Got it

Huawei Wireless Access Controllers V200R003C00 Web Platform Configuration Guide-System Management

Latest reply: Oct 19, 2017 09:48:03 1448 1 0 0 0

17  System Management

17.1  System Maintenance

17.1.1  AC Information

Context

You can configure AC information to identify each AC.

Procedure

  1. Choose System Management > System Maintenance > AC Information. The AC Informationtab page is displayed.

    Figure 17-1  AC Information 
    92d2552b4a474306a8c41342a12ee97b

  2. Set parameters described in Table 17-1.
  3. Click Apply.

    Table 17-1  AC information parameters

    Parameter

    Description

    Device name

    Name of an AC.

    Device location

    Location of an AC.

    Contact

    Contact information for device maintenance.

17.1.2  AC Restart

Context

After the system is upgraded or when some device configuration is changed, for example, the startup configuration file is modified, restart the device to make the new configuration take effect. You are advertised to save the current configuration and back up the current configuration file before restarting the system.

Procedure

  1. Click Save Configuration to save the current configuration.
  2. Choose System Management > System Maintenance > AC Restart. The AC Restart tab page is displayed.

    Figure 17-2  AC Restart 
    fffe9cd76f2b4dd4b948807b27b8f819

  3. Click Export Configuration File to back up the configuration file locally.
  4. Set System software to specify the system software to use during the next startup.
  5. Set Configuration file to specify the configuration file to use during the next startup.
  6. Click Restart Device. The message "Is the configuration saved?" is displayed.

    • To save the current configuration and restart the device, click Yes.
    • To restart the device without saving the current configuration, click No.
    • To cancel the configuration, click Cancel.

17.1.3  AC Upgrade

Context

The device software includes BIOS software and system software. After the device is powered on, it runs the BIOS software to initialize the hardware and display hardware parameters, and then runs the system software. The system software provides drivers and adaptation functions for hardware, and offers service features. The BIOS software and system software are prerequisites for device startup and operation, providing support, management, and services for the device.

c827276b44f14c6e9ac84670263ff514 NOTE:

The BIOS software is included in the system software package (.cc file) of the device. The BIOS software is automatically upgraded in system software upgrade.

Procedure

  1. Choose System Management > System Maintenance > AC Upgrade. The AC Upgrade tab page is displayed.

    Figure 17-3  AC Upgrade 
    92ecc29644ce44ab95ad2a1e55c63800

  2. Click Browse and select the system software to upload.
  3. Click Load to upload the system software to the device. The loaded system software is specified as the next startup system software.

    c827276b44f14c6e9ac84670263ff514 NOTE:
    If the message "Your browser's security settings are too high to complete this process. See the help menu for instructions on adjusting your security settings." is displayed during file upload, configure the Internet Explorer as follow:
    1. Choose Tools > Internet Options > Security > Custom Level.
    2. Click Enable or Prompt next to Initialize and script ActiveX controls not marked as safe for scripting.

      If you click Enable, the file can be uploaded directly. If you click Prompt, the message "An ActiveX control on this page might be unsafe to interact with other parts of the page. Do you want to allow this interaction?" is displayed. If you click Yes, the file can be uploaded.

    3. Click Enable next to Include local directory path when uploading files to a server.

    You must restart the device to make the system software take effect.

17.1.4  Patch Management

Context

A patch is a kind of software compatible with the system software. It is used to remove the urgent bugs of the system software. Patches can also fix errors or improve adaptation of the system software. For example, patches can fix defects of the system and optimize some functions to meet service requirements.

The patches are released in patch files. A patch file may contain one or more patches with different functions. When patch files are loaded from the storage device to the patch area in the memory, a unique sequence number is assigned to each patch file to identify, manage, and operate the patches.

Procedure

  1. Choose System Management > System Maintenance > Patch Management. The Patch Management tab page is displayed.

    Figure 17-4  Patch Management 
    95fe464e4b4f4066be239323250050b5

  2. Click Browse and select the patch to upload.
  3. Click Upload to upload the patch to the device.

    c827276b44f14c6e9ac84670263ff514 NOTE:
    If the message "Your browser's security settings are too high to complete this process. See the help menu for instructions on adjusting your security settings." is displayed during file upload, configure the Internet Explorer as follow:
    1. Choose Tools > Internet Options > Security > Custom Level.
    2. Click Enable or Prompt next to Initialize and script ActiveX controls not marked as safe for scripting.

