01-02 Solution Design
01-02 Solution Design
2 Solution Design
The functions of each layer and each zone are described as follows:
● Terminal layer
The terminal layer involves various terminals that access the campus network,
such as PCs, printers, IP phones, mobile phones, and cameras.
● Access layer
The access layer provides various access modes for users and is the first
network layer to which terminals connect. The access layer is usually
composed of access switches. There are a large number of access switches
that are sparsely distributed in different places on the network. In most cases,
an access switch is a simple Layer 2 switch. If wireless terminals are present at
the terminal layer, wireless APs need to be deployed at the access layer and
access the network through access switches.
● Aggregation layer
The aggregation layer sits between the core and access layers. It forwards
horizontal traffic (east-west traffic) between users and forwards vertical
traffic (north-south traffic) to the core layer. The aggregation layer can also
function as the switching core for a department or zone and connect the
The campus network involving one building usually uses the two-layer
architecture, that is, only the access layer and aggregation layer are required. A
large-scale campus network (such as a university campus network) that involves
multiple buildings usually uses the three-layer architecture that consists of the
access, aggregation, and core layers.
During network design, you can use the bottom-up method to determine the type
of architecture required based on the network scale, as shown in Figure 2-4.
Active-backup mode
In this mode, one NIC interface in the bonded interface is in the active state, and
the other is in the backup state. All data is transmitted through the active NIC
interface. In the event of a failure on the link corresponding to the active NIC
interface, data is transmitted through the backup NIC interface. In this case, the
Layer 3 switch functioning as the server gateway connects to the two NIC
interfaces on a server through two physical ports. The physical ports do not need
to be aggregated, and you are advised to add them to the VLAN of the
corresponding network plane in access mode. As shown in Figure 2-6, add
physical ports (GE1/0/1 and GE2/0/1) on the switch to VLAN 100 using the
following commands.
<Switch> system-view
[Switch] vlan batch 100
[Switch] interface gigabitethernet 1/0/1
[Switch-GigabitEthernet1/0/1] port link-type access
[Switch-GigabitEthernet1/0/1] port default vlan 100
[Switch-GigabitEthernet1/0/1] quit
[Switch] interface gigabitethernet 2/0/1
[Switch-GigabitEthernet2/0/1] port link-type access
[Switch-GigabitEthernet2/0/1] port default vlan 100
[Switch-GigabitEthernet2/0/1] quit
In this mode, multiple NICs of a server transmit data packets based on the
specified hash policy. To enable server-switch interconnection, you need to
configure an Eth-Trunk interface in manual mode on the Layer 3 switch
functioning as the server gateway, connect the Eth-Trunk interface to the bonded
interface on the server, and then add the Eth-Trunk interface to the VLAN of the
corresponding network plane in access mode. As shown in Figure 2-7, add Eth-
Trunk 1 on the switch to VLAN 100 using the following commands.
<Switch> system
[Switch] vlan batch 100
[Switch] interface eth-trunk 1
[Switch-Eth-Trunk5] trunkport gigabitethernet 1/0/1 2/0/1
[Switch-Eth-Trunk5] port link-type access
[Switch-Eth-Trunk5] port default vlan 100
[Switch-Eth-Trunk5] quit
Communicatio iMaster NCE- Functions as the NAC server for user access
n with the user Campus authentication. The user service subnet
service subnet must be able to communicate with iMaster
on the overlay NCE-Campus.
network
DHCP server Dynamically assigns IP addresses to user
terminals. The user service subnet must be
able to communicate with the DHCP server.
The network management zone adopts the basic networking design, the topology
between the gateway in the network management zone and the core switch
cluster is stable, and only a few network segments are required for
communication. If this is the case, you are advised to configure static routes
between the gateway in the network management zone and the core switch
cluster. As illustrated in Figure 2-8, the planning of static routes is as follows:
● Two VLANIF interfaces are separately planned on the gateway in the network
management zone as well as on the core switch. One (VLANIF 500 in the
figure) is used for communication between the network management zone
and the device management subnet, and the other (VLANIF 600 in the figure)
for communication between the network management zone and the user
service subnet.
