Compare Products

Hide

Clear All

VS

Home> Support> Downloads>

Ruijie SNC Implementation Cookbook (V1.0)

2020-02-15 View:


     Daily Maintenance

Before getting started, verify that youinstall MySQL and RG-SNC, then start SNC Service correctly.

For Database and SNC installation, see RG-SNC Installation Guide and RG-SNC Database Installation and Maintenance Guide

1.1     Login Web UI

When you complete SNC installation and startSNC service successfully, visit SNC web UI at http://Server IP:8088/snc , thedefault Username is “admin” and password is “admin

 

Note: Use IE 8.0 and aboveversion in compatibility mode. Firefox and chrome may have compatible issues.

It is recommended to change log sessions whenlogin. Click System---àCurrent Control to change maximum number of concurrent sessions

 

In the middle ofthe window, it is Current Control

 

 

 

1.2     Check SNC Version

Click Help-->About in the upright corner, you can view versioninformation.

 

Pop up informationas shown.

 

1.3     Service Manager

In this section, you will learn how to manageservice.

Remote access to the SNC server and click theshortcut or you can access from URLhttp://SNC IP: 8989/ssm as well. Both username and password are "admin".

 

View database status, web service status andserver information as shown.

 

View Server disk usageNeed installflash plugin

View Server NICNeed install flash plug-in

Click “Web Service Settings ”to view web service configuration of HTTP, HTTPS access port. Not recommend tochange.

1.4     Database Management

Click “Integrated tool” to setdatabases.

1)     Database configuration restore

Instant backup,means backup manually

Backup success

 

2)     You can download or delete the database.

 

3)     You can upload the database, which is backed up by service manager.

 

4)     You can restore the database. Please note the SNCservice will be stopped during the restore process.

 

5)     Setting parameters. Maximum backup times

Setting scheduledbackup

 

6)     Collect log for trouble shooting. Zip file will be created after youclick "Search" Button.

 

7)     As to authorization, please refer to theauthorization guide for details.

8)     Backup database with the following operation steps:

1.     Log on the SNC server, stop the SNC applicationservice and WEB service;

2.     Lon on the SNC server, click "start - run -services.msc" to open the service management interface, then stop theMySQL-SNC service;

3.     After stop service, wait for about 5 minutes forthe starting of database backup operation;

4.     Backup the “database” directory under SNCinstallation directory.

 

Database recovery with the following operationsteps:

1.     Make sure SNC service is stopped.

2.     Replace the current “database” directory withthe whole previous backed up “database” directory.

 

Supplement:

Regular backups of the database so that youcan avoid the problem when the system is unable to recover due to the cause ofdamage. Database should not be backed up at the SNC server itself. It isrecommended to back up the SNC server every two weeks. If there are changes onSNC, it is recommended to backup immediately.

 

1.5     SNC License Authorization

1.     RG-SNC software relies on USB encryption dog toactivate license authorization. When software startup, the system will checkwhether there is a USB dongle on the server, if the dongle does not exist, thesoftware will automatically stop. As to file authorization scenario, if thelicense file not registered successfully, the WEB service will be stopped.

2.     RG-SNC features need different licenseauthorizations to activate. Or, the corresponding feature will not be visible.

3.     During RG-SNC dongle grace period, there is nolimit on the quantity and features.

4.     After version 2.28b1p5, the rest of pro licensecan be shared with AP. But the PC will not be displayed when the total ofterminals and AP exceed 1000.

5.     As to file authorization, please refer to fileauthorization guide for details.

 

Click Help-àAbout,  in the top right on SNC WEB UI todisplay version and license information.

1.6     Administrator and Role Management

Login SNC with admin ID.  ClickSystem-->Change password.  

 

You can restore Admin password if forget it.Details as below.

 


 

 



     Basic Configuration

In this section, you will learn how to makeinitial configuration for the networking devices monitoring and management. SNCcan read and sync with the devices to realize topology map, performancemonitoring and notification after you finish the basic configuration.

2.1     Device Configuration

Configure devices with the following twokinds of function so that they can be managed by SNC:

l  Devices SNMP configuration

l  Device Telnet configuration

2.1.1    Configure SNMP on Devices

SNMP configuration on devices allows SNC canread and sync with the devices to realize topology map, performance monitoringand notification after you finish the basic configuration. There are three keypoints in devices SNMP configuration

l  Set up public community and permission (read or write)

l  community string of device must be the same as SNC server's

l  Currently, most of devices use SNMP v2 by default.

2.1.1.1   Step 1, set up community and permission

Enable SNMP on devices, set the read &write community string to “ruijie”.

Ruijie>enable 

Ruijie#configure terminal

Ruijie(config)#snmp community ruijierw

2.1.1.2   Step 2, Save configuration

Ruijie#write

2.1.1.3   Step 3 , Verify configuration

Ruije#show run | begin snmp

display SNMP configuration is done.

 

2.1.2    Configure Telnet on Devices

Devices telnet configuration allows SNC canread and sync with the devices to realize topology map, performance monitoringand notification after you finish the basic configuration. There are three keypoints in devices telnet configuration:

l  Telnet setting can be 4 options.

l  You can choose any option you want, but we recommend use "onlypassword" or "username and password"

l  Please configure management IP address if it is not be configuredbefore

2.1.2.1   Step 1, set up login way in Line configurationmode.

Ruijie(config)#line vty 04           

Ruijie(config-line)#login            

Ruijie(config-line)#passwordruijie  

Ruijie(config-line)#exit

Ruijie(config)# enablesecret  ruijie  

Ruijie#write                  

2.1.2.2   Verification

Make sure the connectivity between PC anddevice. Go to Start>Run, input cmd to open command prompt.