      If you click Enable, the file can be uploaded directly. If you click Prompt, the message "An ActiveX control on this page might be unsafe to interact with other parts of the page. Do you want to allow this interaction?" is displayed. If you click Yes, the file can be uploaded.

    3. Click Enable next to Include local directory path when uploading files to a server.

  4. Select a patch to load in the Load Patch area and click Load Patch. The patch is loaded.
  5. To uninstall the current patch, click Uninstall Patch.

17.1.5  AP Batch Upgrade

Context

APs can be upgraded in batches.
  • You can upgrade APs of the same type in batches.
  • You can upgrade APs of the same type in a region in batches.
c827276b44f14c6e9ac84670263ff514 NOTE:
To upgrade APs in batches through the WLAN web platform, the APs must go online first.

Procedure

  • Upgrading APs in batches
    1. Choose System Management > System Maintenance > AP Batch Upgrade. The AP Batch Upgrade tab page is displayed.

      Figure 17-5  AP Batch Upgrade 
      3673ce7e5ea541179e3c945f26076453

    2. Set parameters in the AP Batch Upgrade area. The AP upgrade mode can be AC, FTP, or SFTP. Table 17-2, Table 17-3, and Table 17-4 describe the parameters.
    3. Click Upgrade. APs are upgraded in batches.

      Table 17-2  Parameters for upgrading APs in AC mode

      Parameter

      Description

      Upgrade mode

      AP upgrade mode.

      • AC: The upgrade system software must be uploaded to the AC in advance. Upgrading APs in batches takes a long time. To shorten the service interruption time, you are advised to upgrade APs in FTP or SFTP mode.
      • FTP: The upgrade system software must be uploaded to the FTP server in advance, and APs can communicate with the FTP server.
      • SFTP: The upgrade system software must be uploaded to the SFTP server in advance, and APs can communicate with the SFTP server.

      File name

      Name of the system software to be loaded for upgrading APs.

      Type

      Type of APs to be upgraded.

      AP region

      Region of APs to be upgraded. When this parameter is set to none, all APs of the specified type are upgraded in batches. When an AP region is selected, APs of the specified type in the specified AP region are upgraded in batches.

      Table 17-3  Parameters for upgrading APs in FTP mode

      Parameter

      Description

      Upgrade mode

      For details, see Table 17-2.

      File name

      For details, see Table 17-2.

      Type

      For details, see Table 17-2.

      AP region

      For details, see Table 17-2.

      Server IP address

      IP address of the FTP server for storing the upgrade system software.

      FTP User name

      User name for logging in to the FTP server.

      FTP Password

      Password for logging in to the FTP server.

      Table 17-4  Parameters for upgrading APs in SFTP mode

      Parameter

      Description

      Upgrade mode

      For details, see Table 17-2.

      File name

      For details, see Table 17-2.

      Type

      For details, see Table 17-2.

      AP region

      For details, see Table 17-2.

      Server IP address

      IP address of the SFTP server for storing the upgrade system software.

      SFTP User name

      User name for logging in to the SFTP server.

      SFTP Password

      Password for logging in to the SFTP server.

  • Querying the AP upgrade list

    In the AP Upgrade List area, set Search and click Go. APs matching the search criteria are displayed. The upgrade file names of APs are displayed.

17.1.6  Single AP Upgrade

Context

Before upgrading APs in batches, upgrade an AP to check whether the upgrade version is normal, ensuring subsequent upgrade success.

c827276b44f14c6e9ac84670263ff514 NOTE:
To upgrade a single AP through the WLAN web platform, the AP must go online first.

Procedure

  1. Choose System Management > System Maintenance > Single AP Upgrade. The Single AP Upgrade tab page is displayed.

    Figure 17-6  Single AP Upgrade 
    9e8da712d6bd4050b5f017e96eebeba9

  2. Set parameters described in Table 17-5, Table 17-6, and Table 17-7.
  3. Click Upgrade. The selected AP is upgraded.

    Table 17-5  Parameters for upgrading APs in AC mode

    Parameter

    Description

    Upgrade mode

    AP upgrade mode.

