Compare Products
Hide
VS
Please rate this document.
Please leave your suggestions here.
200 characters leftIf Ruijie may contact you for more details, please leave your contact information here.
* I understand and agree to Terms of Use and acknowledge Ruijie's Privacy Policy.
Thank you for your feedback!
Before getting started, verify that youinstall MySQL and RG-SNC, then start SNC Service correctly.
For Database and SNC installation, see RG-SNC Installation Guide and RG-SNC Database Installation and Maintenance Guide
When you complete SNC installation and startSNC service successfully, visit SNC web UI at http://Server IP:8088/snc , thedefault Username is “admin” and password is “admin”
Note: Use IE 8.0 and aboveversion in compatibility mode. Firefox and chrome may have compatible issues.
It is recommended to change log sessions whenlogin. Click System---àCurrent Control to change maximum number of concurrent sessions
In the middle ofthe window, it is Current Control
Click Help-->About in the upright corner, you can view versioninformation.
Pop up informationas shown.
In this section, you will learn how to manageservice.
Remote access to the SNC server and click theshortcut or you can access from URL:http://SNC IP: 8989/ssm as well. Both username and password are "admin".
View database status, web service status andserver information as shown.
View Server disk usage(Need installflash plugin)
View Server NIC(Need install flash plug-in)
Click “Web Service Settings ”to view web service configuration of HTTP, HTTPS access port. Not recommend tochange.
Click “Integrated tool” to setdatabases.
1) Database configuration restore
Instant backup,means backup manually
Backup success
2) You can download or delete the database.
3) You can upload the database, which is backed up by service manager.
4) You can restore the database. Please note the SNCservice will be stopped during the restore process.
5) Setting parameters. Maximum backup times
Setting scheduledbackup
6) Collect log for trouble shooting. Zip file will be created after youclick "Search" Button.
7) As to authorization, please refer to theauthorization guide for details.
8) Backup database with the following operation steps:
1. Log on the SNC server, stop the SNC applicationservice and WEB service;
2. Lon on the SNC server, click "start - run -services.msc" to open the service management interface, then stop theMySQL-SNC service;
3. After stop service, wait for about 5 minutes forthe starting of database backup operation;
4. Backup the “database” directory under SNCinstallation directory.
Database recovery with the following operationsteps:
1. Make sure SNC service is stopped.
2. Replace the current “database” directory withthe whole previous backed up “database” directory.
Supplement:
Regular backups of the database so that youcan avoid the problem when the system is unable to recover due to the cause ofdamage. Database should not be backed up at the SNC server itself. It isrecommended to back up the SNC server every two weeks. If there are changes onSNC, it is recommended to backup immediately.
1. RG-SNC software relies on USB encryption dog toactivate license authorization. When software startup, the system will checkwhether there is a USB dongle on the server, if the dongle does not exist, thesoftware will automatically stop. As to file authorization scenario, if thelicense file not registered successfully, the WEB service will be stopped.
2. RG-SNC features need different licenseauthorizations to activate. Or, the corresponding feature will not be visible.
3. During RG-SNC dongle grace period, there is nolimit on the quantity and features.
4. After version 2.28b1p5, the rest of pro licensecan be shared with AP. But the PC will not be displayed when the total ofterminals and AP exceed 1000.
5. As to file authorization, please refer to fileauthorization guide for details.
Click Help-àAbout, in the top right on SNC WEB UI todisplay version and license information.
Login SNC with admin ID. ClickSystem-->Change password.
You can restore Admin password if forget it.Details as below.
In this section, you will learn how to makeinitial configuration for the networking devices monitoring and management. SNCcan read and sync with the devices to realize topology map, performancemonitoring and notification after you finish the basic configuration.
Configure devices with the following twokinds of function so that they can be managed by SNC:
l Devices SNMP configuration
l Device Telnet configuration
SNMP configuration on devices allows SNC canread and sync with the devices to realize topology map, performance monitoringand notification after you finish the basic configuration. There are three keypoints in devices SNMP configuration
l Set up public community and permission (read or write)
l community string of device must be the same as SNC server's
l Currently, most of devices use SNMP v2 by default.
Enable SNMP on devices, set the read &write community string to “ruijie”.
Ruijie>enable
Ruijie#configure terminal
Ruijie(config)#snmp community ruijierw
Ruijie#write
Ruije#show run | begin snmp
display SNMP configuration is done.