● Communication between the network management zone and device
management subnet:
– On the core switch: Configure a static route destined for the network
management zone. The destination network segment is the network
segment where the software systems (for example, iMaster NCE-Campus
and iMaster NCE-CampusInsight in the figure) that need to communicate
with the device management subnet resides. The next hop of the static
route is the IP address of VLANIF 500 on the gateway in the network
management zone.
– On the gateway in the network management zone: Configure a route
destined for the device management subnet. The destination network
segment is the device management network segment, and the next hop
is the IP address of VLANIF 500 on the core switch.
● Communication between the network management zone and user service
subnet:
– On the core switch: Create a private static route destined for the network
management zone. The destination network segment is the network
segment where the software systems (for example, iMaster NCE-Campus
and the DHCP server in the figure) that need to communicate with the
user service subnet reside. The next hop of the route is the IP address of
VLANIF 600 on the gateway in the network management zone.
– On the gateway in the network management zone: Configure a static
route destined for the user service subnet. The destination network
segment is the user network segment, and the next hop is the IP address
of VLANIF 600 on the core switch.
Figure 2-8 Planning for communication between the network management zone
and the campus intranet
The IP addresses of the campus network are classified into service, management,
and interconnection IP addresses, as shown in Table 2-3.
Category Suggestion
Table 2-4 Comparison of the deployment modes available for a standalone WAC
Netw Application Scenario Advantage Disadvantage
orkin
g
Type
WAC Selection
WACs deployed on Huawei WLANs include native WACs (integrated WAC function
on switches for wired and wireless convergence) and standalone WACs (such as
AirEngine 9700-M). Select appropriate WACs based on the WAC performance
specifications and project requirements by considering the following factors:
In addition to the preceding factors, you also need to consider key feature
differences between native WAC and standalone WAC, which are listed below.
Scalability Poor. (Limited by the CPU Strong. Only standalone WACs need
processing capability of to be added, facilitating capacity
the switch's main control expansion.
board, so it is difficult to
perform capacity
expansion)
AP Group Division
An AP group is used to configure and manage APs in batches so that the APs
inherit the configurations of the group to which they belong.
● Physical location (For example, APs on the same floor can be added to the
same AP group. This mode is preferred.)
● Device model
● IP or MAC address
● SN
AP Upgrade
To reduce the impact of the AP upgrade on the network, you can upgrade the APs
on the network in batches when the network services are not running.
By planning upgrade tasks, you can flexibly upgrade the "WAC + Fit AP" network.
● Upgrade scope: You can upgrade APs in batches or upgrade a single AP.
● AP type: You can upgrade APs of the specified model.
● AP group: You can upgrade APs in a specified group.
● Upgrade mode: Immediate upgrade, automatic in-service upgrade, and
scheduled upgrade are supported. You can also only download the upgrade
file, which requires manual AP reset.
● Radio calibration
The radio calibration function can dynamically adjust channels and power of
APs managed by the same WAC to ensure that the APs work at the optimal
performance. It is recommended that scheduled radio calibration be
configured so that APs perform radio calibration in off-peak hours, for
example, between 00:00 am and 06:00 am.
● Band steering
Most STAs support both the 2.4 GHz and 5 GHz frequency bands. Generally,
the 2.4 GHz frequency band is selected by default, on which a smaller number
of channels are available. The 2.4 GHz frequency band is usually crowded and
heavily loaded, and suffers high interference. In contrast, the 5 GHz frequency
band with multiple channels and low interference cannot be brought into full
play. The band steering function enables an AP to steer STAs to the 5 GHz
radio first, which reduces traffic load and interference on the 2.4 GHz radio
and improves user experience. It is recommended that this function be
enabled by default.
● Smart roaming
Some outdated and dumb terminals have low roaming aggressiveness. As a
result, they stick to the initially connected APs regardless of the long distance
from the APs, weak signals, or low rates. The STAs do not roam to
neighboring APs with better signals. Such STAs are generally called sticky
STAs. The negative impact of sticky STAs is described as follows:
– The service experience of a sticky STA is poor, and the STA is always
associated with the poor-signal AP. As a result, the channel rate decreases
significantly.
If intelligent radio calibration with better effect is used, the local radio calibration
function provided by the WAC is not required. For more information about intelligent
radio calibration, see 2.10.2 Intelligent Network O&M.