    • AC: The upgrade system software must be uploaded to the AC in advance.
    • FTP: The upgrade system software must be uploaded to the FTP server in advance, and APs can communicate with the FTP server.
    • SFTP: The upgrade system software must be uploaded to the SFTP server in advance, and APs can communicate with the SFTP server.

    File name

    Name of the system software to be loaded for upgrading APs.

    Select an AP

    AP to be upgraded.

    Table 17-6  Parameters for upgrading APs in FTP mode

    Parameter

    Description

    Upgrade mode

    For details, see Table 17-5.

    File name

    For details, see Table 17-5.

    Server IP address

    IP address of the FTP server for storing the upgrade system software.

    FTP User name

    User name for logging in to the FTP server.

    FTP Password

    Password for logging in to the FTP server.

    Select an AP

    For details, see Table 17-5.
    Table 17-7  Parameters for upgrading APs in SFTP mode

    Parameter

    Description

    Upgrade mode

    For details, see Table 17-5.

    File name

    For details, see Table 17-5.

    Server IP address

    IP address of the SFTP server for storing the upgrade system software.

    SFTP User name

    User name for logging in to the SFTP server.

    SFTP Password

    Password for logging in to the SFTP server.

    Select an AP

    For details, see Table 17-5.

17.2  System Configuration

17.2.1  File Management

Context

The file system manages files on the storage devices.

Procedure

  1. Choose System Management > System Configuration > File Management.

    Figure 17-7  File Management 
    c182ddbcd1be4b329c391be15cbd2cb1

  2. In the Storage Medium area, check the remaining size and total size of storage devices.
  3. Manage files in the File Management area.

    • To search all files in a storage medium or all the storage media, click Search.
    • To move a file to the recycle bin, select the file and click Delete and Move to Recycle Bin. You can restore the deleted file in the Recycle Bin area.
    • To permanently delete a file, select the file and click Delete File Permanently.
    • To upload a file to the storage device, click Upload file.
      c827276b44f14c6e9ac84670263ff514 NOTE:
      If the message "Your browser's security settings are too high to complete this process. See the help menu for instructions on adjusting your security settings." is displayed during file upload, configure the Internet Explorer as follow:
      1. Choose Tools > Internet Options > Security > Custom Level.
      2. Click Enable or Prompt next to Initialize and script ActiveX controls not marked as safe for scripting.

        If you click Enable, the file can be uploaded directly. If you click Prompt, the message "An ActiveX control on this page might be unsafe to interact with other parts of the page. Do you want to allow this interaction?" is displayed. If you click Yes, the file can be uploaded.

      3. Click Enable next to Include local directory path when uploading files to a server.
    • To refresh the file list, click Refresh.
    • To download a file to the local PC, select the file and click 8666c7c624744d2c87421256eaf7b9e7Download.
      c827276b44f14c6e9ac84670263ff514 NOTE:
      Only files saved in the root directory of a storage medium can be downloaded currently.

  4. Manage files in the Recycle Bin area.

    • To restore a file in the recycle bin, select the file and click Restore File.
    • To permanently delete a file from the recycle bin, select the file and click Delete File Permanently.
    • To refresh the file list, click Refresh.

17.2.2  Service Management

Context

In the TCP/IP protocol suite, the Telnet protocol applies to the application layer. The Telnet protocol provides remote login and virtual terminal functions through networks. Telnet is implemented based on the client/server model. Telnet clients send requests to the Telnet server that provides the Telnet service.

The File Transfer Protocol (FTP) applies to scenarios that do not require high file transfer security. FTP is widely used for version upgrades.

Secure Shell Telnet (STelnet) ensures secure Telnet services. STelnet secures client access on a traditional insecure network by authenticating the client and encrypting data bidirectionally.

The Secure File Transfer Protocol (SFTP) secures file transfer on a traditional insecure network by authenticating the client and encrypting data bidirectionally.