 

Input telnet 192.168.51.241telnet to devicemanagement IP

 

2.2     Configure Template on Device

SNC networkmanagement system is used to discover and manage network devices, you need tomake the appropriate SNMP and telnetconfiguration template.

In this section, you will learn two kinds of templateconfiguration for devices:

l  SNMP template configuration

l  Telnet template configuration

2.2.1    Configure SNMP Template

There are five components in this templateconfiguration.

l  Template name

l  Port / retries

l  Version

l  Timeout

l  Read / write community string

Note: This part is the realization of the publictechnology, please refer to SNMP protocol principal.

2.2.1.1    Step 1, Log on SNC, click "Device" module.

2.2.1.2   Step 2, Configure parameters of SNMP template.

Edit SNMP device template first, go to Devicetemplate > SNMP template > Add, set the parameters as below,

  

Click OK in the pop up menu.

 

2.2.2    Configure Telnet Template

There are seven components in this templateconfiguration.

l  Profile Name

l  Whether to support SSH

l  Port/ timeout

l  Prompt

l  Authentication Mode

l  The need for super password

l  Thesuper user prompt

Note: This part is therealization of the public technology, please refer to telnet protocolprincipal.

2.2.2.1   Step 1, Log on SNC, click Device template.

Go to Device > Device Template

 

 

2.2.2.2   Step 2, Configure Telnet template parameters.

Go to Device Template > Telnet > Add,set the parameters as below,

 

2.2.2.3   Verification

In this interface you can try to modify,delete, and associated equipment and do other operations.

 

2.3     Add Device

The network device must be properly added tothe SNC server, it can be managed by the system.

In this section, you will learn:

l  Automatic discovery

l  Added manually

 

2.3.1    Discover Device Automatically

Automatic discovery of equipment in threeways: ARP mode, routing, network segment. Three methods are required to detectthe reachability of SNMP over IP.

There are seven key points in automaticdiscovery,

l  The template of SNC must has consistent information with the device

l  Complete ip address and routing table information of network device

l  An automatic discovery might not discover all device at a time

l  Manually add the device if you are unable to find the device

l  If there is a requirement to find a network of selected seeds IP , thestart IP and end IP must be included.

l  Select only the required SNMP template

l  Add the device by importing previous backup

2.3.1.1   Step 1, Configure Automatic Discovery

Enter the devicemanagement page first , go to Device Auto discovery, modify Device Autodiscovery , set the parameters as below ,


 

 

Fill in the required topology discovery seedIP address, the start IP address and end IP addresses.

 

 

Selected for one or more SNMP template to useautomatic

 

 

Click “Auto discovery” whencomplete setting.

2.3.1.2   Verification

Automatic discovery is completed, Go toDevice> Device List, we can see the list of devices by automaticallydiscover network

 

 

2.3.2    Discover Device Manually

There are five key points in discovering device manually

l  The device IP cannot be empty

l  The template of SNC must be consistent with the device

l  The actual parameters of device match SNMP parameters contained inthe template

l  You cannot add the device which cannot be ping

l  The device can be added by importing the backed-up deviceinformation

 

2.3.2.1   Step 1, Add Devices Manually.

Enterthe device management page, go to Add Device >Add, create a new device.

 

Click “Add” when complete setting.

2.3.3    Unknown Device Identification

If there is SNC unsupported devices in thenetwork, it will be identified as an unknown model after adding devices, youneed to identify this device properly.

There are three key points in identifying Unknowndevice,

l  The information in device and SNMP template of SNC must beconsistent

l  By adding custom device models to manage the unknown type of device

l  It is recommended to name the device referring to certain norms,such as the name on device panel.

 

The following configuration do not includebasic wireless settings, so ensure your wireless network works properly firstbefore starting. Suggest to create a dedicate wlan-ssid for ExemptionAuthentication (BYOD).

2.3.3.1   Step 1, Find and Copy sysOID in The Device BasicInfo.

Go to Device > Device List>unknown device model name, confirm snmp Connected and telnet Connected.Then find and copy sysOID in the device basic info.

 

2.3.3.2   Step 2, Device model management.

Go to Device > Device Model>Add,create a new custom device models.

 

 

Click “Save” when complete setting.

 

2.4     Network Topology Configuration

Automatically detect topology after thedevice is added. Network devices will be showed in the topology diagram. Automaticallygenerated topology should be consistent with the actual topology and lay

 

2.4.1.1   Step 1, Load data

On SNC configuration pageclick icon toenter network topology page.

 

It may take a while to load data into thetopology depending on the topology size.

 

After auto-discovery, SNC will performtopology automatic layout.

2.4.1.2   Step 2, Discover topology manually

Go to Fully layer 2 switchinginformation before topology discovery> Start Now topology discovery, discovertopology manually.

If the device or link does not appear, youneed to add them manually.

2.5     Monitoring Device Performance

By monitoring these indicators, you can realizethe equipment’s status information. Monitoring these indicators can bepresented at the last page or device details page, if some indicators havereached a certain threshold, it will produce the corresponding alarm.

Monitoring parameters as below

l  Monitoring equipment indicators: CPU utilization, memoryutilization, temperature, disk space utilization.

l  Monitoring Interface indicators: the interface rate, interfacebandwidth utilization, packet loss rate interfaces, interface data error ratetable, the interface Unicast packet rate, the interface broadcast packet rate,the interface CRC error rate.

