailored for a diverse of scenarios, such as common indoor
deployments, high-density stadiums, outdoor environments, and dense
rooms. These offerings provide pervasive high-density WLAN coverage and
deliver assured user access experience. The resulting benefits include
convenient deployment and reduced investment costs.
• Hybrid optical-electrical switch providing PoE++ power over a distance of up to
300 m: higher bandwidth and more flexible network deployment
▫ With the advent of 802.11ax standards and products, the access rate of
STAs exceeds 1 Gbps. However, the access rate of GE interfaces fails to
meet this trend. Huawei provides hybrid optical-electrical switches in the
industry. The switches provide PoE++ power for APs over a distance of up to
300 m.
• Network layer
▫ Physical network: is also called the underlay network and provides basic
connection services for campus networks. To meet access requirements of
multiple types of terminals, the physical network provides a unified three-
network access capability, and allows access of wired, wireless, and IoT
terminals simultaneously.
• Management layer
• Virtual network layer: also called overlay network. It is abstracted from the
physical network layer through virtualization technologies to group physical
network resources into a network resource pool that can be flexibly scheduled by
the service layer. Multiple VNs can be created on a fabric based on service
requirements to isolate services. On a traditional campus network, to isolate
services, the OA network and security network are designed as two independent
physical networks. On a virtualized network, physical network sharing is
implemented through the overlay. That is, two VNs can be created and used as
the OA network and security network for service isolation.
• Hierarchical design
• Modular design
• Redundancy design
• Symmetry design
▫ The symmetric network structure makes the topology clearer and facilitates
service deployment, and protocol design and analysis.
• Determine the number of ports on access switches based on the network scale.
Generally, one port corresponds to one terminal or one network access point (for
example, AP).
• Select switches based on the port rates of terminals' network adapters.
• Calculate the number of access switches. Number of access switches required =
Number of access ports/Downlink port density of an access switch. If the
calculation result is greater than 1, aggregation switches need to be deployed.
Otherwise, use the single-layer architecture.
• Select aggregation switches based on the uplink port rates of access switches.
• Calculate the number of uplinks of an access switch using either of the following
methods:
▫ Based on the network bandwidth: Number of uplinks = Network
bandwidth/Uplink port rate of an access switch
▫ Based on the network scale: Number of uplinks = Number of access ports x
Access port rate x Bandwidth oversubscription ratio/Uplink port rate of an
access switch
• Calculate the number of aggregation switches. Number of aggregation switches
required = Number of uplinks of access switches/Downlink port density of an
aggregation switch. If the number is greater than 1, select the three-layer
architecture. Otherwise, use the two-layer architecture.
• In the preceding calculations, the calculation results need to be rounded up.
• To simplify O&M, the stacking core networking is recommended. If the customer
is sensitive to service interruption, the dual-core networking is recommended.
▫ You are advised to use the DHCP option mode to achieve plug-and-play
deployment
▫ The core switch at a tenant's site can function as the DHCP server. The
administrator can configure the DHCP server function and Option 148
parameters on the controller. If possible, a third-party DHCP server can also
be used.
▫ The administrator then uses the preceding methods to deploy and bring
devices online.
▫ After devices go online and register with the controller, the controller
automatically checks whether the actual topology of the devices is the
same as the planned one. If cables are incorrectly connected during
installation, the controller immediately notifies the administrator.
• The following network resources need to be planned for underlay automation:
▫ Network scope for the fabric: Devices are connected through VLANIF
interfaces at Layer 3. Each interconnection link is assigned a VLAN.
▫ In the resource model design for the fabric, network service resources are
created on the border node so that service terminals on the campus
network can access service resources in the network management zone,
such as the DHCP server and NAC server.
▫ You can create multiple network service resources, or add addresses for
accessing network service resources to a network service resource model.
▫ This mode applies to scenarios where access users are densely distributed.
For example, all access users are located on the same floor of the same
building.
• Application scenarios of the three-layer networking:
▫ This mode applies to scenarios where access users are sparsely distributed.
For example, all access users are located in different buildings. Therefore,
traffic of each building can be centralized through aggregation switches,
and traffic of different buildings can be centralized through core switches in
the core equipment room.
• It is recommended that core devices be used as border nodes. Access or
aggregation devices can be used as edge nodes, and you are advised to use
access devices as edge nodes.
• You are advised to configure BGP EVPN route reflectors (RRs) on the VXLAN
network. After RRs are configured, BGP peer relationships only need to be
established between edge and border nodes.
• Both border and edge nodes can function as RRs. It is recommended that border
nodes be used as RRs because they have the strongest processing capability.