Devices telnet configuration allows SNC canread and sync with the devices to realize topology map, performance monitoringand notification after you finish the basic configuration. There are three keypoints in devices telnet configuration:
l Telnet setting can be 4 options.
l You can choose any option you want, but we recommend use "onlypassword" or "username and password"
l Please configure management IP address if it is not be configuredbefore
Ruijie(config)#line vty 04
Ruijie(config-line)#login
Ruijie(config-line)#passwordruijie
Ruijie(config-line)#exit
Ruijie(config)# enablesecret ruijie
Ruijie#write
Make sure the connectivity between PC anddevice. Go to Start>Run, input cmd to open command prompt.
Input telnet 192.168.51.241(telnet to devicemanagement IP)
SNC networkmanagement system is used to discover and manage network devices, you need tomake the appropriate SNMP and telnetconfiguration template.
In this section, you will learn two kinds of templateconfiguration for devices:
l SNMP template configuration
l Telnet template configuration
There are five components in this templateconfiguration.
l Template name
l Port / retries
l Version
l Timeout
l Read / write community string
Note: This part is the realization of the publictechnology, please refer to SNMP protocol principal.
Edit SNMP device template first, go to Devicetemplate > SNMP template > Add, set the parameters as below,
Click OK in the pop up menu.
There are seven components in this templateconfiguration.
l Profile Name
l Whether to support SSH
l Port/ timeout
l Prompt
l Authentication Mode
l The need for super password
l Thesuper user prompt
Note: This part is therealization of the public technology, please refer to telnet protocolprincipal.
Go to Device > Device Template
Go to Device Template > Telnet > Add,set the parameters as below,
In this interface you can try to modify,delete, and associated equipment and do other operations.
The network device must be properly added tothe SNC server, it can be managed by the system.
In this section, you will learn:
l Automatic discovery
l Added manually
Automatic discovery of equipment in threeways: ARP mode, routing, network segment. Three methods are required to detectthe reachability of SNMP over IP.
There are seven key points in automaticdiscovery,
l The template of SNC must has consistent information with the device
l Complete ip address and routing table information of network device
l An automatic discovery might not discover all device at a time
l Manually add the device if you are unable to find the device
l If there is a requirement to find a network of selected seeds IP , thestart IP and end IP must be included.
l Select only the required SNMP template
l Add the device by importing previous backup
Enter the devicemanagement page first , go to Device Auto discovery, modify Device Autodiscovery , set the parameters as below ,
Fill in the required topology discovery seedIP address, the start IP address and end IP addresses.
Selected for one or more SNMP template to useautomatic
Click “Auto discovery” whencomplete setting.
Automatic discovery is completed, Go toDevice> Device List, we can see the list of devices by automaticallydiscover network
There are five key points in discovering device manually
l The device IP cannot be empty
l The template of SNC must be consistent with the device
l The actual parameters of device match SNMP parameters contained inthe template
l You cannot add the device which cannot be ping
l The device can be added by importing the backed-up deviceinformation
Enterthe device management page, go to Add Device >Add, create a new device.
Click “Add” when complete setting.
If there is SNC unsupported devices in thenetwork, it will be identified as an unknown model after adding devices, youneed to identify this device properly.
There are three key points in identifying Unknowndevice,
l The information in device and SNMP template of SNC must beconsistent
l By adding custom device models to manage the unknown type of device
l It is recommended to name the device referring to certain norms,such as the name on device panel.
The following configuration do not includebasic wireless settings, so ensure your wireless network works properly firstbefore starting. Suggest to create a dedicate wlan-ssid for ExemptionAuthentication (BYOD).
Go to Device > Device List>unknown device model name, confirm snmp Connected and telnet Connected.Then find and copy sysOID in the device basic info.
Go to Device > Device Model>Add,create a new custom device models.
Click “Save” when complete setting.
Automatically detect topology after thedevice is added. Network devices will be showed in the topology diagram. Automaticallygenerated topology should be consistent with the actual topology and lay
On SNC configuration page,click icon toenter network topology page.
It may take a while to load data into thetopology depending on the topology size.
After auto-discovery, SNC will performtopology automatic layout.
Go to Fully layer 2 switchinginformation before topology discovery> Start Now topology discovery, discovertopology manually.
If the device or link does not appear, youneed to add them manually.
By monitoring these indicators, you can realizethe equipment’s status information. Monitoring these indicators can bepresented at the last page or device details page, if some indicators havereached a certain threshold, it will produce the corresponding alarm.
Monitoring parameters as below:
l Monitoring equipment indicators: CPU utilization, memoryutilization, temperature, disk space utilization.
l Monitoring Interface indicators: the interface rate, interfacebandwidth utilization, packet loss rate interfaces, interface data error ratetable, the interface Unicast packet rate, the interface broadcast packet rate,the interface CRC error rate.