If you do not perform any operation before the web service times out, the system forcibly logs you out and prompts you to log in to the web platform again when you perform an operation. The default web service timeout period, 10 minutes, is recommended.

Procedure

  • Perform service management.

    1. Choose System Management > System Configuration > Service Management.

      Figure 17-8  Service Management 
      c489b509da5545358261e6fcdb477cf3
    2. Set FTP to Enabled or Disabled to enable or disable FTP.
    3. Set Telnet to Enabled or Disabled to enable or disable Telnet.
    4. Set STelnet to Enabled or Disabled to enable or disable STelnet.
    5. Set SFTP to Enabled or Disabled to enable or disable SFTP.
    6. Set Web service timeout.
    7. Click Apply.

  • Create a remotely trusted host.

    1. Choose System Management > System Configuration > Service Management.

    2. In the Remote Trust Host IP area, click Create. In the Create Remote Trust Host IPdialog box that is displayed, set parameters. Table 17-8 describes parameters for creating a remotely trusted host.

      830ff8cef9c64da598d7d9317279d8cb

    3. Click OK.
    Table 17-8  Parameter description
    ParameterDescription
    IP AddressIP address of the remotely trusted host.
    DescriptionDescription of the remotely trusted host.
    Available serviceService type that a remotely trusted host can access. A remote trust host can only access services that are allowed to.

  • Delete a remotely trusted host.

    1. Choose System Management > System Configuration > Service Management.

    2. In the Remote Trust Host IP area, select a remotely trusted host, and click Delete. In the Information dialog box that is displayed, click OK.

  • Refresh a remotely trusted host.

    1. Choose System Management > System Configuration > Service Management.

    2. In the Remote Trust Host IP area, click Refresh to update the remotely trusted host to the latest information.

17.2.3  System Time

Context

To ensure communication between the router and other devices, set the accurate system time. The device support automatic system time synchronization with the NTP server or manual system time setting. The first method is recommended.

Procedure

  • Create a NTP server.
    1. Choose System Management > System Configuration > System Time.

      Figure 17-9  System Time 
      0ddf5dd60c7b46dc8bda366ad501a1e7

    2. Choose System Management > System Configuration > System Time.


      b03444962c404893b52f9fdd58982d01

    3. Enter the IP address of the NTP server on the Create NTP Service page and click OK.


      1bcd454d02fd45e08c0b3b32332a8020

      c827276b44f14c6e9ac84670263ff514 NOTE:

      The device supports a maximum of 128 NTP servers.

  • Delete a NTP server.
    1. Choose System Management > System Configuration > System Time.
    2. In the NTP Service area, select the NTP server you want to delete and click Delete.
  • Refresh the NTP servers.
    1. Choose System Management > System Configuration > System Time.
    2. In the NTP Service area, click Refresh.
  • Automatically Sync with NTP Server
    1. Choose System Management > System Configuration > System Time.
    2. In the Date and Time Settings area, click Automatically Sync with NTP Server.


      4663cb8dcabb4cb4a6564f072fa4d06d

    3. Click Apply. The device automatically synchronizes time with one of the NTP servers on the list.

    c827276b44f14c6e9ac84670263ff514 NOTE:
    • During automatic time synchronization, the device synchronizes time with the NTP server with the highest master clock level. For example, if the master clock level of NTP1 is higher than that of NTP2, the device synchronizes time with NTP1.

    • If the primary clock level of the web platform is higher than the NTP servers, the web platform does not synchronize the system time with the NTP server.
    • The check box of each IP address in the NTP Service area is only used to delete the corresponding NTP server.

  • Manually Adjust Settings
    1. Choose System Management > System Configuration > System Time.
    2. In the Date and Time Settings area, click Manually Adjust Settings.


      9b069de0472c4063915818a1e531f207

    3. Click the date-picker control and set the date and time.
    4. Click the Time Zone drop-down list box, and select the time zone.
    5. Click Apply. You can manually set the system time.

17.3  Log Management

Context

The information center works as the information hub of the system. By classifying and managing system information excepting session logs, the information center helps network administrators and developers to monitor network operation and analyze network faults. You can configure a log server, view logs, and filter logs.