On a large or midsize campus network, a large number of STAs exist and require
area-specific policies. Typically, the SSID:VLAN = 1:N mapping policy is used.
The range of a radio broadcast domain is determined by an SSID. Therefore, in
case of SSID:VLAN = 1:N, you are advised to enable broadcast-to-unicast
conversion to avoid the generation of a radio broadcast domain.
● Retains users' IP addresses. After roaming, users can still access the initially
associated network and continue its services.
● Avoids packet loss or service interruption caused by long-term authentication.
WLAN roaming is classified into the following types based on the STA roaming
scope:
● Intra-WAC roaming
● Inter-WAC roaming at Layer 2 or Layer 3
In the scenario where aggregation switches serve as native WACs, if the number of
STAs is greater than or equal to 40,000, a maximum of four native WACs can be
deployed in each mobility group; if the number of STAs is less than 40,000, a
maximum of 16 native WACs can be deployed in each mobility group.
In addition to the preceding basic roaming functions, Huawei WLAN supports the
fast roaming function, including pairwise master key (PMK) fast roaming and
802.11r fast roaming. This function further reduces the handoff delay between
APs. Table 2-7 shows the handover delay of STAs in different roaming modes.
reduce the roaming handover delay and packet loss rate. Therefore, you are
advised to enable the mechanism when enabling 802.11r fast roaming.
involves locating Wi-Fi, Bluetooth, and UWB tags. To implement wireless tag
location, an AP collects and sends tag information to a location server. The
location server then calculates the physical location of the tag and sends the
calculated data to a third-party device so that the user can view the location of
the target tag through a map or table. Huawei's end-to-end wireless tag location
solution is provided in cooperation with third-party vendors in the industry.
Wireless terminal location involves locating Wi-Fi and Bluetooth terminals. Wi-Fi
terminal location technology locates terminals based on wireless signal strength
information in the surrounding environment collected by APs. To be specific, an AP
reports the collected wireless signal information transmitted by a Wi-Fi terminal to
a location server. The location server calculates the location of the terminal
according to the obtained wireless signal information as well as the AP's location,
and then displays the terminal's location to the user. The Wi-Fi terminal location
solution can be implemented by using Huawei WLAN devices or by cooperating
with third-party partners. Bluetooth terminal location includes two location
methods: terminal-side location and network-side location. In terminal-side
location, a Bluetooth base station or a built-in Bluetooth module of an AP actively
broadcasts an iBeacon frame. After scanning and obtaining the iBeacon frame, a
terminal interacts with a location engine for calculating the location through a
particular location algorithm. (Typically, the location engine provides the SDK to
calculate the location on the terminal) In network-side location, the built-in
Bluetooth module of an AP scans and collects Bluetooth iBeacon broadcast frames
and signal strength information in the surrounding environment, and reports them
to a location server. With the obtained signal strength and AP location, the
location server can calculate the location of a specific terminal.
Deployment Suggestions
Table 2-8 describes the capabilities and application scenarios of the wireless
location solutions.
For details about the principles of the cooperation solution between Huawei and
third-party location vendors as well as device selection, see related documents at:
https://e.huawei.com/en/material/bookshelf/bookshelfview/202004/03160039
attributes. Most security policies are implemented based on security zones. Each
security zone identifies a network, and a firewall connects networks. Firewalls use
security zones to divide networks and mark the routes of packets. When packets
travel between security zones, security check is triggered and corresponding
security policies are enforced. Security zones are isolated by default.
Generally, there are three types of security zones: trusted, DMZ, and untrusted.
Figure 2-14 Using static routing between the firewall and the core switch
● Dynamic routing
If VRRP is not deployed on firewalls, dynamic routing can be used to
implement automatic switching of the service traffic path. In this case, you
need to run the hrp standby-device command on the standby firewall to set
Figure 2-15 Using dynamic routing between the firewall and the core switch
Table 2-9 shows the recommended security policy design for common zones.
Guests Low
● If private IP addresses are used on the intranet, source NAT technology needs
to be used to translate source IP addresses of packets to public IP addresses
when user traffic destined for the Internet passes through the firewall.
Network Address Port Translation (NAPT) is recommended to translate both
IP addresses and port numbers, which enables multiple private addresses to
share one or more public addresses. NAPT applies to scenarios with a few
public addresses but many private network users who need to access the
Internet.