2.5.1.1   Step 1, Enable device monitoring

Go to Performance > Add> SelectDevice> Add> Next , use default threshold setting as below ,

 

Click “Save” when complete setting.

2.5.1.2   Step 2, Enable real-time monitoring

Go to Device> Device List> ConfigureDevice Monitor, Then you can see the devices already in the real time monitoringlist. And the status is enabled.

2.5.1.3   Verification

In this interface you try to modify, delete,and associated equipment and do other operations.

If there is traffic passing through, the SNC homepagewill display the top N devices of CPU utilization in 5 minutes.

 

Go to Device>specificdevice > drop down the scroll bar, you can view the device CPU,memory,temperatureperformance curve.

 

2.6     Enable Trap and Syslog Notification

When equipment fails or change, the devicecan take the initiative to send an error message or a log to SNC. Instead ofwaiting snc timing synchronization detection. SNC needs to immediately responseuploaded snmp trap and syslog message information, and form the alarm messageon the SNC.

There are three key points in setting trapand syslog notification.

l  Enable device trap and syslog notification on SNC is relied ontelnet function

l  Enable trap and syslog notification feature on SNC is only forruijie equipment

l  Commands to enable trap notifications and syslog notifications

 

This part of therealization of the principle is public technology, please refer to the SNMP andsyslog protocol whitepaper.

2.6.1.1   Step 1, the bulk trap and syslog notificationsenable

Go to Alarm> Trap, SyslogNotification, Then select all devices needed to start trap and syslognotifications.

            

 

Click Startwhen completesetting.

 

Here you can also not choose all devices,select "Select manually", added device which need to startthe notification, and then click on the "Start".

 

The device automatically jump to bulk setdevice log page, where you can see the batch setting details.

2.6.1.2   Step 2, Start trap and syslog notifications on asingle device

Go to Device> Device List> ConfigureDevice> Enable Trap, previous enable button change to disablebuttion. That means notification is already enabled.

2.6.1.3   Verification

Test by unplug one cable, there will beimmediate warning notification if the device and link enable trap and syslogmonitoring function.

 

 



     Extension Configuration

3.1     Assets

In this section, we will learn how to manageassert.

 

3.1.1    Assets category

When you want to add an assert, go toAssert>Group >Add, Input category information and, click Add,

 

 

When you want to delete a new assert, go toAssert>Group >Delete, if you had confirmed, click yes,

 

When you want to add asset into categorygroup, go to all groups, select device and device type,click Add to group and then check the group you want the device to join and click OK.

After finish adding, you can view the devicein the group.

 

3.1.2    Assets import and export

Add a device by importing device informationfiles. Export device grouping files can be imported into the device groupingtree operations back into the system.

There are two key points in assets import andexport

l  Group import will delete all existing system grouping and devicesconfiguration.

l  Can only import XLS (ie Excel) file format

Note: If you check the "Clear Importedgroup and Assert", the device group will be deleted. When incrementalimport check is not required.

When you want to import asserts, go to Assert >Import or go to Device >ImportAssert >Select File

 

 

 

Afterfinishing importing, you can view the result.

 

 

 

 

 

When you want toexport asserts, go to Assert >Export

.

 

 

 

3.1.3    Customize extension information

 

To defineextension information for assets, go to Assert >Custom Property>Add Field, Add the field Name and description.

 

 

 

 

 

Configurationverification, go to Assert >Details, then you can see the newadded "Test" field.

 

 

 

3.2     Device Management

3.2.1    Modify Device Information

By viewing device details, we can know the runningstatus of devices so as to achieve the purpose of the managing device.

Go to Device, and click relativedevice to view the detailed information.

 

 

 

 

Click "Update" buttonto modify the basic information.

 

 

 

 

 

Device CPU, memory and real-time curve chart.

 

 

 

 

Click on the topright corner of the "7" and "30" to see the CPU utilizationcurves for the last week or month, and you can export data to Excel and PDF..

 

 

 

Check the routingtable, interface table, MAC address table, ARP table, IP table, etc.. In thenavigation bar, in the device information bar, you can view other informationabout the device, as shown in the following diagram.

 

 

 

3.2.2    Sync up Device Information

Sync can help to get real-time information of the device, so that the information displayed on the SNC is thelatest.

Sync up on single device, go to Device >DeviceList, When entering the device details page,you can see the device information automatically synchronized. And you canclick “sync” to manually synchronize information.

 

 

Bulk devices sync up, go to Device >Batchdevice sync >Real-time Device Sync >select Device >Start sync, When enteringthe device details page, you can see the device information automaticallysynchronized. And you can click “sync” to manually synchronize information.

Schedule sync up,go to Device >Batch device sync >Create Plan >select Device>Finish, the next step is to start plan toactivate the program.

 

 

Go to System >Plan Execution Log>Create Plan to see if the schedule isexecuted properly

 

Go to Device >Plan List > PlanName to see if the schedule is executed properly

 

3.2.3    Log in Setting

Telnet to device for configuration from SNC. Goto Device >Device List enter the device details, click"Telnet" button on the left navigation bar.

 

 

3.2.4    Test the Connectivityof Device

Ping test, go to Device >Device Liston the device details page, click "Ping" on theleft navigation bar.

 

 

 

 

Traceroute test, goto Device >Device on the device details page, click"route tracking" on the left navigation bar.

 

 

 

 

 

Network inspector, go to Device >DeviceList >Network Inspector >Real-time Test >Select Device >Start Test

.

