17.1 System Maintenance
17.1.1 AC Information
Procedure
- Choose . The AC Informationtab page is displayed.
- Set parameters described in Table 17-1.
- Click Apply.
17.1.2 AC Restart
Context
After the system is upgraded or when some device configuration is changed, for example, the startup configuration file is modified, restart the device to make the new configuration take effect. You are advertised to save the current configuration and back up the current configuration file before restarting the system.
Procedure
- Click Save Configuration to save the current configuration.
- Choose . The AC Restart tab page is displayed.
- Click Export Configuration File to back up the configuration file locally.
- Set System software to specify the system software to use during the next startup.
- Set Configuration file to specify the configuration file to use during the next startup.
- Click Restart Device. The message "Is the configuration saved?" is displayed.
- To save the current configuration and restart the device, click Yes.
- To restart the device without saving the current configuration, click No.
- To cancel the configuration, click Cancel.
17.1.3 AC Upgrade
Context
The device software includes BIOS software and system software. After the device is powered on, it runs the BIOS software to initialize the hardware and display hardware parameters, and then runs the system software. The system software provides drivers and adaptation functions for hardware, and offers service features. The BIOS software and system software are prerequisites for device startup and operation, providing support, management, and services for the device.
NOTE:The BIOS software is included in the system software package (.cc file) of the device. The BIOS software is automatically upgraded in system software upgrade.
Procedure
- Choose . The AC Upgrade tab page is displayed.
- Click Browse and select the system software to upload.
- Click Load to upload the system software to the device. The loaded system software is specified as the next startup system software.
NOTE:If the message "Your browser's security settings are too high to complete this process. See the help menu for instructions on adjusting your security settings." is displayed during file upload, configure the Internet Explorer as follow:- Choose .
Click Enable or Prompt next to Initialize and script ActiveX controls not marked as safe for scripting.
If you click Enable, the file can be uploaded directly. If you click Prompt, the message "An ActiveX control on this page might be unsafe to interact with other parts of the page. Do you want to allow this interaction?" is displayed. If you click Yes, the file can be uploaded.
- Click Enable next to Include local directory path when uploading files to a server.
You must restart the device to make the system software take effect.
17.1.4 Patch Management
Context
A patch is a kind of software compatible with the system software. It is used to remove the urgent bugs of the system software. Patches can also fix errors or improve adaptation of the system software. For example, patches can fix defects of the system and optimize some functions to meet service requirements.
The patches are released in patch files. A patch file may contain one or more patches with different functions. When patch files are loaded from the storage device to the patch area in the memory, a unique sequence number is assigned to each patch file to identify, manage, and operate the patches.
Procedure
- Choose . The Patch Management tab page is displayed.
- Click Browse and select the patch to upload.
- Click Upload to upload the patch to the device.
NOTE:If the message "Your browser's security settings are too high to complete this process. See the help menu for instructions on adjusting your security settings." is displayed during file upload, configure the Internet Explorer as follow:- Choose .
Click Enable or Prompt next to Initialize and script ActiveX controls not marked as safe for scripting.
If you click Enable, the file can be uploaded directly. If you click Prompt, the message "An ActiveX control on this page might be unsafe to interact with other parts of the page. Do you want to allow this interaction?" is displayed. If you click Yes, the file can be uploaded.
- Click Enable next to Include local directory path when uploading files to a server.
- Select a patch to load in the Load Patch area and click Load Patch. The patch is loaded.
- To uninstall the current patch, click Uninstall Patch.
17.1.5 AP Batch Upgrade
17.1.6 Single AP Upgrade
Context
Before upgrading APs in batches, upgrade an AP to check whether the upgrade version is normal, ensuring subsequent upgrade success.
NOTE:Procedure
- Choose . The Single AP Upgrade tab page is displayed.
- Set parameters described in Table 17-5, Table 17-6, and Table 17-7.
- Click Upgrade. The selected AP is upgraded.Table 17-5 Parameters for upgrading APs in AC mode
Parameter
Description
Upgrade mode
AP upgrade mode.
- AC: The upgrade system software must be uploaded to the AC in advance.
- FTP: The upgrade system software must be uploaded to the FTP server in advance, and APs can communicate with the FTP server.
- SFTP: The upgrade system software must be uploaded to the SFTP server in advance, and APs can communicate with the SFTP server.
File name
Name of the system software to be loaded for upgrading APs.
Select an AP
AP to be upgraded.
Table 17-6 Parameters for upgrading APs in FTP modeParameter
Description
Upgrade mode
For details, see Table 17-5. File name
For details, see Table 17-5. Server IP address
IP address of the FTP server for storing the upgrade system software.
FTP User name
User name for logging in to the FTP server.
FTP Password
Password for logging in to the FTP server.
Select an AP
For details, see Table 17-5. Table 17-7 Parameters for upgrading APs in SFTP modeParameter
Description
Upgrade mode
For details, see Table 17-5. File name
For details, see Table 17-5. Server IP address
IP address of the SFTP server for storing the upgrade system software.
SFTP User name
User name for logging in to the SFTP server.
SFTP Password
Password for logging in to the SFTP server.
Select an AP
For details, see Table 17-5.
17.2 System Configuration
17.2.1 File Management
Procedure
- Choose .
- In the Storage Medium area, check the remaining size and total size of storage devices.
- Manage files in the File Management area.
- To search all files in a storage medium or all the storage media, click Search.