● If intranet servers are used to provide server-related services for public
network users, destination NAT technology is required for translating
destination IP addresses and port numbers of the access traffic of public
network users into IP addresses and port numbers of the servers in the
intranet environment.
● When two firewalls operate in VRRP hot standby (master/backup) mode, IP
addresses in the NAT address pool may be on the same network segment as
the virtual IP addresses of the VRRP group configured on the uplink interfaces
of the firewalls. If this is the case, after the return packets from the external
network arrive at the PE, the PE broadcasts ARP packets to request the MAC
address corresponding to the IP address in the NAT address pool. The two
firewalls in the VRRP group have the same NAT address pool configuration.
Therefore, the two firewalls send the MAC addresses of their uplink interfaces
to the PE. In this case, you need to associate the hot standby status (master/
backup) of the firewalls with the NAT address pool on each firewall, so that
only the master firewall in the VRRP group responds to the ARP requests
initiated by the PE.
Netw Traffic models of various services and E2E Determine the network
ork forwarding paths of each service, including location where a QoS
statu forwarding paths in normal and abnormal policy is to be deployed.
s conditions
VoIP Real-time voice calls over IP networks. The network Ver Ver Ver
data must provide low latency and low jitter to ensure y y y
flow service quality. low low low
Voice Signaling protocols for controlling VoIP calls and Low Lo Per
signali establishing communication channels, for example, w mit
ng SIP, H.323, H.248, and Media Gateway Control
Protocol (MGCP).
Signaling protocols have a lower priority than VoIP
data flows because call failure is often considered
worse than intermittent voices.
Multi Multiple parties can share camera feeds and screens Low Ver Lo
media over IP networks. Protocols or applications can or y w
confer adapt to different network quality levels by me low
encing adjusting the bitrate (image definition) to ensure diu
the smoothness. m
Strea Online audio and video streaming. Audio and video Low Me Per
ming programs are made in advance and then cached on or diu mit
media local terminals before being played. Therefore, the me m
requirements on the network latency, packet loss, diu
and jitter are reduced. m
Delay- Data services that are sensitive to delay. For Low Lo Per
sensiti example, long delay on an online ordering system w mit
ve may reduce the revenue and efficiency of or
data enterprises. me
service diu
s m
Low- Services that are not important to enterprises, such Hig Hig Per
priorit as social network and entertainment applications. h h mit
y
service
s
control. Devices in the same DiffServ domain only need to schedule packets in
queues based on the priorities marked on boundary nodes. Typically, service
deployment involves traffic identification at the access layer, DiffServ model
deployment at the aggregation or core layer, and bandwidth control on egress
firewalls.
● Traffic identification at the access layer
Access switches function as boundary switches. The switches identify, classify,
and mark data flows at the user side. In actual deployments, different
interfaces on access switches are connected to different terminals. Different
priorities can be allocated to different services on access switches. Then traffic
of the services can be scheduled based on the priorities.
● DiffServ model deployment at the aggregation or core layer
Interfaces on aggregation and core switches are configured to trust DSCP or
802.1p priorities and enforce QoS policies based on priorities marked at the
access layer, to ensure that high-priority services are scheduled first. A switch
interface trusts 802.1p priorities by default.
● Bandwidth control on egress devices
Egress devices are also located in the DiffServ domain and are configured to
trust DSCP or 802.1p priorities of packets and implement QoS policies. Due to
egress bandwidth limits, you need to consider differences when setting
bandwidth parameters for WAN interfaces of egress devices. Additionally, QoS
policies of egress devices vary according to the enterprise WAN construction
mode.
– WAN QoS policies can be managed by an enterprise itself in the
following scenarios: enterprise-built WAN, private line construction using
leased fibers, and customized enterprise QoS policies applied to the
carrier WAN. In this case, egress or PE devices on the campus network do
not need to re-mark traffic.
– The WAN QoS policies are not controlled by an enterprise itself. The
enterprise leases the private line network of a carrier, and the carrier
does not trust the packet marking on the enterprise network or the two
parties have different definitions of the same packet marking. Thus,
egress devices on the campus network need to re-mark traffic.