• Policy design:
• VN access design:
▫ Service data enters different VNs according to the VLAN to which the user
belongs from a physical network through an edge node. Therefore, during
network design, you need to plan the mappings between VLANs of physical
networks and BDs of VNs, and configure VLANs for wired and wireless
users.
• Dynamically authorized VLAN mode:
▫ Authorized user VLANs of wired users can be either directly delivered or
delivered through policy association to corresponding interfaces of access
switches.
▫ A service VLAN is configured for the SSID of a wireless user, but the service
VLAN does not take effect. After the user is authenticated successfully, an
authorized VLAN is delivered to the user and takes effect.
• Static VLAN mode:
▫ A static VLAN is configured for wired users on an interface of an access
switch.
▫ A static service VLAN is configured for wireless users on an SSID.
• Application scenarios:
▫ The static VLAN mode applies when terminals access the VLAN at fixed
locations and do not need to be authenticated. This access mode is more
secure but lacks flexibility. When the locations of terminals change, you
need to perform the configuration again.
▫ The dynamically authorized VLAN mode applies when terminals access the
VLAN anywhere and need to be authenticated based on the VLAN
information delivered during user authentication. This access mode is
flexible and the configuration does not need to be changed when the
locations of terminals change. Dynamic access is more automated, easy to
manage and use, and is recommended.
• Inter-VN communication can be implemented through a border node or an
external gateway.
▫ Through a border node: If two VNs belong to the same security zone and
have low security control requirements, devices on the two VNs can directly
communicate with each other through a border node. In addition,
permission control can be implemented based on the free mobility policy.
To implement communication between VNs, the border node needs to
import the network segment routes that can be reachable between devices
on the VNs.
• Hybrid authentication mode is applicable to scenarios where one port is used for
access of multiple types of users. For example, if a PC is connected upstream to
an IP phone, you can configure hybrid authentication (MAC address
authentication + 802.1X authentication). In this way, the IP phone uses MAC
address authentication, and the PC uses 802.1X authentication.
• On large and medium-sized campus networks, access terminals include smart
terminals (such as PCs and mobile phones) and dumb terminals (such as IP
phones, printers, and IP cameras). Currently, terminal management on campus
networks faces the following challenges:
▫ The network management system (NMS) can only display the IP and MAC
addresses of access terminals, but cannot identify the specific terminal type.
As a result, the NMS cannot provide refined management for network
terminals.
▫ Network service configurations and policies vary according to the terminal
type. Consequently, administrators need to manually configure different
services and policies for each type of service terminals, complicating service
deployment and operations.
• To address these challenges, Huawei provides the automatic terminal
identification and policy delivery solution, which delivers the following functions:
▫ iMaster NCE-Campus can display the network-wide terminal types and
operating systems, for example, dumb terminals including printers, IP
cameras, smart all-in-one cards, and access control systems. iMaster NCE-
Campus can also collect statistics and display traffic by terminal type.
▫ Administrators do not need to manually configure different services and
policies for different types of dumb terminals such as IP phones, printers,
and IP cameras on the campus network. iMaster NCE-Campus can
automatically identify terminals and deliver the corresponding access
policies and service configurations to them.
• When a terminal accesses the network, the network device connected to it can
collect information about the terminal and report the information to iMaster
NCE-Campus or iMaster NCE-Campus automatically scans terminal information.
Then, iMaster NCE-Campus automatically identifies the type, operating system,
and vendor of the terminal.
• Passive fingerprint-based identification: Network devices collect fingerprints of
terminal packets and report the fingerprints to iMaster NCE-Campus for terminal
type identification.
• 2.4G@HT20 indicates that the 2.4 GHz frequency band uses 20 MHz bandwidth,
and 5G@HT40 indicates that the 5 GHz frequency band uses 40 MHz bandwidth.
• Experience rate: perceived data rate under a light network load
• 2.4G@HT20 indicates that the 2.4 GHz frequency band uses 20 MHz bandwidth,
and 5G@HT40 indicates that the 5 GHz frequency band uses 40 MHz bandwidth.
• 2.4G@HT20 indicates that the 2.4 GHz frequency band uses 20 MHz bandwidth,
and 5G@HT40 indicates that the 5 GHz frequency band uses 40 MHz bandwidth.
• Experience rate: perceived data rate under a light network load
• The public cloud management mode can be Huawei public cloud management
mode or MSP-owned cloud management mode. The two modes are essentially
the same. The only difference lies in the operational entity and the provider that
offers cloud management services. Unless otherwise specified, the Huawei public
cloud management mode is used as an example in the following slides.