Go to Performance > Add> SelectDevice> Add> Next , use default threshold setting as below ,
Click “Save” when complete setting.
Go to Device> Device List> ConfigureDevice Monitor, Then you can see the devices already in the real time monitoringlist. And the status is enabled.
In this interface you try to modify, delete,and associated equipment and do other operations.
If there is traffic passing through, the SNC homepagewill display the top N devices of CPU utilization in 5 minutes.
Go to Device>specificdevice > drop down the scroll bar, you can view the device CPU,memory,temperatureperformance curve.
When equipment fails or change, the devicecan take the initiative to send an error message or a log to SNC. Instead ofwaiting snc timing synchronization detection. SNC needs to immediately responseuploaded snmp trap and syslog message information, and form the alarm messageon the SNC.
There are three key points in setting trapand syslog notification.
l Enable device trap and syslog notification on SNC is relied ontelnet function
l Enable trap and syslog notification feature on SNC is only forruijie equipment
l Commands to enable trap notifications and syslog notifications
This part of therealization of the principle is public technology, please refer to the SNMP andsyslog protocol whitepaper.
Go to Alarm> Trap, SyslogNotification, Then select all devices needed to start trap and syslognotifications.
Click “Start” when completesetting.
Here you can also not choose all devices,select "Select manually", added device which need to startthe notification, and then click on the "Start".
The device automatically jump to bulk setdevice log page, where you can see the batch setting details.
Go to Device> Device List> ConfigureDevice> Enable Trap, previous enable button change to disablebuttion. That means notification is already enabled.
Test by unplug one cable, there will beimmediate warning notification if the device and link enable trap and syslogmonitoring function.
In this section, we will learn how to manageassert.
When you want to add an assert, go toAssert>Group >Add, Input category information and, click Add,
When you want to delete a new assert, go toAssert>Group >Delete, if you had confirmed, click yes,
When you want to add asset into categorygroup, go to all groups, select device and device type,click Add to group and then check the group you want the device to join and click OK.
After finish adding, you can view the devicein the group.
Add a device by importing device informationfiles. Export device grouping files can be imported into the device groupingtree operations back into the system.
There are two key points in assets import andexport
l Group import will delete all existing system grouping and devicesconfiguration.
l Can only import XLS (ie Excel) file format
Note: If you check the "Clear Importedgroup and Assert", the device group will be deleted. When incrementalimport check is not required.
When you want to import asserts, go to Assert >Import or go to Device >ImportAssert >Select File
Afterfinishing importing, you can view the result.
When you want toexport asserts, go to Assert >Export
.
To defineextension information for assets, go to Assert >Custom Property>Add Field, Add the field Name and description.
Configurationverification, go to Assert >Details, then you can see the newadded "Test" field.
By viewing device details, we can know the runningstatus of devices so as to achieve the purpose of the managing device.
Go to Device, and click relativedevice to view the detailed information.
Click "Update" buttonto modify the basic information.
Device CPU, memory and real-time curve chart.
Click on the topright corner of the "7" and "30" to see the CPU utilizationcurves for the last week or month, and you can export data to Excel and PDF..
Check the routingtable, interface table, MAC address table, ARP table, IP table, etc.. In thenavigation bar, in the device information bar, you can view other informationabout the device, as shown in the following diagram.
Sync can help to get real-time information of the device, so that the information displayed on the SNC is thelatest.
Sync up on single device, go to Device >DeviceList, When entering the device details page,you can see the device information automatically synchronized. And you canclick “sync” to manually synchronize information.
Bulk devices sync up, go to Device >Batchdevice sync >Real-time Device Sync >select Device >Start sync, When enteringthe device details page, you can see the device information automaticallysynchronized. And you can click “sync” to manually synchronize information.
Schedule sync up,go to Device >Batch device sync >Create Plan >select Device>Finish, the next step is to start plan toactivate the program.
Go to System >Plan Execution Log>Create Plan to see if the schedule isexecuted properly
Go to Device >Plan List > PlanName to see if the schedule is executed properly
Telnet to device for configuration from SNC. Goto Device >Device List enter the device details, click"Telnet" button on the left navigation bar.
Ping test, go to Device >Device Liston the device details page, click "Ping" on theleft navigation bar.
Traceroute test, goto Device >Device on the device details page, click"route tracking" on the left navigation bar.
Network inspector, go to Device >DeviceList >Network Inspector >Real-time Test >Select Device >Start Test
.