In WLAN QoS design, you need to consider priority mapping between wired and
wireless network packets. For example, 802.11 packets sent by WLAN clients carry
user priorities or DSCP priorities, VLAN packets on wired networks carry 802.1p
priorities, and IP packets carry DSCP priorities. To ensure consistent QoS
scheduling of packets on wired and wireless networks, you need to configure
priority mapping on network devices.
NOTE
To address the preceding issues, Huawei launches the intelligent HQoS solution,
which is a scenario-specific QoS solution that supports multi-level scheduling and
application identification. With this solution, a network administrator can use the
following functions to perform QoS design and deployment for campus networks:
This example defines two VIP users (VIP1 and VIP2) and analyzes indicators of
mission-critical applications of the VIP users, including the packet loss rate,
latency, jitter, and bandwidth requirements. For details about traffic classification,
see 2.6.2 Traffic Classification Design.
The VIP users and applications in the preceding table are for reference only, and
used to demonstrate the planning and design methods and logic. Therefore, the
indicator data cannot be recommended in actual deployments.
You are advised to customize applications using the preceding two methods. After
customizing applications on iMaster NCE-Campus as an administrator, you can
add the customized applications to an application scheduling template.
NOTE
● Define the priorities of key services based on the analysis results in 2.6.4.2
Planning of VIP Users and Applications . For typical scheduling policy
suggestions, see 2.6.3.3 Recommended Scheduling Policy Suggestions.
● It is recommended that a shaping bandwidth be configured for applications
that may have burst traffic. For example, if the average bandwidth of a video
application is less than 10 Mbit/s and the peak bandwidth is 100 Mbit/s, the
shaping bandwidth can be set to 10 Mbit/s.
● A maximum of 31 application scheduling templates can be defined through
iMaster NCE-Campus. The following table describes the configuration logic for
reference.
● Application scheduling templates cannot be defined for common users.
Application traffic of common users can only be scheduled based on the
default configuration of network devices, requiring no additional
configuration.
Table 2-15 Example design of an application scheduling template (for VIP users
VIP1, VIP3, and VIP5)
Application Priority (a Higher Shaping Bandwidth of Burst Traffic
Value Indicates a (Mbit/s)
Higher Priority)
Other applications 1 -
Non-critical 2 -
service application
APP6
Non-critical 3 -
service application
APP5
Customized 4 20
application APP4
Video 5 10
conferencing
application APP3
Customized 6 -
application APP2
Instant messaging 7 -
application APP1
Since the service traffic models of VIP users VIP1, VIP3, and VIP5 are similar, the
same application scheduling template is defined for the three VIP users. After the
application scheduling templates of all VIP users are designed, you can authorize
these templates to respective VIP users on the controller. Scheduling policies will
be automatically delivered to network devices.
logical switch using clustering technology. When the master member switch in a
stack or Cluster Switch System (CSS) fails, the backup member switch takes over
all the services without interrupting services. On a large or midsize campus
network, deploying switches using the stacking or clustering technology is
recommended for higher reliability. The stacking or clustering technology has the
following advantages:
● Improving reliability
Member switches in a stack or CSS work in redundancy mode. In Figure 2-17,
two modular core switches SwitchA and SwitchB set up a CSS and back up
each other. In the event of a failure on SwitchA, SwitchB takes over services
from SwitchA to ensure service continuity.
and between a stack and a CSS. Such deployment approach increases link
bandwidth and reliability, and avoids using loop prevention protocols such as
MSTP. On a Layer 3 network, members in a stack or CSS share one routing
table. This shortens the route convergence time upon a network fault and
makes it easy to manage, maintain, and expand a network.
logical Eth-Trunk. The interfaces on the Eth-Trunk are called Eth-Trunk interfaces.
As shown in Figure 2-22, link aggregation has the following advantages:
● Increasing bandwidth: The maximum bandwidth of a link aggregation group
(LAG) is the sum of bandwidth of the member interfaces in the LAG.
● Improving reliability: When an active link fails, the traffic carried over this
failed link is switched to another functional active link, improving LAG
reliability.
● Achieving load balancing: In a LAG, traffic is load balanced among all
functional active links.
● To prevent unauthorized attacks, you are advised to enable the illegal attack
detection function in public areas and student dormitories with high security
requirements to detect flood, weak-vector, and spoofing attacks,
automatically add attackers to the dynamic blacklist, and alert the
administrator through alarms.