 

Go to Device >Network Inspector>Periodic Test and then select thedevice and test method that needs to be tested, and then click "starttesting" to create plan.

Click “finish” when complete setting. click on "active", the plan will take effect.

 

After a period of time to see the runningtime of the program has been changed, that means the plan has already been executed.

3.2.5    Management  of DeviceInterface

Checking device interface, Go to Device >Device List,on device details page, the system will automatically display the device'sinterface panel on the page, and the color torepresent the current status of the device interface.

 

Enable and disable Interface, go to Device >Device List enter the devicedetails page, right click on the interface of the device panel, select "disableinterface"/or "enable the interface"

 

 

Create interface switching plan, go toAdvanced >Interface > Int Control Plan >Create Plan >Select Device thenselect the interface need to enable or disable

 

 

Automatically back to the port switch programpage, at this time you need to click on the "active",then the plan will take effect.

 

After a period of time, back to the portswitch plan page, you can see the running time of the program has changed, thereis an executed plan. Click the project name to view the details of the plan.

 

Interface parameter setting, go to Device >Device List  enter the device details page, then click the interface icon, enter the detailed interfaceinformation page, then click on the upper right corner of the device "SetInterface Parameters"

Click “Modify” when complete setting.

 

Interface binding management, go to Device >Device List >IntBinding Sync, on this page you can see the interface binding on the device that isthe port security entry, while the interface binding information can be managedand synchronized.

 

Device interface binding synchronization, go to Advanced >Interface >Int Binding Sync >SelectDevice, then start synchronization.

 

Device interface binding, go to Advanced >Interface >Int Binding Sync >Add, then fill inthe appropriate information, or click the wizard to select the device to bindthe device, and then click "add".

 

3.3     Device Configuration and Software Version

3.3.1    Management of the Device Configuration

When you want to backupdevice configuration, go to Device >Device List and click theappropriate device name to enter the device details page, then click on “DeviceConfig” , In the device details the leftnavigation bar, scroll down, and then click on the "deviceconfiguration management".

 

Select the backup option on the below page,click "Backup".

 

Automatic configuration backup, go to Advanced >Config & SW >Add Auto-Backup Device>Select Device and add success will automatically jump to the page ofdevice configuration management.

 

bulk configuration backup, go to Advanced >Config &SW >Batch Backup thenselect the backup content and whether you enable VRF, and then clickbackup in the backup device configuration box in the pop-up".

3.3.2    Restore Device Configuration

Restore configuration of single device, go to Advanced >Config &SW then click thedevice name to enter the device detailed interface, then go to Deviceconfig >Restore,

According to the actual situation and needs,determine whether the check "immediately".

 

Batch restore equipment configuration, go to Advanced >Config & SW>Batch Restore >Change then select the correct configuration fileto restore the current device

 

After all the target configuration file isreplaced, check the device and click "restore"

 

 

 

3.3.3    Device software version management

Restore softwareversion of device, go to Device >DeviceList then click the appropriate device name to enter thedevice details page and then go to Add Softwarefrom Device >Update Device Software >Backup.

 

After the completion of the backup, it will automaticallyjump to the device software management page, you can be see the list ofsoftware files have been copied to the SNC server.

 

You can log in the device to confirm thesoftware version of the backup.

 

Import Devicesoftware version to SNC, go to Advanced >Config & SW>Software MGMT >From Local >Create

 

Will go back to device software managementpage, then you can see the imported file already list here.

 

Distributeconfiguration command of device, go to Advanced >Service >Config Template Library>Add, on templatedefinition page, input template name, then click the associated command in thecommand list.

 

Businessconfiguration schedule, go to Advanced >Service >Service Plan >Add>Select Template >Select Device >Finish, then click start plan

 

3.4     Terminal management

Modify terminal, go to Device >TerminalList > Add /Update /Delete, then set the terminal.

 

View terminalinformation, go to Device >Terminal List then select a rowof terminal information, can view information terminal.

 

Click the terminal name link to see theterminal details. As shown below:

 

Import andexport terminal information, go to Device >Terminal List >Import >Select ImportFile ,

 

 

IP/MAC binding, go to Device >Terminal List >Select terminal>Bind\Unbind,

 

IP/MAC exceptiondetection, go to Device >TerminalList >MAC-to-IPS /IP-to-MACs,

Subnetstatistics, go to Device >Subnet statistics >Sync.

 

In the sub network usage statistics listpage, select the remaining available IP number of this column, click theavailable IP number of 251, you can enter the available IP list

 

In the sub network usage statistics listpage, select the PC usage, click the usage rate, you can enter the PC list

 

In the sub networkusage statistics list page, select the device usage rate column, click on theuse of the rate, you can enter the device

3.5     Management of The Device model, series

Querymanufacturer, go to System >Device Vendor, then click the Addbutton to add a page, as shown in the following diagram:

 

Select a device vendor record, click the"operation" column of the "modify"link to modify the device vendor page, as shown below

 

Enter the equipment vendor management page,select to delete the record of equipment manufacturers, click the "delete"button, as shown

Model management, go to System >DeviceModel, then Select atleast one device type record, click the delete button, the system will performthe delete operation.

 

In the list, click the name of the model, andcan view the information of the device type.

 

Click the "Add"button to add the page and then fill in the device Model information.

Click the "Update"button to update device model.

 

Device categorylist, go to System >DeviceType, then select at least one device type record, click thedelete button, the system will perform the delete operation.

 

In the list, click the name of the model, andcan view the information of the device type.