Go to Device >Network Inspector>Periodic Test and then select thedevice and test method that needs to be tested, and then click "starttesting" to create plan.
Click “finish” when complete setting. click on "active", the plan will take effect.
After a period of time to see the runningtime of the program has been changed, that means the plan has already been executed.
Checking device interface, Go to Device >Device List,on device details page, the system will automatically display the device'sinterface panel on the page, and the color torepresent the current status of the device interface.
Enable and disable Interface, go to Device >Device List enter the devicedetails page, right click on the interface of the device panel, select "disableinterface"/or "enable the interface"
Create interface switching plan, go toAdvanced >Interface > Int Control Plan >Create Plan >Select Device thenselect the interface need to enable or disable
Automatically back to the port switch programpage, at this time you need to click on the "active",then the plan will take effect.
After a period of time, back to the portswitch plan page, you can see the running time of the program has changed, thereis an executed plan. Click the project name to view the details of the plan.
Interface parameter setting, go to Device >Device List enter the device details page, then click the interface icon, enter the detailed interfaceinformation page, then click on the upper right corner of the device "SetInterface Parameters"
Click “Modify” when complete setting.
Interface binding management, go to Device >Device List >IntBinding Sync, on this page you can see the interface binding on the device that isthe port security entry, while the interface binding information can be managedand synchronized.
Device interface binding synchronization, go to Advanced >Interface >Int Binding Sync >SelectDevice, then start synchronization.
Device interface binding, go to Advanced >Interface >Int Binding Sync >Add, then fill inthe appropriate information, or click the wizard to select the device to bindthe device, and then click "add".
When you want to backupdevice configuration, go to Device >Device List and click theappropriate device name to enter the device details page, then click on “DeviceConfig” , In the device details the leftnavigation bar, scroll down, and then click on the "deviceconfiguration management".
Select the backup option on the below page,click "Backup".
Automatic configuration backup, go to Advanced >Config & SW >Add Auto-Backup Device>Select Device and add success will automatically jump to the page ofdevice configuration management.
bulk configuration backup, go to Advanced >Config &SW >Batch Backup thenselect the backup content and whether you enable VRF, and then clickbackup in the backup device configuration box in the pop-up".
Restore configuration of single device, go to Advanced >Config &SW then click thedevice name to enter the device detailed interface, then go to Deviceconfig >Restore,
According to the actual situation and needs,determine whether the check "immediately".
Batch restore equipment configuration, go to Advanced >Config & SW>Batch Restore >Change then select the correct configuration fileto restore the current device
After all the target configuration file isreplaced, check the device and click "restore"
Restore softwareversion of device, go to Device >DeviceList then click the appropriate device name to enter thedevice details page and then go to Add Softwarefrom Device >Update Device Software >Backup.
After the completion of the backup, it will automaticallyjump to the device software management page, you can be see the list ofsoftware files have been copied to the SNC server.
You can log in the device to confirm thesoftware version of the backup.
Import Devicesoftware version to SNC, go to Advanced >Config & SW>Software MGMT >From Local >Create
Will go back to device software managementpage, then you can see the imported file already list here.
Distributeconfiguration command of device, go to Advanced >Service >Config Template Library>Add, on templatedefinition page, input template name, then click the associated command in thecommand list.
Businessconfiguration schedule, go to Advanced >Service >Service Plan >Add>Select Template >Select Device >Finish, then click start plan
Modify terminal, go to Device >TerminalList > Add /Update /Delete, then set the terminal.
View terminalinformation, go to Device >Terminal List then select a rowof terminal information, can view information terminal.
Click the terminal name link to see theterminal details. As shown below:
Import andexport terminal information, go to Device >Terminal List >Import >Select ImportFile ,
IP/MAC binding, go to Device >Terminal List >Select terminal>Bind\Unbind,
IP/MAC exceptiondetection, go to Device >TerminalList >MAC-to-IPS /IP-to-MACs,
Subnetstatistics, go to Device >Subnet statistics >Sync.
In the sub network usage statistics listpage, select the remaining available IP number of this column, click theavailable IP number of 251, you can enter the available IP list:
In the sub network usage statistics listpage, select the PC usage, click the usage rate, you can enter the PC list:
In the sub networkusage statistics list page, select the device usage rate column, click on theuse of the rate, you can enter the device
Querymanufacturer, go to System >Device Vendor, then click the Addbutton to add a page, as shown in the following diagram:
Select a device vendor record, click the"operation" column of the "modify"link to modify the device vendor page, as shown below:
Enter the equipment vendor management page,select to delete the record of equipment manufacturers, click the "delete"button, as shown:
Model management, go to System >DeviceModel, then Select atleast one device type record, click the delete button, the system will performthe delete operation.