- To move a file to the recycle bin, select the file and click Delete and Move to Recycle Bin. You can restore the deleted file in the Recycle Bin area.
- To permanently delete a file, select the file and click Delete File Permanently.
- To upload a file to the storage device, click Upload file.
NOTE:If the message "Your browser's security settings are too high to complete this process. See the help menu for instructions on adjusting your security settings." is displayed during file upload, configure the Internet Explorer as follow:- Choose .
Click Enable or Prompt next to Initialize and script ActiveX controls not marked as safe for scripting.
If you click Enable, the file can be uploaded directly. If you click Prompt, the message "An ActiveX control on this page might be unsafe to interact with other parts of the page. Do you want to allow this interaction?" is displayed. If you click Yes, the file can be uploaded.
- Click Enable next to Include local directory path when uploading files to a server.
- To refresh the file list, click Refresh.
- To download a file to the local PC, select the file and click
Download.
NOTE:Only files saved in the root directory of a storage medium can be downloaded currently.
- Manage files in the Recycle Bin area.
- To restore a file in the recycle bin, select the file and click Restore File.
- To permanently delete a file from the recycle bin, select the file and click Delete File Permanently.
- To refresh the file list, click Refresh.
17.2.2 Service Management
Context
In the TCP/IP protocol suite, the Telnet protocol applies to the application layer. The Telnet protocol provides remote login and virtual terminal functions through networks. Telnet is implemented based on the client/server model. Telnet clients send requests to the Telnet server that provides the Telnet service.
The File Transfer Protocol (FTP) applies to scenarios that do not require high file transfer security. FTP is widely used for version upgrades.
Secure Shell Telnet (STelnet) ensures secure Telnet services. STelnet secures client access on a traditional insecure network by authenticating the client and encrypting data bidirectionally.
The Secure File Transfer Protocol (SFTP) secures file transfer on a traditional insecure network by authenticating the client and encrypting data bidirectionally.
If you do not perform any operation before the web service times out, the system forcibly logs you out and prompts you to log in to the web platform again when you perform an operation. The default web service timeout period, 10 minutes, is recommended.
Procedure
- Perform service management.
- Create a remotely trusted host.
Choose .
- In the Remote Trust Host IP area, click Create. In the Create Remote Trust Host IPdialog box that is displayed, set parameters. Table 17-8 describes parameters for creating a remotely trusted host.

- Click OK.
- Delete a remotely trusted host.
Choose .
- In the Remote Trust Host IP area, select a remotely trusted host, and click Delete. In the Information dialog box that is displayed, click OK.
- Refresh a remotely trusted host.
Choose .
- In the Remote Trust Host IP area, click Refresh to update the remotely trusted host to the latest information.
17.2.3 System Time
Context
To ensure communication between the router and other devices, set the accurate system time. The device support automatic system time synchronization with the NTP server or manual system time setting. The first method is recommended.
Procedure
- Create a NTP server.
- Delete a NTP server.
- Choose .
- In the NTP Service area, select the NTP server you want to delete and click Delete.
- Refresh the NTP servers.
- Choose .
- In the NTP Service area, click Refresh.
- Automatically Sync with NTP Server
NOTE:During automatic time synchronization, the device synchronizes time with the NTP server with the highest master clock level. For example, if the master clock level of NTP1 is higher than that of NTP2, the device synchronizes time with NTP1.
- If the primary clock level of the web platform is higher than the NTP servers, the web platform does not synchronize the system time with the NTP server.
The check box of each IP address in the NTP Service area is only used to delete the corresponding NTP server.
- Manually Adjust Settings
17.3 Log Management
Context
The information center works as the information hub of the system. By classifying and managing system information excepting session logs, the information center helps network administrators and developers to monitor network operation and analyze network faults. You can configure a log server, view logs, and filter logs.
17.3.2 Configure Logs
Context
- Configure the log buffer. A router reserves a certain size of flash memory to save a small number of logs.
- Configure a log host to save logs.
NOTE:The web platform supports 8 log hosts. When the number of configured log hosts exceeds that limited by the web platform, a dialog box is displayed indicating the number of log hosts reaches the maximum.
17.4 License Management
Context
- Purchasing a license to obtain permissions on related functions after you purchase a new device.
- Applying for a new license file, and upgrade and activate the license file when the license file is activated on the device and a new feature is required.
Procedure
- Choose .
- Click Browse in the License Activation area and select the license file to upload.
- Click Activate. The current license file is activated.
NOTE:If you need to adjust a license file between devices (for example, move a license file from device A to device B) without changing the license authorization certificate or an upgraded license file is incompatible with the original one, click Revoke in the License Information area to obtain a license revocation code. Use the license revocation code to obtain a new license file, and activate the license file.
You can view the license status, resources controlled by the license, and authorization information in the License Information area. Table 17-11 describes license parameters.
Table 17-11 License parametersParameter
Description
License status
deactivated: default status. By default, a license is not activated after the system starts or when it is invalid.
Normal: A commercial license enters the Normal state after it is activated.
Trial: A license enters the Trial state when the activated ESN does not match the license or after the license expires.
Demo: A temporary license enters the Demo state after it is activated.
Emergency: When a license enters the Emergency state, dynamic resources on the device are free from the license controls. That is, the device runs with the maximum configurations of dynamic resources. A license can remain in Emergency state for at most seven days. After seven days, the license enters the original state.
Authorization Information
Authorization information of the resources controlled by the license.






