• Huawei CloudCampus Solution for small and medium-sized campus networks
uses cloud computing technology to implement automatic and centralized
network management, and provides data collection and analysis capabilities that
are unavailable on traditional networks, so as to achieve network (LAN/WLAN)
as a service (NaaS).
• There are three layers in the architecture of Huawei CloudCampus Solution for
small and medium-sized campus networks: multi-tenant network, iMaster NCE-
Campus, and value-added SaaS platform.
• Multi-tenant network: It consists of hundreds of network devices, including APs,
switches, firewalls, and ARs, and is deployed at the customer side to provide user
access.
• Cloud management platform: iMaster NCE-Campus — an SDN controller — is
the core component of the CloudCampus Solution. It is also a cloud-based
network management, O&M, and control system. In addition to basic
management and configuration for cloud-based devices, remote O&M and
monitoring, and user admission control, iMaster NCE-Campus can implement
various value-added services based on the big data platform. iMaster NCE-
CampusInsight is an intelligent network analysis engine and provides intelligent
O&M services for user networks. It integrates AI to the O&M.
• Value-added SaaS platform: iMaster NCE-Campus provides open interfaces to
interconnect with other service systems (such as the big data platform) to offer
tenants a variety of value-added application services, such as customer flow
analysis, business portal push, electronic shelf label (ESL), asset management,
and medical IoT.
• The roadmap of designing the architecture of Huawei CloudCampus Solution for
small and medium-sized campus networks is as follows:
▫ Reliability of egress links: In most scenarios, there is only one egress link,
and therefore no link redundancy needs to be considered. In scenarios that
need high reliability, more than one egress link needs to be deployed, so
primary and secondary links must be configured.
• The internal routing design for the campus network must meet the
communication requirements of devices and terminals on the campus network
and enable interaction with external routes. As the campus network is small in
size, the network structure is simple.
• The egress routing design must be able to support Internet and WAN access of
intranet users. When the egress device is connected to the Internet or WAN, you
are advised to configure static routes on the egress device.
• Network planning is important for WLAN project implementation. WLAN
planning consists of the following parts:
• This document does not describe the WLAN design from the preceding
dimensions. For details, see the WLAN Design Guide.
https://e.huawei.com/en/material/networking/campusnetwork/5133b49714a04ab
08d5851d0e44e59a1
• When a traditional network and a traditional WAC are deployed, the calibration
compute engine resides on the WAC. When a cloud network is deployed, the
calibration compute engine resides on the leader AP.
• Notes:
▫ When a STA roams at Layer 3, its traffic is detoured to the AP that the STA
accesses for the first time or another AP in the same Layer 2 domain as the
AP that the STA accesses for the first time. Therefore, it is recommended
that a large Layer 2 domain be planned for APs at the network ingress to
facilitate traffic detouring and load sharing after Layer 3 roaming.
• Customer flow analysis requires APs to periodically report STA information to
iMaster NCE-Campus. The STA information includes the MAC address, IP address,
access AP, SSID, and signal strength. Therefore, enable the function of reporting
STA locations in the settings of the site where the APs reside on iMaster NCE-
Campus. If using STA information may pose data security threats, disable this
function.
• ABCD
• After VXLAN technology is introduced, multiple virtual networks (VNs) can be
created on one physical network of a campus network. Different VNs are applied
to different services, such as OA, R&D, and IoT.
• The source VTEP encapsulates packets and sends the encapsulated packets to the
destination VTEP through the VXLAN tunnel. After receiving the encapsulated
packets, the destination VTEP decapsulates the packets.
▫ RR: A BGP device that can reflect the routes learned from an IBGP peer to
other IBGP peers.
▫ Client: An IBGP device whose routes are reflected by the RR to other IBGP
devices. In an AS, clients need to be directly connected to the RR only.
• Clients in a cluster need to exchange routing information only with the RR in the
same cluster. Therefore, clients need to establish IBGP connections only with the
RR. This reduces the number of IBGP connections in the cluster. After a client
advertises a route to an RR, the RR reflects the route to all other clients.
• Policy association provides a solution to contradiction between policy strengths
and complexity on large campus networks. In the solution, user access policies
are centrally managed on the gateway devices and enforced by gateway and
authentication access devices.
• On a fabric network, VXLAN tunnel endpoints (VTEPs) are further divided into
the following roles:
• The following part of this course focuses on key operations in the deployment
process.