In the list, click the name of the model, andcan view the information of the device type.
Click the "Add"button to add the page and then fill in the device Model information.
Click the "Update"button to update device model.
Device categorylist, go to System >DeviceType, then select at least one device type record, click thedelete button, the system will perform the delete operation.
In the list, click the name of the model, andcan view the information of the device type.
Click the "Add"button to add device category, and then fill in the type of device information.As shown below:
Query equipmentseries, go to System >DeviceSeries ,then click the Add button to add the device series.
Select the device to delete records, clickthe "delete" button, as shown below:
Click the browsedetailed information recording equipment series link, enter the details page,shown in the following diagram:
Add Device: click Edit, add devicebutton
Delete node: select a node, click Edit,delete node button
Add link
a) Select a node, click Edit, and addthe link button.
b) Drag the cursor, click the target node, inthe pop-up dialog box input line, node link interface, etc.
Delete link: select a link, click Edit,delete link button.
Add virtual node
1) ClickEdit, add virtual node
2) Inthe pop-up dialog box, enter the virtual node tab, select the node icon
3) Addvirtual nodes as shown in Figure
Custom background map
1) Click Edit, custom background map
2) Click browse, upload pictures, save
3) topology after background picture uploaded
The system has the following topologicalviews by default. the layer 3 topology, the whole network topology, networktopology, routing topology, core aggregation topology
1. Custom topology
1) Customtopology, click on the corresponding tree node, according to the device tocreate
2) Enterthe view name, select the device, and click Add.
3) Customtopology, by path creation
4) Enterthe topological name, source IP, destination IP, determine
Create success
2. Grouped topology
1) Assetsin the group for revision
2) Groupingstructure, and the device will be synchronized to the grouping topology
3. Set home topology view
1) Inthe corresponding view, check the icon of the house, then set the home view totake effect
Default access to the home page after entering the topology
4. Save view
1) Inthe corresponding view, check the star standard, the save view into effect
1. Critical path detection
1) On the menu bar, click on the critical path, enter the source IP,IP, which is divided into immediate and periodic detection.
2) This is the result of detection.
3) Add cycle detection, we can set the detection cycle
2. Alarm carousel
1) Onthe menu bar click alarm carousel, enter the carousel pattern
2) Clickthe right upper corner of the setting, can set the keep alive time, the displayof the alarm level
3) Carouseleffect as below
3. Permission settings
1) Click on the permissions settings, permissions can be setcorresponding to the role of topology
2) Select the role to whom the topology view is visible.
4. The administrator login can only see thetopology view which he has the permission
5. Normal and traffic mode
1) Normal mode, with the line of the thickness of the representativebandwidth
2) Traffic mode, color of the line on behalf of bandwidth utilization
3) Switching background, on the menu bar, click “Change BGColor”
White
Dark blue
6. Show / hide
1) Dot / icon display mode switch
Icon pattern
Dot pattern, display required less space
2) Show / hide related items, and can be customized to display / hidethe information in the topology
Note: the number of +AP in the terminal listexceeds 1K, in order to ensure the display effect, the topology will not showPC and AP
7. Automatic layout
Spread out the nodes and links according tothe principle that the linked notes attract each other, and non-linked notesrepeal each other. It gets fine effect if the nodes is less than 200.
8. Other common operations
1) Double click the icon to enter the device details page, we can viewthe device related information, and customize the icon
2) You can input keyword on the upper right corner to search when thereare too many devices.
After locating the device, double click thedevice information in the search area to highlight the topology.
3) Zoom in/out
4) Supports full screen display: full screen display ofthe browser, which is prompted by the full screen mode will not be able to enter and edit keyboard input, do you want tocontinue? "We choose yes to enter. To exit the full screen mode, press theESC key to exit the full screen mode.
5) export topology file format can be PNG
6) In the topology view, the general information of the alarm
Red means a serious warning, orange is animportant warning, yellow said the general alarm, click on the number can beviewed at the corresponding level of alarm information.
7) Topology can zoom in/out
Zoom out
Zoom in
8) Show / hide view: display a miniature version of topology display,can choose a region to show.
Click the image below tohide.
Click todisplay
9) Shows the specific meaning of device icon, such as what the shape ofthe device shows what device, while the alarm level of different display coloricon is not the same.
Go to Performance> Modify Indicators, then click the Add button to adda page, as shown in the following diagram:
Go to Performance> Global Perf Threshold, then select the threshold needed adjust,click “Modify”.