WEP WEP shared key authentication requires that the same static key be
preconfigured on the server and client. Both the encryption mechanism
and the encryption algorithm are vulnerable to security threats.
Therefore, this authentication mode is not recommended.
WPA WPA and WPA2 provide almost the same security. WPA/WPA2 has two
/ editions: enterprise edition and personal edition.
WPA WPA/WPA2-Enterprise requires an authentication server and is
2 recommended for employee access on large- and medium-sized campus
networks.
WPA/WPA2-Personal does not require an authentication server and is
recommended for guest access on large- and medium-sized campus
networks. The WPA/WPA2-PPSK (PPSK is short for Private PSK) enhances
network security while ensuring the convenience.
3. The authentication server sends a request to a data source server for verifying
the account and password.
4. The data source server notifies the authentication server of the verification
result, and the authentication server then notifies the authentication device of the
authentication result.
5. The authentication device permits or denies network access of the
authentication client according to the received authentication result.
configures user policies based on the natural language, so users have no need to
focus on network concepts like IP addresses and VLANs. Additionally, user policies
are deployed by the controller in a unified manner, facilitating future
maintenance. Table 2-18 compares the two solutions.
To sum up, it is recommended that free mobility be used as the policy control
solution for large- and medium-sized campus networks. If the customer's existing
campus networks do not support this solution, the traditional NAC solution is
used.
the locations of user terminals are fixed, and policy requirements are simple.
As the network scale increases and the policy requirements become more
complex, it makes the configuration difficult to set and maintain. Therefore,
for large- and medium-sized campus networks, you are advised to use the
authentication server to authorize dynamic ACL policies. In this manner,
terminals do not need to be strictly bound to IP addresses and VLAN
information, making IP and VLAN planning flexible. When users are divided
into multiple categories, you are advised to restrict the access locations of
users. Users with different permissions access the Internet in the areas
specified by the administrator. This approach ensures that only related policies
need to be configured on devices in the specified areas. Otherwise, policy
configuration and O&M will be difficult.
– The IP addresses of users in dynamic security groups are not fixed and
are dynamically bound to security groups after user authentication. After
user accounts are de-registered, such binding relationships are
dynamically canceled. The mappings between user IP addresses and
security groups remain valid only when users are online. If the policy
enforcement point is also an authentication point, the mappings between
IP addresses and security groups can be dynamically generated based on
the authorized security group information. Alternatively, you can obtain
such mappings by configuring IP-security group entry subscription on the
controller. The mappings between IP addresses and security groups are
also called IP-security group entries.
– IP addresses of static security groups are fixed. Mappings between IP
addresses and security groups are defined by administrators on the
controller and then synchronized to the policy enforcement point.
The best solution for designing a server security group is to ensure that
servers of the same type or security level are deployed on the same network
segment based on proper IP address planning. In addition, ensure that ports
on the same server do not provide services of different security levels. For
example, do not use one server to provide public network services for the
Internet and provide limited resource storage services for the intranet.
Otherwise, security groups are hard to define and data leakage may occur.
● Security Group Policy Planning
A security group policy can directly reflect whether two security groups can
communicate with each other. When planning a security group policy, you
only need to set the security group policy between two groups to permit or
deny based on whether the two groups can communicate with each other.
The administrator can configure permission policies through an intuitive
policy matrix on the controller.
Take the policy direction into account when planning security group policies.
Generally, inbound and outbound packets are transmitted between two
terminals.
Traffic from A to B and traffic from B to A are not related to each other.
Huawei switches match policies for traffic from A to B and from B to A
separately to determine whether to forward the traffic. Therefore, only the
source and destination security groups of packets are checked during policy
enforcement. If access from A to B is permitted and from B to A is denied, all
packets sent from A to B will be permitted, and all packets sent from B to A
will be discarded regardless of whether A or B initiates the access. The default
policy of switches is permit.
Network access usually requires bidirectional communication. Therefore, to
simplify management, you only need to consider the permissions for user
security groups to access other users and servers when planning security
group policies.
– To prevent users from accessing a security group, you only need to
configure a unidirectional deny rule.
– To allow users to access a security group, you only need to configure a
unidirectional permit rule.