 

Click the "Add"button to add device category, and then fill in the type of device information.As shown below:

 

 

Query equipmentseries, go to System >DeviceSeries ,then click the Add button to add the device series.

 

Select the device to delete records, clickthe "delete" button, as shown below:

 

Click the browsedetailed information recording equipment series link, enter the details page,shown in the following diagram:

 

3.6     Topology Management

3.6.1    Topology Edit

Add Device: click Edit, add devicebutton

 

Delete node: select a node, click Edit,delete node button

 

Add link

a)     Select a node, click Edit, and addthe link button.

b)      Drag the cursor, click the target node, inthe pop-up dialog box input line, node link interface, etc.

Delete link: select a link, click Edit,delete link button.

 

Add virtual node

1)  ClickEdit, add virtual node

2)  Inthe pop-up dialog box, enter the virtual node tab, select the node icon

3)  Addvirtual nodes as shown in Figure

 

Custom background map

1)     Click Edit, custom background map

2)   Click browse, upload pictures, save

3)   topology after background picture uploaded

 

3.6.2    Topology Management

The system has the following topologicalviews by default. the layer 3 topology, the whole network topology, networktopology, routing topology, core aggregation topology

 

1.     Custom topology

1)  Customtopology, click on the corresponding tree node, according to the device tocreate

 

2)  Enterthe view name, select the device, and click Add.

 

3)  Customtopology, by path creation

 

4)  Enterthe topological name, source IP, destination IP, determine

 

Create success

 

 

2.     Grouped topology

1)  Assetsin the group for revision

 

2)  Groupingstructure, and the device will be synchronized to the grouping topology

 

3.     Set home topology view

1)  Inthe corresponding view, check the icon of the house, then set the home view totake effect

 

Default access to the home page after entering the topology

 

4.     Save view

1)  Inthe corresponding view, check the star standard, the save view into effect

 

3.6.3    Other Topology Operation

1.     Critical path detection

1)     On the menu bar, click on the critical path, enter the source IP,IP, which is divided into immediate and periodic detection.

 

 

 

2)     This is the result of detection.

 

3)     Add cycle detection, we can set the detection cycle

 

2.     Alarm carousel

1)  Onthe menu bar click alarm carousel, enter the carousel pattern

 

2)  Clickthe right upper corner of the setting, can set the keep alive time, the displayof the alarm level

 

3)  Carouseleffect as below

 

 

3.     Permission settings

1)     Click on the permissions settings, permissions can be setcorresponding to the role of topology

 

 

2)     Select the role to whom the topology view is visible.

 

4.        The administrator login can only see thetopology view which he has the permission

5.     Normal and traffic mode

1)     Normal mode, with the line of the thickness of the representativebandwidth

 

2)     Traffic mode, color of the line on behalf of bandwidth utilization

 

3)     Switching background, on the menu bar, click “Change BGColor”

 

White

 

 

Dark blue

 

6.     Show / hide

1)     Dot / icon display mode switch

 

Icon pattern

 

Dot pattern, display required less space

 

2)     Show / hide related items, and can be customized to display / hidethe information in the topology

Note: the number of +AP in the terminal listexceeds 1K, in order to ensure the display effect, the topology will not showPC and AP

7.     Automatic layout

Spread out the nodes and links according tothe principle that the linked notes attract each other, and non-linked notesrepeal each other. It gets fine effect if the nodes is less than 200.

 

8.     Other common operations

1)     Double click the icon to enter the device details page, we can viewthe device related information, and customize the icon

 

2)   You can input keyword on the upper right corner to search when thereare too many devices.

 

After locating the device, double click thedevice information in the search area to highlight the topology.

3)     Zoom in/out

 

4)    Supports full screen display: full screen display ofthe browser, which is prompted by the full screen mode will not be able to enter and edit keyboard input, do you want tocontinue? "We choose yes to enter. To exit the full screen mode, press theESC key to exit the full screen mode.

 

5)     export topology file format can be PNG

 

6)     In the topology view, the general information of the alarm

 

Red means a serious warning, orange is animportant warning, yellow said the general alarm, click on the number can beviewed at the corresponding level of alarm information.

7)     Topology can zoom in/out

 

 

Zoom out

 

Zoom in

 

8)     Show / hide view: display a miniature version of topology display,can choose a region to show.

Click the image below tohide.

 

Click   todisplay

 

9)     Shows the specific meaning of device icon, such as what the shape ofthe device shows what device, while the alarm level of different display coloricon is not the same.

3.7     Performance Monitoring

3.7.1    Setting of Performance Parameter

Go to Performance> Modify Indicators, then click the Add button to adda page, as shown in the following diagram:

 

Go to Performance> Global Perf Threshold, then select the threshold needed adjust,click “Modify”.

 

3.7.2    Device Management

Go to Performance>Monitored Device >Add >Select Device >Save, You can enterthe device IP, device name, device type or real-time monitoring status, clickthe search button to query, as shown below

 

Go to Performance ,Click “Add” to add a monitor device, then select device, and thenclick the Add and Save button to complete the adding operation ofthe monitoring device,

 

3.8     Monitor Real-time Performance

3.8.1    Monitor Real-time Device

Go to Performance> Monitored Device >Start/Stop Real-time Monitor.

 

Enter the monitor device management page. Youcan see the "real time performance sample frequency settings" column.

 

3.8.2    Viewing Single Device

Go to Performance> Single-device View and then select the device name, andthen select the system to refresh the view.