Go to Performance>Monitored Device >Add >Select Device >Save, You can enterthe device IP, device name, device type or real-time monitoring status, clickthe search button to query, as shown below:
Go to Performance ,Click “Add” to add a monitor device, then select device, and thenclick the Add and Save button to complete the adding operation ofthe monitoring device,
Go to Performance> Monitored Device >Start/Stop Real-time Monitor.
Enter the monitor device management page. Youcan see the "real time performance sample frequency settings" column.
Go to Performance> Single-device View and then select the device name, andthen select the system to refresh the view.
A minute later, the system informationcollection is completed, you can see the device performance in the upper leftcorner view:
Select time range.
Select monitoring indicators and monitoringinterfaces.
Go to Performance> All View then selectmonitoring device
Select the performance indicator, "device"or "interface":
Select monitoring device indicator:
Go to Performance> History Per Query then selectdevice and indicator.
Go to Alarm >Alarm parameter to setalarm parameter.
Go to Alarm >Alarm Event > Add or Modify alarm events.
Go to Alarm >Alarm Rule> Add and then fill in the rule information.
Go to Alarm >Real time Alarm Monitorthen check the alarm information in the alarmlist.
Click "Acknowledge"to change the alarm status.
Click on the "clear",to change the alarm level of alert.
Click on the alarm list Details icon
Add warning annotation, Add Alarm Note, and click Confirm. And then see the newaddition of comments in the "alarm notes list".
Go to Alarm >Realtime Alarm View then click on the top right corner of the "Export" button.
If want to delete alarm, go to Alarm > Realtime Alarm View then select thecheck box and click “delete”.
Go to Alarm > Historical Alarm thenSelect the check box to confirm the alarm information, click "Acknowledge"/ "Cancel Acknowledgement " / "Clear "/ "delete" Search Result.
Click on the "Device Name"link to view the device information pages, view device details.
Go to Alarm >Undefined Alarm Event then click ”Disable Uspecified Alarm Generation” todisable the function.
Go to System >Mail server Setting >Update to set the information ofmail server.
Click the "Email Test"to check whether the mail server is configured successfully.
Go to Alarm >Alarm Notification >Select Role >Add > Select Device >Select AlarmLevel >Select Alarm Event.
After adding device, check the message alarmto the device.
Select according to alarm level:
Select alarm event according to the actualneed
When the configuration is finished, return tothe alarm alert notification: view state change from incomplete to complete.
Go to Alarm >Devices with Alarm then Click on the "Device Name" link toview the device information pages.
Go to Report >Report List >Create Report.
1. View global alarm reports, there are unresolvedwarning trend statistics (including the total number of alarms, the number ofserious alarms, the number of major alarm, general alarm number)
2. Asset management reports (including summary vendors' equipment,model summary, asset management summary, device model summary, etc.)
3. WLAN asset reports (including equipment manufacturers, models, etc.)
4. AP load report:
5. AC load report:
6. User amount statistical report
7. Rate of AP retreat statistics
Go to Report >History report >View
Click the download button tosave the report
Publish Report。
Go to System >Mail server SAM/SMP Register to set the information of mail server.
Depending on the type to make a selection,the SNC configuration needs to add the IP address of the server.
In order to manage the wireless network bySNC, there are some basic configuration.
Configure the SNMP and telnet protocols,refer to the basic configuration.
To add wireless devices AC, go to WLAN> AC > Add, Add the IP address of AC, select the relevant SNMPtemplate and TELNET template.
Click “OK” when completesetting.
To add hotspot information, go to WLAN> Hotspot> Add Child Hotspot, Add a hot spot information, click save.
And then on the basis level 1 hot spot, click"Add Child Hotspot" to add a lower level of hot.
Note: if you need to addmuch hot information, you can directly import hot information template in theweb interface, please refer to the WLAN module configuration guide.
Wireless device AP associated hotspot, go to WLAN> Hotspot, select the hot spot, click "add AP"
Added successfully, you can find "APhotspots associated information,"
The function is used to customize thecomprehensive page statistics. Go to WLAN >Summary, according to the actual needs of custom to add the functionlist.
Click “Save” when completesetting.
The function is used to check the results ofthe reachability of AC in the system and the results of the AC alarmstatistics.. go to WLAN > Summary , to see the AC and AP assetinformation, as shown in the following figure:
The function is used to view the statisticsof the hot spot availability rate TopN and AP availability rate TopN..
Go to WLAN > Summary >GlobalOut-of-Service Rate >Configuration Time .
Click “OK” when completesetting.
