H3C Campus Switches SmartMC Best Practices-6W102

HomeSupportConfigure & DeployBest PracticesH3C Campus Switches SmartMC Best Practices-6W102
Download Book
  • Released At: 25-06-2024
  • Page Views:
  • Downloads:
Table of Contents
Related Documents

 

H3C Campus Switches SmartMC Best Practices

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Copyright © 2024 New H3C Technologies Co., Ltd. All rights reserved.

No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of New H3C Technologies Co., Ltd.

Except for the trademarks of New H3C Technologies Co., Ltd., any trademarks that may be mentioned in this document are the property of their respective owners.

The information in this document is subject to change without notice.


Contents

About SmartMC·· 1

Background· 1

Operating mechanism·· 1

Network framework· 1

Management platform·· 2

Best practice configuration· 3

Network requirements· 3

Deploying the SmartMC network· 4

Configuring automatic deployment 4

Configuring manual deployment 6

Specifying a file server 8

Deploying VLAN settings· 9

Deploying configurations in bulk· 10

Configuring ports· 13

Configuring unified wired and wireless maintenance· 17

Configuring basic WLAN settings· 17

Configuring PoE power supply· 19

Viewing the network topology and device details· 21

Configuring camera monitoring· 21

Managing cameras in static mode· 21

Managing cameras in dynamic mode· 22

Viewing cameras in the topology· 25

Configuring audio and video monitoring· 25

Configuring SQA· 26

Viewing audio and video monitoring information· 27

Automatic endpoint identification· 28

Identifying an endpoint through DHCP Option 55 fingerprint 28

Identifying an endpoint through HTTP user agent fingerprint 29

Configuring fingerprints on a TM·· 31

Viewing online clients· 32

Health degree· 32

Enabling or disabling health analysis· 32

Viewing health status· 33

Viewing health details· 36

Exporting the health report 38

Port authentication· 39

About port authentication· 39

Restrictions and guidelines· 40

Prerequisites· 40

Configuring port authentication· 43

Verifying the configuration· 45

Appendix  Configurations automatically deployed by port authentication· 45

SmartMC feature specifications· 48

SmartMC restrictions and guidelines· 48

Recommended devices for SmartMC·· 48

 


About SmartMC

Background

As the network scale expands, a large number of access devices need to be deployed at the network edge, increasing the complexity and operational costs of campus networks. Users require a simple, low-cost, and efficient network management platform to manage the increasingly complex campus networks.

Smart Management Center (SmartMC) is an integrated network management platform. Users only need to log in to the Web page of the switch device using a browser to access the SmartMC network management platform. SmartMC integrates a multitude of network management and maintenance functions, facilitating users to manage devices in bulk, effectively solving the centralized management issue for a large number of devices.

Operating mechanism

Network framework

Figure 1 shows the basic framework of a SmartMC network. The SmartMC network contains the following elements:

·     Commander—Also called typology master (TM), which manages all members in the SmartMC network. In a SmartMC network, only one device acts as the commander and the remaining devices all act as members.

·     Member—Also called typology client (TC), which is managed by the commander. The maximum number of manageable member devices in a SmartMC network varies by device model.

·     File server—Stores startup software images and configuration files for the commander and members. Members obtain the required files from the server according to commands issued by the commander. The file server can be an independent server or co-located with the commander or a member. As a best practice to reduce workloads on the commander or member, deploy an independent file server.

·     Host—Used for accessing the management device's Web page through a browser. Users can enter the SmartMC network management platform by clicking SmartMC in the navigation bar on the Web page.

Figure 1 SmartMC network framework

 

Management platform

The SmartMC management platform integrates the following functions:

·     Intelligent management—Includes device role changing, network topology collection, outbound interface configuration, and automated Ethernet link aggregation.

·     Intelligent operation and maintenance—Includes member upgrade, bulk backup of configuration files, one-key VLAN deployment, smart port identification, resource monitoring, and faulty device replacement.

·     Visibility—Includes network topology management, member adding, device list display, and device state display.

·     Intelligent servicing—Includes user creation and activation.

With the SmartMC management platform, you can manage the SmartMC network topology and manage members in bulk.

Figure 2 through Figure 5 show example Web interfaces.