A minute later, the system informationcollection is completed, you can see the device performance in the upper leftcorner view:

 

Select time range.

 

Select monitoring indicators and monitoringinterfaces.

 

3.8.3    Comprehensive View

Go to Performance> All View then selectmonitoring device

 

Select the performance indicator, "device"or "interface":

 

Select monitoring device indicator:

 

3.8.4    Viewing History Performance

Go to Performance> History Per Query then selectdevice and indicator.

 

3.9     Alarm Setting

3.9.1    Alarm Parameter

Go to Alarm >Alarm parameter to setalarm parameter.

 

3.9.2    Alarm Event Management

Go to Alarm >Alarm Event > Add or Modify alarm events.

 

3.9.3    Alarm Generation Rule

Go to Alarm >Alarm Rule> Add and then fill in the rule information.

 

3.10 Viewing Alarm Message

3.10.1 Real Time Alarm

Go to Alarm >Real time Alarm Monitorthen check the alarm information in the alarmlist.

 

Click "Acknowledge"to change the alarm status.

 

Click on the "clear",to change the alarm level of alert.

 

Click on the alarm list Details icon

 

Add warning annotation, Add Alarm Note, and click Confirm.  And then see the newaddition of comments in the "alarm notes list".

 

Go to Alarm >Realtime Alarm View then click on the top right corner of the "Export" button.

 

If want to delete alarm, go to Alarm > Realtime Alarm View then select thecheck box and click “delete”.

 

3.10.2 History Alarm

Go to Alarm > Historical Alarm thenSelect the check box to confirm the alarm information, click  "Acknowledge"/ "Cancel Acknowledgement " / "Clear "/ "delete" Search Result.

 

Click on the "Device Name"link to view the device information pages, view device details.

 

3.10.3 Invalid Alarm Message

Go to Alarm >Undefined Alarm Event then click ”Disable Uspecified Alarm Generation” todisable the function.

 

3.11 Alarm Notification

3.11.1 Mail Notification

Go to System >Mail server Setting >Update to set the information ofmail server.

 

Click the "Email Test"to check whether the mail server is configured successfully.

 

3.11.2 Setting Mail Warning Notification

Go to Alarm >Alarm Notification >Select Role >Add > Select Device >Select AlarmLevel >Select Alarm Event.

 

 

After adding device, check the message alarmto the device.

 

Select according to alarm level:

Select alarm event according to the actualneed

 

When the configuration is finished, return tothe alarm alert notification: view state change from incomplete to complete.

 

3.11.3 Faulty Device Navigation

Go to Alarm >Devices with Alarm then Click on the "Device Name" link toview the device information pages.

 

3.12 Report Setting

3.12.1 Report List

Go to Report >Report List >Create Report.

1.     View global alarm reports, there are unresolvedwarning trend statistics (including the total number of alarms, the number ofserious alarms, the number of major alarm, general alarm number)

2.      Asset management reports (including summary vendors' equipment,model summary, asset management summary, device model summary, etc.)

      

 

3.      WLAN asset reports (including equipment manufacturers, models, etc.)

 

4.      AP load report:

 

5.      AC load report:

      

 

6.      User amount statistical report

 

7.     Rate of AP retreat statistics

      

3.12.2 History Report

Go to Report >History report >View

 

Click the download button tosave the report

Publish Report

 

3.13 Association Configuration

Go to System >Mail server SAM/SMP Register to set the information of mail server.

 

Depending on the type to make a selection,the SNC configuration needs to add the IP address of the server.


 

 



     WLAN Module Configuration Guide

4.1     Basic Configuration

In order to manage the wireless network bySNC, there are some basic configuration.

 

Configure the SNMP and telnet protocols,refer to the basic configuration.

 

To add wireless devices AC, go to WLAN> AC > Add, Add the IP address of AC, select the relevant SNMPtemplate and TELNET template.

Click “OK” when completesetting.

 

To add hotspot information, go to WLAN> Hotspot> Add Child Hotspot, Add a hot spot information, click save.

 

And then on the basis level 1 hot spot, click"Add Child Hotspot" to add a lower level of hot.

Note: if you need to addmuch hot information, you can directly import hot information template in theweb interface, please refer to the WLAN module configuration guide.

Wireless device AP associated hotspot, go to WLAN> Hotspot, select the hot spot, click "add AP"

 

Added successfully, you can find "APhotspots associated information,"

 

4.2     Comprehensive

4.2.1    Custom Settings Page

The function is used to customize thecomprehensive page statistics. Go to WLAN >Summary, according to the actual needs of custom to add the functionlist.

Click “Save” when completesetting.

 

4.2.2    ACAP Assets Information

The function is used to check the results ofthe reachability of AC in the system and the results of the AC alarmstatistics.. go to WLAN > Summary , to see the AC and AP assetinformation, as shown in the following figure:

 

 

4.2.3    Total Network Availability Rate Statistics(TopN)

The function is used to view the statisticsof the hot spot availability rate TopN and AP availability rate TopN..

Go to WLAN > Summary >GlobalOut-of-Service Rate >Configuration Time .

Click “OK” when completesetting.

 

4.2.4    Total Network Idle Traffic Statistics (TopN)

The function is used to view the entirenetwork AP idle traffic TopN. go to WLAN >Summary >Top N Global Idle flow Statistic >Idle AP, According tothe actual need to configure the flow and time of the super idle AP

Click “Save” when completesetting.

 

4.2.5    Total Network Rate Statistics (TopN)

The function is used to view the statisticsof the hot spot rate TopN and AP rate TopN. Go to WLAN > Summary>Global Rate Statistics.