The function is used to view the entirenetwork AP idle traffic TopN. go to WLAN >Summary >Top N Global Idle flow Statistic >Idle AP, According tothe actual need to configure the flow and time of the super idle AP
Click “Save” when completesetting.
The function is used to view the statisticsof the hot spot rate TopN and AP rate TopN. Go to WLAN > Summary>Global Rate Statistics.
Go to WLAN > Summary >Global RateStatistics (TopN) >Hotspot Check All to show all the hot rate statistics
Go to WLAN > Summary >Global RateStatistics (TopN) >AP Check All to show allthe AP rate statistics
The function is used to view the statisticaltime of the total network AP the number of related users and the number ofauthentication users.
Go to WLAN > Summary >Global STAStatistics. Then Click on the drop-down menu statistical SSID.
The function is used to import and exporthotspot information. Go to WLAN > Hotspot>Export, to export the hotspot relative files.
Click on the "import"after the hot information excel form is completed.
The function is used to modify the hot information, including hot names,hot spots address, and hot description. Go to WLAN> Hotspot, in the upper right corner click the icon, to add Hotspotinformation.
Click “Save” when completesetting.
This feature is used to check the hot spotinformation. Go to WLAN > Hotspot, inthe upper right corner click the icon, then click “APInfo” to check the hotspot information.
The function is used to check the hotstatistical information. Go to WLAN > Hotspot,in the upper right corner click the icon, then click “Out-of-ServiceRate Info” and “User Count” to check the hotspotstatistical information.
The function is based on query AP conditions,query related AP information. Go to WLAN > AP,according to the actual needs, you can query terms such as AP, AC, MAC,and SSID.
Click “Out-of-Service Rate” toset the calculation time range.
Click “OK” when completesetting.
Click “Idle AP” and then setconfiguration parameters about idleness flow status statistics.
Click “Alarm Thresholds” to setthe alarm threshold.
Click “Export” to export queryresults.
Click “Delete” to delete Aps.
Click “Modify” to modify thephysical location of the AP
Click “Save” when complete setting.
Go to WLAN >AP >AP name >Synchronize AP to synchronous AP information.
Go to WLAN >AP >AP name >Alarm Threshold then click Edit to set the alarmthreshold.
Click “Save” when aftercompleting.
Go to WLAN >AP >RRM to view the RRM AP statistics.
Go to WLAN >AP >AP Radio-on/Radio-Off Task >Add to add a timer switch AP task.,then select device and configure Aps Switch, Click finish, return the AP timerswitch task list.
Click “Activate” then start Plan.
After the implementation of the task plan,click on the name of the project to see the results of the plan, as shownbelow:
Go to WLAN >AP >AP Connectivity Test Task >Add to add a connected test task.Then select device.
Click "finish", and thesystem returns the AP connectivity test task list, Click “Activate”then start plan.
After the implementation of the task plan,click on the name of the project to see the results of the plan, as shownbelow:
Go to WLAN >AP select APs then click “Enable” to enable the spectrumanalysis.
.
Click “OK” to return to APList.
Go to WLAN >AP >Associate to link the hot spot
Click “OK” when complete setting.
The AP page can choose whether to show moreAP fields, as shown in the following figure:
This feature is used to add, query and deletethe AC device. Go to WLAN > AC >Add, addthe IP AC address, select the relevant SNMP template and TELNET template
After completion, it will automaticallysynchronize the associated AP AC
Enter the query terms, click the query.
Click "delete" todelete AC
This feature is used to add, query and deletethe AC device. Go to WLAN > AC >AC name>Synchronize AC, to synchronize AC.
This feature is used to add, query and deletethe AC device. Go to WLAN > AC >AC name>Alarm Threshold, according to the actual needs, set AC alarmthreshold parameters.
Go to WLAN > AC >AC name>Details >Basic Information and then modify the general properties of thewireless controller configuration information.
Go to WLAN > AC >AC name>Details >Trap Receivers and then click "Add" to addthe message server which needs to receive traps.
Go to WLAN >AC >AC name >Details >Trap Control and then click "Update" to modify the Trap parameters.
Go to WLAN > AC >AC name>Details >Syslog Receiver and then Syslog reception can be added,deleted, synchronous operation.
Go to WLAN >STA >Global STAs , add the view the entire network of wireless userstatistics.
Click “STA Statistics” thenselect a hot spot to view the STA information.
Go to WLAN >STA >a single hot spot >Key STA Settings, to set the thresholdfor the received packet retransmission rate
Customize more terminal fields, as shown inthe following figure:
Go to WLAN >STA > Key STA, then select a single hot port, click “Add KeySTA” and set the parameters of STA.