• iMaster NCE-CampusInsight can be deployed independently or integrated with
iMaster NCE-Campus. When iMaster NCE-CampusInsight is deployed
independently, network device functions (such as data reporting) must be
configured on each device using commands. When iMaster NCE-CampusInsight is
integrated with iMaster NCE-Campus, network device configurations can be
automatically delivered by iMaster NCE-Campus. In addition, iMaster NCE-
Campus can work with iMaster NCE-CampusInsight to implement functions such
as path tracing and fault demarcation. It is recommended that iMaster NCE-
CampusInsight be integrated with iMaster NCE-Campus in the CloudCampus
Solution. To prevent the instability of the network between iMaster NCE-
CampusInsight and iMaster NCE-Campus, it is recommended that iMaster NCE-
CampusInsight and iMaster NCE-Campus be deployed at the same location, for
example, in the same data center or equipment room.
• In the virtualization solution for a large or midsize campus network, after the
software (including iMaster NCE-Campus software) is installed on servers, you
need to configure the gateway in the network management zone. During the
configuration, ensure that each network plane of each software server cluster can
communicate. Additionally, ensure that each software component can
communicate with the campus network.
• This slide describes how to configure the gateway in the network management
zone. If the network management zone where the software (including iMaster
NCE-Campus software) is deployed is a data center network, refer to the data
center network solution for the networking on the server side and the gateway
configuration.
• In this example, VLAN 20 and VLAN 30 are used for interconnection between
Switch and Core. The traffic on the management plane is separated from that on
the service plane. Therefore, two independent interconnection VLANs are used.
• On a large or midsize campus network, the WLAN typically adopts the "WAC +
Fit AP" architecture, under which Fit APs are centrally managed and configured
by the WAC. After the WAC is managed by iMaster NCE-Campus, you can switch
to the web system of the WAC from iMaster NCE-Campus to manage Fit APs.
• To facilitate device management and improve service deployment efficiency, add
devices on the same network of a tenant to the same site.
• You can create sites on iMaster NCE-Campus for unified O&M management. Two
methods are available to create sites:
▫ Create sites one by one: You can create sites one by one when a small
number of sites need to be added.
▫ Create sites in a batch: You can create sites in a batch when a large number
of sites need to be added. Cloud sites cannot be created in a batch.
• Customer pain points: In traditional network deployment, engineers need to
commission network devices one by one onsite, resulting in heavy configuration
workload and low efficiency.
• In this step, switches on the campus network can be directly deployed using
factory settings and get managed by iMaster NCE-Campus, greatly reducing the
configuration workload.
• Parameters in the fabric global resource pool:
▫ VLAN: Configure a service VLAN pool when you need to configure VLANs
for interconnection with external gateways and network service resources,
management VLANs for policy association, and access VLANs for virtual
network access.
▫ BD: On a VXLAN network, VNIs can be mapped to BDs in 1:1 mode so that
a BD can function as a VXLAN network entity to transmit traffic.
• Role: Specify the roles of devices on the fabric, including the border node, edge
node, and extended node. By default, the role of a device is an extended node.
• Automatic routing domain configuration: After this function is enabled, the
underlay network is automatically configured. You can specify sites for automatic
routing domain configuration and specify OSPF route parameters. Currently, the
following parameters are supported:
▫ Area: In a single-area OSPF network, all devices belong to OSPF area 0. In a
multi-area OSPF network, border nodes belong to OSPF area 0, and each
edge node and its connected border node belong to the same area.
▫ Network type: You can specify the OSPF network type to broadcast, p2mp,
or p2p.
▫ Encryption: You can set the encryption mode between adjacent devices to
hmac-sha256, md5, or none.
▫ Key: It refers to the authentication key ID used for ciphertext authentication
on an interface, and must be consistent with that of the peer device. The
value is an integer in the range from 1 to 255.
▫ Password: It specifies the ciphertext authentication key. The value is a string
of 1 to 255 characters and cannot contain spaces.
▫ Confirm password: You need to enter the ciphertext authentication key
again for confirmation.
▫ OSPF GR: You can enable OSPF GR.
• AS number: You can specify the BGP AS number used on a fabric network.
• After this step is complete, a fabric is successfully created based on the physical
network, and the underlay network configuration (such as interconnection
between network devices and OSPF configuration) is automatically completed by
iMaster NCE-Campus, laying a foundation for creating VNs.
• In this step, create user network segments for the VN. Network segments can be
manually created one by one by the network administrator or created in a batch
through automatic allocation.
• This step specifies the wired access port and wireless access points of the VN.
• A security group is a collection of communication objects on a network. Security
groups can be authorized to users based on 5W1H conditions. Users who meet
the 5W1H conditions can be authorized to the specified security groups.
Alternatively, security groups can be defined by statically binding IP addresses.
Security group-based authorization is delivered through Huawei proprietary
RADIUS attributes (26-160).
• By default, the unknown and any groups are supported. Unauthenticated users or
resources are added to the unknown group. The any group is generally used to
configure default rules for any users or resources. The any group can only be
used as the destination group, not as the source group.