17.3.1  View Logs

Context

Logs are displayed in a log list. You can view logs of a specified type and delete logs.

Procedure

  • Viewing logs
    1. Choose System Management > Log Management > View Logs.

      Figure 17-10  View Logs 
      c4b27eac6d274526af080b35a637b020

    2. Select a log level from the Level drop-down list box.

      Table 17-9 describes log levels.

      Table 17-9  Log levels

      Level

      Description

      Emergency

      A fault causes the device to fail to run normally unless it is restarted. For example, the device is restarted because of program exceptions or a memory error is detected.

      Alert

      A fault needs to be rectified immediately. For example, memory usage of the system reaches the upper limit.

      Critical

      A fault needs to be analyzed and processed. For example, the memory usage falls below the lower threshold; temperature falls below the alarm threshold; BFD detects that a device is unreachable or detects locally generated error messages.

      Error

      An improper operation is performed or exceptions occur during service processing. The fault does not affect services but needs to be analyzed. For example, users enter incorrect commands or passwords; error protocol packets are received from other devices.

      Warning

      Some events or operations may affect device running or cause service processing faults, which requires full attention. For example, a routing process is disabled; BFD detects packet loss; error protocol packets are detected.

      Notification

      A key operation is performed to keep the device running normally. For example, the shutdown command is run; a neighbor is discovered; protocol status changes.

      Information

      A normal operation is performed. For example, the display commands are run.

      Debugging

      A routine operation is performed, and no action is required.

    3. Click Search.

      Logs of the specified level are displayed in the log list. Table 17-10 describes parameters in the log list.

    Table 17-10  Parameters in the log list

    Parameter

    Description

    Time

    Log time.

    Level

    Log level.

    Module

    Module where a log is generated.

    Summary

    Brief information about a log.

    Contents

    Contents of a log.

  • Clearing logs
    1. Choose System Management > Log Management > View Logs.
    2. Click Clear.
    3. In the Information dialog box that is displayed, click OK.

      All logs are deleted from the log list.

  • Updating logs
    1. Choose System Management > Log Management > View Logs.
    2. Click Refresh to update the latest log information.

17.3.2  Configure Logs

Context

You can save logs in either of the following ways:
  • Configure the log buffer. A router reserves a certain size of flash memory to save a small number of logs.
  • Configure a log host to save logs.
c827276b44f14c6e9ac84670263ff514 NOTE:

The web platform supports 8 log hosts. When the number of configured log hosts exceeds that limited by the web platform, a dialog box is displayed indicating the number of log hosts reaches the maximum.

Procedure

  • Configuring the log buffer
    1. Choose System Management > Log Management > Configure Logs.

      Figure 17-11  Configure Logs 
      9e91c136e0bf4c159dee52ce7008e74d

    2. Set Information center to Enable in the Log Parameters area.
    3. Set Log buffer size(record).

      By default, the log buffer can store 512 logs.

    4. Click Apply.
  • Configuring a log host

    Creating a log server

    1. Choose System Management > Log Management > Configure Logs.
    2. Click Create in the Log Host Configuration area.

      879776795ce54b658c7fc5b2c8e1c31f

    3. Enter the IP address of the log server in the Create Log Host dialog box.
    4. Click OK.

      The created log host is displayed in the Log Host Configuration area. To create multiple log hosts, repeat the preceding steps.

    Deleting a log server

    1. Choose System Management > Log Management > Configure Logs.
    2. Select a log server or all log servers in the Log Host Configuration area.
    3. Click Delete.
    4. In the Information dialog box that is displayed, click OK.

      The log host is deleted.

    Refreshing a log host

    1. Choose System Management > Log Management > Configure Logs.
    2. Click Refresh to update the latest information about the log host.

17.4  License Management

Context

You need to activate licenses in either of the following situations:
  • Purchasing a license to obtain permissions on related functions after you purchase a new device.
  • Applying for a new license file, and upgrade and activate the license file when the license file is activated on the device and a new feature is required.