Click “Batch Set Retransmit RateThreshold” to set the threshold for the received packet retransmissionrate.
Click “Remove Key STA” todelete the Key STA.
Go to WLAN >Alarm,then click "",you can render the associated subordinate navigation. Then click the currentalarm source, and the alarm list is presented with the alarm informationgenerated by the device.
Go to WLAN > Alarm, thenclick “Export” to export the alarm list.
Go to WLAN > Alarm, then Select the check box beforethe alarm information in the alarm list. Click “Acknowledge” then alarm statuschange to confirmation.
Click “Resolved” then alarmstate to solve has been solved.
Click the "Delete" willdelete the selected alarm.
Go to WLAN > Alarm > Alarm Configuration, then set alarm information.
Go to WLAN > Alarm, click a single hotport, then click “Alarm Window Configuration” to define whetherto enable the pop-up window warning prompt.
Go to WLAN >AP >Rogue AP Configuration Wizard, then view the information ofillegal AP.
Go to WLAN >AP select multiple AP, and then click on the "Rogue APConfiguration Wizard", then set the illegal AP.
Enter the illegal AP configuration wizardpage, you need to select the configuration mode, there are 2 kinds ofconfiguration mode: simple configuration mode and user configuration mode,select the "simple configuration mode", the AP workmode will be configured as a mixed mode, the system is configured to configmode; click OK that is configured to equipment.
Select "user configuration mode","OK" button will become "next" button, click "next",enter the configuration AP work mode page.
AP can be configured in 3 kinds of workmodes: mixed mode, listening mode, access mode; select "access mode",then click "OK button".
Select the mixed mode or monitor mode, clicknext, and then enter the AP counter mode page:
After entering the AP counter system modeconfiguration page, click "OK", meaning that only the APconfiguration of the work mode, not to configure the counter model.
Four optional configure AP counter mode, including:config mode, rogue, SSID, ad-hoc mode; when a certain mode is selected, figurein the upper right corner will tick effect appears, as shown in Figure:
Click “OK” when completesetting.
Go to WLAN >Rogue AP >List of Rogue APs, then view the information of illegalAP.
Go to WLAN > Rogue AP >WhiteListand Blacklist >Select an AC, then you can see the black andwhite list information on the current AC.
You can manually enter BSSID, click "add",as shown below:
Can also be in the last chapter of theillegal AP list in the AP to add the black list,
Check the black list and click "delete".
Go to WLAN >Rogue AP >Operation Log, then Select Query beginning and endingtime, click on "Query",
Go to WLAN >Assistant, then enter search terms, such as "18", click on"Query", you can search for the following five aspectswith "18".
Go to WLAN >Assistant, then enter search terms, such as SSID for the "Vlan11",click on "Query", then see the details of the STA
Other real-time query methods, such as userMAC, the input query terms "00:08:ca:54:86:23"
The function is used to view the logicalrelationship between the wireless network hotspot, AC, AP, and STA. Go to WLAN> Topology >Hotspot View, click the AP icon to show the hot AP
Click the terminal icon, terminal informationmay be presented under the hot spot.
Click “AC View” to see thelogical relationships between AC, AP, and STA,
Ruijie Networks websites use cookies to deliver and improve the website experience.
See our cookie policy for further details on how we use cookies and how to change your cookie settings.
Cookie Manager
When you visit any website, the website will store or retrieve the information on your browser. This process is mostly in the form of cookies. Such information may involve your personal information, preferences or equipment, and is mainly used to enable the website to provide services in accordance with your expectations. Such information usually does not directly identify your personal information, but it can provide you with a more personalized network experience. We fully respect your privacy, so you can choose not to allow certain types of cookies. You only need to click on the names of different cookie categories to learn more and change the default settings. However, blocking certain types of cookies may affect your website experience and the services we can provide you.
Through this type of cookie, we can count website visits and traffic sources in order to evaluate and improve the performance of our website. This type of cookie can also help us understand the popularity of the page and the activity of visitors on the site. All information collected by such cookies will be aggregated to ensure the anonymity of the information. If you do not allow such cookies, we will have no way of knowing when you visited our website, and we will not be able to monitor website performance.
This type of cookie is necessary for the normal operation of the website and cannot be turned off in our system. Usually, they are only set for the actions you do, which are equivalent to service requests, such as setting your privacy preferences, logging in, or filling out forms. You can set your browser to block or remind you of such cookies, but certain functions of the website will not be available. Such cookies do not store any personally identifiable information.
Contact Us
How can we help you?