• After security groups and resource groups are defined, tenant administrators can
define inter-group network-wide access control policies based on the security
groups and resource groups. The inter-group control policies are presented in a
policy matrix. After the policy matrix is defined, tenant administrators can
configure policies for controlling access from the source security group to the
destination security group or resource group based on the policy matrix.
• iMaster NCE-Campus has a default authentication rule named default. If this rule
applies, users are authenticated using the local data source by default. You can
modify the default rule to configure user authentication based on a third-party
data source.
• You can configure the permission set, traffic rate limiting policy, and filtering
policy obtained after end users pass authentication in an authorization result
when configuring Portal authentication, 802.1X authentication, or MAC address
authentication. Configuring authorization results is applicable to the scenario
where authentication points reside on firewalls, ARs, APs, switches, or WACs, and
can be performed for specific user groups.
• After an end user passes authentication, the authorization result specifies the
rights of the end user. If the authorization rule is met, the end user matches the
authorization policy. The authorization result takes effect for the end user that
matches the authorization rule. If no authorization rule is set, the authorization
result is applicable to all authenticated end users.
• Portal authentication involves four main components: user client, authentication
control point, Portal server, and authentication server.
▫ User client: a host that has a browser running the HTTP/HTTPS protocol
installed.
▫ Portal server: provides free web portal services and authentication GUI for
user clients and exchanges authentication information of user clients with
access devices.
• ABCD
• In deployment design, the following items need to be considered for network
planning: administrator roles, sites, physical networks, deployment modes, basic
services, WLAN services, and network admission control.
• The design and planning of small and medium-sized campus networks involve
multiple aspects. For example, the LAN-side networking solution design, network
design, QoS design, security design, and O&M management design.
• This document describes only WLAN network planning. For details about other
contents, see the HCIE-WLAN certification course CloudCampus Solution for
Small and Medium-Sized Campus Networks.
• Huawei provides WLAN Planner, a cloud-based network planning tool. You can
use this tool to easily complete WLAN planning, obtain the AP deployment plan,
and import the network planning result to iMaster NCE-Campus.
▫ Keep antennas away from electronic equipment that may cause signal
interference, such as microwave ovens.
• For a device with a built-in antenna, the requirements on the distance between
devices are the same as the preceding requirements.
• A wall for installing the device needs to meet the following requirements:
▫ The wall can bear the weight of four times the total weight of the device
and mounting bracket without damage. When the total weight of the
device and mounting bracket is less than 1.25 kg, the load-bearing
capability of the wall must be greater than or equal to 5 kg.
▫ When the tightening torque of a screw reaches 3.5 N•m, the screw still
properly works, without crack or damage on the wall.
• Mounting brackets and expansion screws are required to install the AP on a wall.
The procedures are as follows:
▫ Attach the mounting bracket against the wall and adjust its position
properly. Mark positions of the mounting holes with a marker.
▫ Use a 6 mm drill bit to drill 35 mm to 40 mm deep holes in the marked
positions. Hammer the expansion tubes into the holes until the expansion
tubes are completely embedded into the wall.
▫ Fix the mounting bracket to the wall, and use a Phillips screwdriver to
fasten three expansion screws into the expansion tubes.
▫ Connect and properly route the cables.
▫ Fasten the AP according to the figure. When you hear a click, the AP is
secured to the lock position.
• After the device is installed, ensure that the ejector lever springs back in place.
Ensure that the installation space meets the specified requirements to facilitate
future maintenance.
• In a scenario with heavy vibrations, tighten the AP to the mounting bracket using
M3x12 screws with a torque of 0.5 N•m. This prevents the AP from falling off due
to vibrations. In normal scenarios, you do not need to install these screws.
• With certain IT capabilities, a tenant administrator can deploy and maintain a
campus network. This scenario is called tenant-managed construction and
maintenance. The tenant administrator is the main implementer, and the MSP
administrator only provides simple deployment assistance. The tenant
administrator can apply to the MSP for the managed construction and
maintenance services. After being authorized, the MSP constructs and maintains
the campus network for the tenant. This scenario is called MSP-managed
construction and maintenance, in which the MSP administrator is the main
implementer.
• You can create sites on iMaster NCE-Campus for unified O&M management. Two
methods are available to create sites:
▫ Create sites one by one: You can create sites one by one when a small
number of sites need to be added.
▫ Create sites in a batch: You can create sites in a batch when a large number
of sites need to be added. Cloud sites cannot be created in a batch.