 

 

Go to WLAN > Summary >Global RateStatistics (TopN) >Hotspot Check All to show all the hot rate statistics

Go to WLAN > Summary >Global RateStatistics (TopN) >AP Check All to show allthe AP rate statistics

 

4.2.6    Full Network Users Statistics

The function is used to view the statisticaltime of the total network AP the number of related users and the number ofauthentication users.

Go to WLAN > Summary >Global STAStatistics. Then Click on the drop-down menu statistical SSID.

 

4.3     Hot Spot

4.3.1    Import and Export Hot Spot

The function is used to import and exporthotspot information. Go to WLAN > Hotspot>Export, to export the hotspot relative files.

 

Click on the "import"after the hot information excel form is completed.

 

4.3.2    Hot spot information modification

The function is used to modify the hot information, including hot names,hot spots address, and hot description. Go to WLAN> Hotspot, in the upper right corner click the icon, to add Hotspotinformation.

Click “Save” when completesetting.

 

4.3.3    How to view the hot spot related AP information

This feature is used to check the hot spotinformation. Go to WLAN > Hotspot, inthe upper right corner click the icon, then click “APInfo” to check the hotspot information.

 

4.3.4    How to view hot spot information statistics

The function is used to check the hotstatistical information. Go to WLAN > Hotspot,in the upper right corner click the icon, then click “Out-of-ServiceRate Info” and “User Count” to check the hotspotstatistical information.

4.4     AP

4.4.1    AP Query Page Configuration

The function is based on query AP conditions,query related AP information. Go to WLAN > AP,according to the actual needs, you can query terms such as AP, AC, MAC,and SSID.

 

Click “Out-of-Service Rate” toset the calculation time range.

Click “OK” when completesetting.

 

Click “Idle AP” and then setconfiguration parameters about idleness flow status statistics.

 

Click “Alarm Thresholds” to setthe alarm threshold.

 

Click “Export” to export queryresults.

 

Click “Delete” to delete Aps.

 

Click “Modify” to modify thephysical location of the AP

Click “Save” when complete setting.

 

 

4.4.2    Operation AP Detailed Page

Go to WLAN >AP >AP name >Synchronize AP to synchronous AP information.

 

Go to WLAN >AP >AP name >Alarm Threshold then click Edit to set the alarmthreshold.

Click “Save” when aftercompleting.

4.4.3    How to view RRM's AP statistics

Go to WLAN >AP >RRM to view the RRM AP statistics.

4.4.4    How to configure the AP timer switch

Go to WLAN >AP >AP Radio-on/Radio-Off Task >Add to add a timer switch AP task.,then select device and configure Aps Switch, Click finish, return the AP timerswitch task list.

 

Click “Activate” then start Plan.

 

After the implementation of the task plan,click on the name of the project to see the results of the plan, as shownbelow:

 

4.4.5    How to configure AP connectivity test tasks

Go to WLAN >AP >AP Connectivity Test Task >Add to add a connected test task.Then select device.

 

Click "finish", and thesystem returns the AP connectivity test task list, Click “Activate”then start plan.

 

After the implementation of the task plan,click on the name of the project to see the results of the plan, as shownbelow:

 

4.4.6    Batch Setting Spectrum Analyzer

Go to WLAN >AP select APs then click “Enable” to enable the spectrumanalysis.

.

Click “OK” to return to APList.

 

4.4.7    How to bulk associate AP to hot spots

Go to WLAN >AP >Associate to link the hot spot

Click “OK” when complete setting.

 

4.4.8    Customize AP List

The AP page can choose whether to show moreAP fields, as shown in the following figure:

 

4.5     AC

4.5.1    Add, Query and Delete AC

This feature is used to add, query and deletethe AC device. Go to WLAN > AC >Add, addthe IP AC address, select the relevant SNMP template and TELNET template

 

After completion, it will automaticallysynchronize the associated AP AC

Enter the query terms, click the query.

 

Click "delete" todelete AC

 

4.5.2    How to synchronize AC information

This feature is used to add, query and deletethe AC device. Go to WLAN > AC >AC name>Synchronize AC, to synchronize AC.

 

4.5.3    How to set up AC alarm threshold

This feature is used to add, query and deletethe AC device. Go to WLAN > AC >AC name>Alarm Threshold, according to the actual needs, set AC alarmthreshold parameters.

 

4.5.4    AC device information detailed configuration

Go to WLAN > AC >AC name>Details >Basic Information and then modify the general properties of thewireless controller configuration information.

 

Go to WLAN > AC >AC name>Details >Trap Receivers and then click "Add" to addthe message server which needs to receive traps.

 

 

Go to WLAN >AC >AC name >Details >Trap Control and then click "Update" to modify the Trap parameters.

 

Go to WLAN > AC >AC name>Details >Syslog Receiver and then Syslog reception can be added,deleted, synchronous operation.

 

4.6     Users

4.6.1    How to view the entire network of wireless userstatistics

Go to WLAN >STA >Global STAs , add the view the entire network of wireless userstatistics.

 

Click “STA Statistics” thenselect a hot spot to view the STA information.

 

4.6.2    Full Network Users List

Go to WLAN >STA >a single hot spot >Key STA Settings, to set the thresholdfor the received packet retransmission rate

Customize more terminal fields, as shown inthe following figure:

 

Go to WLAN >STA > Key STA, then select a single hot port, click “Add KeySTA” and set the parameters of STA.