Procedure

  1. Choose System Management > License Management.

    Figure 17-12  License Management 
    a0c149df1e20448299021857cb2fe412

  2. Click Browse in the License Activation area and select the license file to upload.
  3. Click Activate. The current license file is activated.

    c827276b44f14c6e9ac84670263ff514 NOTE:

    If you need to adjust a license file between devices (for example, move a license file from device A to device B) without changing the license authorization certificate or an upgraded license file is incompatible with the original one, click Revoke in the License Information area to obtain a license revocation code. Use the license revocation code to obtain a new license file, and activate the license file.

    You can view the license status, resources controlled by the license, and authorization information in the License Information area. Table 17-11 describes license parameters.

    Table 17-11  License parameters

    Parameter

    Description

    License status

    deactivated: default status. By default, a license is not activated after the system starts or when it is invalid.

    Normal: A commercial license enters the Normal state after it is activated.

    Trial: A license enters the Trial state when the activated ESN does not match the license or after the license expires.

    Demo: A temporary license enters the Demo state after it is activated.

    Emergency: When a license enters the Emergency state, dynamic resources on the device are free from the license controls. That is, the device runs with the maximum configurations of dynamic resources. A license can remain in Emergency state for at most seven days. After seven days, the license enters the original state.

    Authorization Information

    Authorization information of the resources controlled by the license.

17.5  User Management

Context

The administrator can manage users by creating, modifying, or deleting local users that log in to the device using HTTP.

Procedure

  • Creating a local user
    1. Choose System Management > User Management.

      Figure 17-13  User Management 
      5d5f34c97d3d4eae9b48d4b4af0e1a26

    2. In the Users area, click Create. In the Create User dialog box that is displayed, set parameters described in Table 17-12.

      d9c732652a4444c3baeff83f977ca708

    3. Click OK. The local user is added to the user list.

      To create multiple users, repeat the preceding operations.

      Table 17-12  Parameters for creating a local user
      ParameterDescription
      User nameName of a local user.
      PasswordPassword of a local user.
      Confirm password

      Confirmed password of a local user.

      The value must be the same as the value of Password.

      Access level

      Access level of a local user.

      Three user roles are defined (in ascending order): super administrator, enterprise administrator, and common user.

      The user level corresponding to each user role in the Users area is as follows:

      • The user level of the common user is 1.
      • The user level of the enterprise administrator is 2.
      • The user level of the super administrator is 3 to 15.
      NOTE:
      • Users of levels 3 to 15 are all super administrator and the Userscan display only users of level 1, 2, and 15.

      • Only a super administrator can create a local user through the web platform.

  • Modifying a local user
    1. Choose System Management > User Management.
    2. In Users area, click 2a0f2d03669e429c9fde80d7c17ef549 corresponding to a user.

      33ecc0c927cc414881120bf58b104ff9

    3. In the Modify User dialog box that is displayed, set parameters described in Table 17-13. Parameter User Name cannot be modified.

      Table 17-13  Parameters for modifying a local user
      ParameterDescription
      User nameName of a local user.
      Old passwordOld password entered by the local user to modify his own password. If a user is authorized to change other users' passwords, the user does not need to enter the old password when modifying other users' passwords.
      New passwordNew password to be used by the user.
      Confirm password

      New password entered for confirmation. The confirm password must be the same as the new password.

      Access level

      Access level of a local user.

      Three user roles are defined (in ascending order): super administrator, enterprise administrator, and common user.

      The user level corresponding to each user role in the Users area is as follows:

      • The user level of the common user is 1.
      • The user level of the enterprise administrator is 2.
      • The user level of the super administrator is 3 to 15.
      NOTE:
      • Users of levels 3 to 15 are all super administrator and the Userscan display only users of level 1, 2, and 15.

      • Only the super administrator is authorized to modify parameters of other local users using the web platform. The enterprise administrators and common users can only modify their own parameters.

    4. Click OK.
  • Deleting a local user
    1. Choose System Management > User Management.
    2. In the Users area, select a user and click Delete. In the Information dialog box that is displayed, click OK.
  • Refreshing the user list

    • Click Refresh
From group: WLAN

Huawei Wireless Access Controllers V200R003C00 Web Platform Configuration Guide-System Management
View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.