▫ Network health score (WAN) = Average quality of all links at a site (SLQM:
site link quality monitor) x 10
• You can view basic device information, including the device name, version
number, patch version, model, public IP address, vendor, registration time,
description, online time, MAC address, last offline time, ESN, SSH proxy tunnel,
southbound IP address, and performance data reporting interface.
• You can perform ping/self-ping, trace, and virtual cable test (VCT) operations to
test network connectivity.
• You can check the CPU usage and memory usage of the device.
▫ Bind the AAA schemes to the domain and then bind the domain to the
authentication profile.
• If both the methods are used, the AAA schemes bound to the authentication
profile take effect preferentially. In this case, check the configuration mode of
AAA schemes in the authentication profile and then check whether the AAA
scheme configuration is correct in the corresponding view.
• In the command output:
▫ If the message "Account test succeed" is displayed, the link between the
device and RADIUS server is normal, and the user name and password are
correct.
▫ If the message "Account test time out" is displayed, the device and RADIUS
server are unreachable or the RADIUS server template is incorrectly
configured.
• If Portal authentication is triggered when you attempt to access an HTTPS
website, the browser displays a security prompt, requiring you to click Continue
to complete Portal authentication.
• Redirection is not supported if the browser or website runs HTTP Strict Transport
Security (HSTS).
▫ If the Portal server status is Abnormal, check whether the Portal server
supports the detection function and whether the Portal server detection
function is enabled.
▫ If the Portal server supports the detection function, enable the Portal server
detection function.
▫ If the Portal server does not support the detection function, run the
following commands on the WAC to disable the Portal server detection
function:
▪ <WAC> system-view
▫ All STAs on a WLAN share and compete for bandwidth resources. If there
are a large number of STAs or many broadcast and multicast packets
(these packets are sent at a low rate and consume many air interface
resources) on the WLAN, STAs may preempt channels of each other. As a
result, the channel utilization is high, the WLAN is unstable, the ping packet
delay is long, and packet loss occurs.
• If the buffer queue of the AP's Wi-Fi driver module is congested, the buffer queue
is occupied by some STAs. For example, when a STA has weak signals or leaves
the Wi-Fi coverage area, packets sent to the STA cannot be sent out and are
blocked in the buffer queue of the AP.
• Check the packet sending queue of the AP's Wi-Fi driver module using the display
wifi txq-buf radio radio-id command.
• If the buffer queue of the AP Wi-Fi driver module is congested, the buffer queue
is occupied by some STAs. For example, when a STA has weak signals or leaves
the Wi-Fi coverage area, packets sent to the STA cannot be sent out and are
blocked in the buffer queue of the AP.
• For an AP that supports only 802.11ac, such as AP5x30xN, check the packet
sending queue of the Wi-Fi driver module of the AP.
▫ In V200R007 and later versions, run the display wifi txq-buf radio radio-id
command.
• For an AP that supports only 802.11n, such as AP6x10xN, check the packet
sending queue of the Wi-Fi driver module of the AP.
▫ In V200R006C20 and later versions, run the display wifi txq-buf radio radio-
id command.
• Configure Layer 2 isolation on the interfaces of the switch or WAC. The WAC is
used as an example.
▫ <WAC> system-view
▫ [WAC-GigabitEthernet0/0/1] quit
▫ [WAC] wlan
▫ [WAC-wlan-traffic-prof-default] user-isolate l2
• Enable rate limiting for broadcast and multicast packets on the switch or WAC.
The WAC is used as an example.
▫ <LSW> system-view
▫ [LSW-cpu-defend-policy-test] quit
▫ [LSW-cpu-defend-policy-test] quit
• If the STA's RSSI is low due to the preceding reasons, you can move the STA
closer to the AP to increase the STA's RSSI. It is recommended that a STA's RSSI
be greater than –65 dBm.
• If both a STA and an AP support 802.11ax, the 160 MHz channel bandwidth can
be configured.
• The channel bandwidth must be supported by the AP. For example, non-802.11ax
APs do not support the 160 MHz channel bandwidth.
• The actual link setup rate of a STA may be lower than the maximum link setup
rate due to interference on the air interface.
• p: permit
• i: interference
• Ch: Channel
• The result of the air interface scanning is not displayed during the first query.
Therefore, you need to run this command again.
• When AP radio scanning is enabled using this command, the air interface
performance of the AP is affected. If this command is not executed again within
5 minutes, AP radio scanning is automatically disabled.
• If the parameter radio radio-id is not specified, air interface information about all
radios on the AP is displayed.
• If Receive from fwd is not displayed, the ping request packet is not successfully
sent from the forwarding module to the Wi-Fi module. In this case, there is a
high probability that the fault occurs on the wired side.
