beautypg.com

H3C Technologies H3C WX3000E Series Wireless Switches User Manual

Page 10

background image

iv

Configuring group-based traffic-mode load balancing ··················································································· 133

 

Band navigation configuration example ··················································································································· 135

 

Configuring WLAN IDS ·········································································································································· 137

 

Terminology ························································································································································· 137

 

Rogue detection ··················································································································································· 137

 

WIDS attack detection ········································································································································ 138

 

WLAN IDS configuration task list ······························································································································· 139

 

Configuring AP operating mode ································································································································ 139

 

Configuring rogue device detection··························································································································· 140

 

Configuring rogue device detection ·················································································································· 140

 

Taking countermeasures against attacks from detected rogue devices ························································· 143

 

Displaying and maintaining rogue detection ··································································································· 144

 

Configuring IDS attack detection ································································································································ 145

 

Configuring IDS attack detection ······················································································································· 145

 

Displaying and maintaining IDS attack detection ···························································································· 145

 

WLAN IDS configuration example ····························································································································· 145

 

Configuring WLAN IDS frame filtering ················································································································· 148

 

Overview ······································································································································································· 148

 

Configuring WLAN IDS frame filtering ······················································································································ 149

 

Displaying and maintaining WLAN IDS frame filtering ·························································································· 150

 

WLAN IDS frame filtering configuration example ···································································································· 150

 

Configuring WLAN QoS ········································································································································ 152

 

Overview ······································································································································································· 152

 

Terminology ························································································································································· 152

 

WMM protocol overview ··································································································································· 152

 

Protocols and standards ····································································································································· 154

 

Configuring WMM ······················································································································································ 154

 

Displaying and maintaining WMM ··························································································································· 156

 

WMM configuration examples ··································································································································· 157

 

WMM basic configuration example ················································································································· 157

 

CAC service configuration example ················································································································· 158

 

SVP service configuration example ··················································································································· 159

 

Traffic differentiation test configuration example ····························································································· 160

 

Troubleshooting ···························································································································································· 161

 

EDCA parameter configuration failure ············································································································· 161

 

SVP or CAC configuration failure ······················································································································ 161

 

Configuring bandwidth guaranteeing ······················································································································· 162

 

Configuration procedure ···································································································································· 162

 

Displaying and maintaining bandwidth guaranteeing ··················································································· 163

 

Bandwidth guaranteeing configuration example ····························································································· 163

 

Configuring client rate limiting ··································································································································· 165

 

Configuration procedure ···································································································································· 165

 

Displaying and maintaining client rate limiting ······························································································· 166

 

Client rate limiting configuration example········································································································ 166

 

Configuring WLAN mesh link ································································································································ 168

 

Introduction to WLAN mesh ········································································································································ 168

 

Basic concepts in WLAN mesh ·························································································································· 168

 

Advantages of WLAN mesh ······························································································································ 169

 

Deployment scenarios ········································································································································· 169

 

WLAN mesh security··········································································································································· 172

 

Mesh link metric··················································································································································· 172

 

Mobile link switch protocol ································································································································ 173