Assume that A and C are user groups, and B and D are server groups.
Members in group A can communicate with those in groups C and D, while
members in group C can only communicate with those in group D. Members
B Empty NA Empty NA
D Empty NA Empty NA
● Collect the types of terminals on the network, such as PCs, mobile phones,
printers, IP cameras, and access control devices.
● Check whether Portal authentication is deployed on the network.
● Check whether the IP addresses of terminals are DHCP-assigned or statically
configured.
Based on the collected information, traverse the items one by one according to
Table 2-21 and select the required terminal identification method. Multiple
methods can be selected to identify terminals. You are advised to enable the
following passive fingerprint-based identification methods: MAC OUI, HTTP
UserAgent, DHCP option, LLDP, and mDNS. If the passive fingerprint-based
identification methods cannot meet terminal identification requirements, enable
the proactive scanning and identification methods, such as SNMP Query and
Nmap.
The network administrator can enable terminal identification and its dependent
functions on corresponding devices through iMaster NCE-Campus. Refer to the
following table for more information.
HTTP Portal -
UserAgent authentication
devices
Nmap Controller -
(enabling the
Nmap function
after installing the
Nmap plug-in)
NOTE
Figure 2-27 illustrates the process of automatic policy delivery based on terminal
types.
On the iMaster NCE-Campus web UI, the administrator enables the terminal
identification function, selects terminal types, and specifies the corresponding
policies. When a terminal accesses the network, the network device can collect the
fingerprint information of the terminal and report the information to iMaster
NCE-Campus. Then iMaster NCE-Campus automatically matches the information
against the terminal fingerprint database, identifies the terminal type, and delivers
the corresponding admission and authorization policies to the terminal based on
the policies defined by the administrator.
NOTE
When terminal identification is used together with the VLAN authorization policy, you can
disable pre-connection in 802.1X and MAC address authentication scenarios to prevent IP
address re-assignment.
Net Switch Local CLI or web Generally, you need to configure the
wor (gateway in system switch before installing software
k the network systems in the network
man management management zone.
age zone)
men
t
zone
NOTE
Planned static IP addresses cannot overlap with IP addresses in the dynamic IP address
pool. If the dynamic IP address pool contains a static IP address, you need to remove it
from the dynamic IP address pool.
The administrator is advised to plan the network first and then onboard devices. If
the network cannot be planned in advance, the administrator can onboard devices
and then determine the network topology.
NOTE
The management port of modular switches does not support a default IP address.
Therefore, to log in to the web system of a modular switch through its management port,
you need to configure an IP address in advance.
Basic ● Monitors the basic status of sites, devices, and terminals, such
service as the online rate, CPU usage, and memory status of devices at
monitoring a site.
● Provides traffic statistics analysis and reports from multiple
dimensions (site, terminal, application, and SSID).
● Monitors user information, including the online status and
traffic statistics.
The overall solution architecture contains three layers. The bottom layer is the
campus network device layer. It provides data collection capabilities in multiple
dimensions, such as client, radio, AP, switch, and user log, and sends the data to
iMaster NCE-CampusInsight through Telemetry technology. The middle layer is the
iMaster NCE-CampusInsight data analysis layer. It delivers big data storage (for
real-time traffic preprocessing, offline traffic distributed processing, and data
storage services) and data analysis services (for pattern recognition and intelligent
engine). The top layer is the service provisioning layer. It offers customers final
data analysis services, including network visibility, campus service analysis,
intelligent wireless network, and user application experience.
WLAN Network plan import: After the network plan file made by
topolog the WLAN Planner is imported, iMaster NCE-CampusInsight
y displays data such as sites, pre-deployed APs, obstacles,
background images, and scale planned in the file.
Network comparison: After pre-deployed APs are
associated with real APs, the planned data and actual data
are compared in terms of the power, channel, frequency
bandwidth, number of clients, negotiated rate, and signal
strength, and the comparison result is displayed.
Wi-Fi heatmap display: The radio heatmap can be
displayed based on the AP location.
User Applica Based on the monitoring and analysis of audio and video
applica tion service sessions, the SIP session statistics, service traffic
tion analysi trend, and session details list can be displayed, helping users
experie s quickly learn about the quality status of audio and video
nce services.