• If Receive from fwd is displayed but send to air ok is not displayed, the Wi-Fi
module fails to send the packet to the STA. In this case, the fault occurs on the
wireless side.
• If send to np ok is displayed, the STA has sent the ping response packet, which is
forwarded to the forwarding module. In this case, there is a high probability that
the fault occurs on the wired side.
• If the ping request packet is successfully sent to the STA but send to np ok is not
displayed, the fault occurs on the wireless side.
• SeqNo[xxx]: indicates the sequence number carried in a ping packet. This field
can map the trace action and a specific ping packet.
• Receive from fwd: indicates that the Wi-Fi module receives a ping request packet
sent from the forwarding module destined for the STA.
• send to rt ok: indicates that the Wi-Fi PMAC module successfully sends a ping
request packet to the SMAC module.
• send to air ok: indicates that the Wi-Fi module successfully forwards the ping
request packet to the STA through the air interface.
• send to np ok: indicates that the Wi-Fi module successfully forwards the ping
response packet to the forwarding module for processing and to the wired
network device through the AP's network port.
• send to air fail, reason code: 0: indicates that receiving a response frame times
out and further analysis is required.
• Adjust the transmit power.
▫ [WAC-wlan-view] ap-id 19
▫ [WAC-wlan-ap-19] radio 1
▫ [WAC-wlan-radio-19/1] eirp 20
• Reduce the transmit power based on actual test results while ensuring that the
coverage requirements can be met. You are advised to adjust the transmit power
of surrounding APs at the same time.
• Configure the function of disconnecting low-RSSI STAs.
▫ [WAC-wlan-view] rrm-profile name default
▫ [WAC-wlan-rrm-prof-default] smart-roam enable //In V200R008C10 and
later versions, smart roaming and the function of quickly disconnecting
STAs are enabled by default.
▫ [WAC-wlan-rrm-prof-default] smart-roam quick-kickoff-threshold snr 20
• Configure the SNR-based threshold based on actual network coverage conditions.
For example, configure a high threshold in areas where APs are densely
deployed. Otherwise, configure a low threshold.
• Determine whether to disable Layer 3 roaming according to the service
requirements. To enable Layer 3 roaming, run the undo layer3-roam disable
command.
• Non-authentication, MAC address authentication, and SN authentication; MAC
address authentication; In the WLAN view, run the ap auth-mode XXX command
to change the authentication mode.
• Network health topology as a uniform portal for rapidly handling network and
device problems in local buildings, simplifying network O&M.
▫ Access Experience
▫ Roaming Experience
▫ Throughput Experience
▫ The O&M personnel check the audio and video session list in the office area
and find that the session quality is poor for a client. After checking the
poor-quality session details, the O&M personnel find that a large number of
packets are lost on the access switch of the client. The correlative analysis
result of access switch port KPIs shows that the port is congested. After the
traffic rate limit is adjusted and the port congestion issue is solved, the
quality of the audio and video session becomes normal.
• Constraints:
▫ This feature is supported only for audio and video applications that use
non-encrypted SIP signaling and are carried by the RTP in the IPv4 scenario.
Huawei IP phones, such as HUAWEI Video Phone 8950, can function as
hard terminals.
▫ Switches of specific models support audio and video service analysis, while
APs of specific models support only audio service analysis. For details, see
HUAWEI Device Support SPEC List in the CampusInsight specification list.
▫ Connection failure but not a fault: Due to the instability of wireless client
access (for example, when a client moves or passes through a coverage
hole), the user authentication failure persists in each time segment, but
does not affect user experience. The fault is rectified after the user
automatically accesses the network again.
• In densely populated scenarios such as canteens, offices, waiting rooms, and
cafes, a large number of STAs connect to APs and then leave after a short period
of time. The air interface resources of these APs are occupied by these STAs,
resulting in performance deterioration. In addition, the network access experience
of such STAs is affected due to unnecessary switching of network access modes.
For ease of description, these APs are called edge APs, and STAs that are
temporarily connected and quickly leave are called nomadic STAs. The
CampusInsight can determine whether an AP is an edge AP based on the
network indicator data reported by the AP. In the next AI-Powered Predictive
calibration, the CampusInsight adjusts the AP's transmit power to suppress access
of nomadic STAs and improve the health of AP radios.
• ABCD
• The network evaluation process consists of delivery preparation, network
information collection, network evaluation analysis, and network evaluation
report output.
• Delivery preparation include:
▫ Analyze original user requirements and clarify signal coverage, signal
quality, service experience, etc.
▫ Interview the customer and investigate the issues on the live network.
▫ Formulate the acceptance solution with the customer. Generally, the
acceptance solution is presented as an acceptance report.