 

 

Click “Batch Set Retransmit RateThreshold” to set the threshold for the received packet retransmissionrate.

 

Click “Remove Key STA” todelete the Key STA.

4.7     Alarm

4.7.1    Alarm Source Navigation

Go to WLAN >Alarm,then click "",you can render the associated subordinate navigation. Then click the currentalarm source, and the alarm list is presented with the alarm informationgenerated by the device.

 

4.7.2    Export Alarm Procedure

Go to WLAN > Alarm, thenclick “Export” to export the alarm list.

 

4.7.3    How to deal with alarm information

Go to WLAN > Alarm, then Select the check box beforethe alarm information in the alarm list. Click “Acknowledge then alarm statuschange to confirmation.

 

Click “Resolved” then alarmstate to solve has been solved.

 

Click the "Delete" willdelete the selected alarm.

 

Go to WLAN > Alarm > Alarm Configuration, then set alarm information.

 

Go to WLAN > Alarm, click a single hotport, then click “Alarm Window Configuration” to define whetherto enable the pop-up window warning prompt.

4.8     Illegal AP

4.8.1    Illegal AP Configuration Wizard

Go to WLAN >AP >Rogue AP Configuration Wizard, then view the information ofillegal AP.

Go to WLAN >AP select multiple AP, and then click on the "Rogue APConfiguration Wizard", then set the illegal AP.

 

Enter the illegal AP configuration wizardpage, you need to select the configuration mode, there are 2 kinds ofconfiguration mode: simple configuration mode and user configuration mode,select the "simple configuration mode", the AP workmode will be configured as a mixed mode, the system is configured to configmode; click OK that is configured to equipment.

 

Select "user configuration mode","OK" button will become "next" button, click "next",enter the configuration AP work mode page.

 

AP can be configured in 3 kinds of workmodes: mixed mode, listening mode, access mode; select "access mode",then click "OK button".

 

Select the mixed mode or monitor mode, clicknext, and then enter the AP counter mode page:

 

After entering the AP counter system modeconfiguration page, click "OK", meaning that only the APconfiguration of the work mode, not to configure the counter model.

Four optional configure AP counter mode, including:config mode, rogue, SSID, ad-hoc mode; when a certain mode is selected, figurein the upper right corner will tick effect appears, as shown in Figure:

 

Click “OK” when completesetting.

 

4.8.2    Illegal AP List

Go to WLAN >Rogue AP >List of Rogue APs, then view the information of illegalAP.

 

4.8.3    Black and White Lists

Go to WLAN > Rogue AP >WhiteListand Blacklist >Select an AC, then you can see the black andwhite list information on the current AC.

 

You can manually enter BSSID, click "add",as shown below:

 

Can also be in the last chapter of theillegal AP list in the AP to add the black list,

 

Check the black list and click "delete".

4.8.4    Running Log

Go to WLAN >Rogue AP >Operation Log, then Select Query beginning and endingtime, click on "Query",

 

4.9     Troubleshooting Assistant

4.9.1    How to search for equipment

Go to WLAN >Assistant, then enter search terms, such as "18", click on"Query", you can search for the following five aspectswith "18".

 

4.9.2    How to instantly search network

Go to WLAN >Assistant, then enter search terms, such as SSID for the "Vlan11",click on "Query", then see the details of the STA

 

Other real-time query methods, such as userMAC, the input query terms "00:08:ca:54:86:23"

 

4.10 View Hot Spot

The function is used to view the logicalrelationship between the wireless network hotspot, AC, AP, and STA. Go to WLAN> Topology >Hotspot View, click the AP icon to show the hot AP

 

Click the terminal icon, terminal informationmay be presented under the hot spot.

 

Click “AC View” to see thelogical relationships between AC, AP, and STA,

 

 

How do you like this document ?

Suggestion


(0/255)

Can we contact you to discuss your suggestion?

Privacy Policy
Thank you. We will inform you of our response as soon as possible.
Thank you again for your valuable input!
This page will be closed in 5 s…
Submit

Ruijie Networks websites use cookies to deliver and improve the website experience.

See our cookie policy for further details on how we use cookies and how to change your cookie settings.

Cookie Manager

When you visit any website, the website will store or retrieve the information on your browser. This process is mostly in the form of cookies. Such information may involve your personal information, preferences or equipment, and is mainly used to enable the website to provide services in accordance with your expectations. Such information usually does not directly identify your personal information, but it can provide you with a more personalized network experience. We fully respect your privacy, so you can choose not to allow certain types of cookies. You only need to click on the names of different cookie categories to learn more and change the default settings. However, blocking certain types of cookies may affect your website experience and the services we can provide you.

  • Performance cookies

    Through this type of cookie, we can count website visits and traffic sources in order to evaluate and improve the performance of our website. This type of cookie can also help us understand the popularity of the page and the activity of visitors on the site. All information collected by such cookies will be aggregated to ensure the anonymity of the information. If you do not allow such cookies, we will have no way of knowing when you visited our website, and we will not be able to monitor website performance.

  • Essential cookies

    This type of cookie is necessary for the normal operation of the website and cannot be turned off in our system. Usually, they are only set for the actions you do, which are equivalent to service requests, such as setting your privacy preferences, logging in, or filling out forms. You can set your browser to block or remind you of such cookies, but certain functions of the website will not be available. Such cookies do not store any personally identifiable information.

Accept All

View Cookie Policy Details

Contact Us

Contact Us

How can we help you?

Contact Us

Get an Order help

Contact Us

Get a tech support