• Information to be collected includes:
▫ Obtain written authorization from the customer.
▫ Collect data related to issues reported by the customer.
▫ Collect the configuration and running data of the WAC and access switches
(optional).
▫ Use eDesk to inspect the WAC and access switches.
▫ Test the signal quality and user experience based on the WLAN Service Test
Solution negotiated with the customer, and collect related service test data.
• Network evaluation analysis is an important part of the network evaluation
report. It is recommended that this report include the heat map analysis report,
wireless network performance evaluation, service experience evaluation, wired
network evaluation, and evaluation and optimization suggestions.
• CloudCampus APP, WLAN Planner, and eDesk are Huawei WLAN tools. Related
data can also be collected by other tools.
• The wireless network performance data and service experience test data will be
introduced later.
• Start the CloudCampus APP. Touch Tool, and then touch Acceptance.
• Use the uniportal account to log in to WLAN Planner. Click Settings in the upper
right corner and select the offline or online dotting mode.
• The reference concurrency rate varies depending on scenarios. For details about
the reference concurrency rate in different scenarios, see Scenario-based WLAN
Design series.
• https://support.huawei.com/enterprise/en/doc/EDOC1000133941
• Based on the CloudCampus APP, users can view Wi-Fi interference information,
including the number of SSIDs on the current air interface, strength of
interference signals, and recommended channels.
• Figure 1 shows all SSIDs in the air interface environment (each curve represents
one SSID). You can view the working channel of the local SSID and other SSIDs
working on the current channel.
• Figure 2 shows the strength of interference signals. You can select a frequency
band and check the interference rate of radio signals on each channel to identify
cleaner channels with less interference (recommended channels).
• Use the WLAN Evaluation Report as the input to start the WLAN optimization
process. The WLAN optimization process is classified into different phases: wired
network optimization, WAC optimization, AP optimization, and STA optimization
based on engineering habits. Optimization objects vary in these phases. Finally,
network optimization engineers output the WLAN Optimization Solution.
▫ User rate limiting: The STA rate is limited without compromising user
experience to ensure the network availability of most STAs.
▫ Indoor distributed antennas must be installed away from girders and metal
objects to reduce signal attenuation caused by obstacles.
• The 5 GHz frequency band supports a minimum rate of 6 Mbps and has many
channels. Therefore, this parameter is not adjusted on the 5 GHz frequency band.
• The RTS/CTS mechanism brings extra overheads during packet transmission. If
the value is too small, the overall air interface throughput is affected. You can
adjust the value based on the actual effect.
• If mutual access between LANs is required, do not enable Layer 2 isolation.
• After the real-time accounting function is configured, the device sends real-time
accounting packets to the accounting server at intervals. After receiving the real-
time accounting packets, the accounting server charges the user. If the device
detects that the paid user goes offline, it stops sending real-time accounting
packets and the accounting server stops accounting. The accounting result is
precise.
• WLAN optimization involves a series of tasks, including wireless network
requirement survey, network evaluation, and optimization implementation. These
tasks are performed by WLAN optimization engineers to resolve problems such
as poor wireless service experience, high O&M costs, and difficult fault locating.
WLAN optimization consists of information collection, WLAN evaluation, and
WLAN optimization solution design.
• ABCD
• What are the differences between WLAN planning in indoor scenarios and that in
outdoor scenarios?
▫ In indoor scenarios, only the indoor building floor plan is required. In
outdoor scenarios, in addition to the floor plan, coordinates are required.
▫ In indoor scenarios, you can easily test signal attenuation. In outdoor
scenarios, if obstacles are too large, you need to circumvent obstacles or
estimate the obstacle height to raise the antenna positions.
▫ In outdoor scenarios, more factors need to be considered, including power
supply, cable routing, waterproof design, surge protection, dustproof design,
and antenna selection.
• What factors need to be considered during channel planning? Why?
▫ Interference: Avoid co-channel and adjacent-channel interference, and use
recommended channels such as 1, 5, 9, 13, and 149 to 165. In addition, pay
attention to local laws and regulations, which determine legitimate
channels in a country. For example, in China, channel 36 cannot be used on
the outdoor 5 GHz frequency band but can be used on the indoor 5 GHz
frequency band.
▫ Frequency bandwidth: The frequency bandwidth can typically be set to 20
MHz, 40 MHz, 80 MHz, or 160 MHz. Requirements on frequency bandwidth
vary depending on scenarios.
▫ Power: The power is usually planned together with channels. High power
may lead to unnecessary interference.
• During the onsite interference survey, record the height, frequency band,
frequency bandwidth, power, and direction of interference sources to reduce
interference during AP deployment.