Figure 2 Intelligent management

 

Figure 3 Intelligent operation and maintenance

 

Figure 4 Visibility

 

Figure 5 Intelligent servicing

 

Best practice configuration

Network requirements

As shown in Figure 6, an AP is connected to TC 3, two cameras are connected to TC 3, and one camera is connected to TC 1. Configure the TM in the SmartMC configuration wizard.

·     Configure TCs to automatically join the SmartMC network or manually add TCs to the network.

·     Configure the AP, TM, and TCs to communicate with each other in VLAN 1.

·     Enable AC functions on the TM and configure TC 3 to supply power to the AP and the cameras through PoE.

·     Enable camera monitoring on the TM.

·     Enable SIP-based SQA on all TCs to monitor audio and video sessions.

·     Enable automatic endpoint identification on the TM.

·     Enable the network-wide health analysis feature on the TM to view device health status.

·     Enable port authentication on the TM to authenticate access users.

Figure 6 Network diagram

 

Deploying the SmartMC network

You can configure the members to join the network automatically or add them manually.

Configuring automatic deployment

Procedure

1.     Configure the commander:

a.     Log in to the commander and then click SmartMC from the left navigation pane.

Figure 7 SmartMC Web interface

 

b.     Specify the management IP address (IP address of VLAN-interface 1 on the commander).

Figure 8 Specifying the management IP address

 

c.     Specify the outgoing interface. Specify the interface on the commander that connects the commander to the current PC as the outgoing interface.

Figure 9 Specifying the outgoing interface

 

d.     Specify the local user of the commander. You can specify an existing local user or a new local user. If you specify a new user, the system creates the user automatically.

Figure 10 Specifying the management user

 

e.     Verify the commander settings.

Figure 11 Verifying the commander settings

 

2.     Power on the members without loading any configuration. The members will join the SmartMC network automatically.

Verifying the configuration

Access the Visibility > Topology page and view the network topology. Verify that members have joined the network as expected.

Figure 12 Network topology

 

Configuring manual deployment

For members that cannot join the network automatically, you can access the Visibility > Topology page and click Add device to manually add them one by one.

Before a manual adding, make sure the settings in Table 1 have been configured on the member to add.

Table 1 Required settings on members to add manually

Item

Commands

Specify an IP address for VLAN-interface 1. Make sure the IP address is in the same subnet as the IP address of VLAN-interface 1 on the commander.

·     interface vlan-interface 1

·     ip address ip-address { mask-length | mask }

Enable HTTP and HTTPS.

·     ip http enable

·     ip https enable

Enable the Telnet service.

telnet server enable

Enable NETCONF over SOAP over HTTP.

netconf soap http enable

Enable LLDP globally.

lldp global enable

Create a user. Set the username and password to admin, add the telnet, http, and https service types, and authorize the user to use the network-admin user role.

NOTE:

Before configuring the password, lower the password complexity requirements for local users.

·     password-control length 4

·     password-control composition type-number 1 type-length 1

·     undo password-control complexity user-name check

·     local-user admin

·     password simple admin

·     service-type telnet http https

·     authorization-attribute user-role network-admin

Set scheme authentication for VTY user lines 0 to 63.

·     line vty 0 63

·     authentication-mode scheme

Enable SNMPv2c and create read-only community public.

·     snmp-agent sys-info version v2c

·     snmp-agent community read public

 

Figure 13 Manually adding a member

 

Specifying a file server

A file server is required for fault member replacement, device upgrade, bulk configuration file backup, and bulk configuration deployment.

To specify a file server, access the Intelligent Management > File server page and specify the file server parameters as needed.

Figure 14 Specifying a file server

 

Deploying VLAN settings

About this task

To facilitate batch configuration of ports and simplify device management, VLANs can be created for member devices. All access-type ports in member devices that are not connected to other member or management devices can be added to the VLAN.

Restrictions and guidelines

For access-type ports connected to offline devices, you must manually clear the offline devices before performing this operation.

If a member device successfully creates a VLAN but fails to add all qualifying ports to the VLAN, the configurations of all qualifying ports will revert to their state before VLAN creation.

The failure of VLAN creation on one member device does not affect the VLAN creation on other member devices.

Procedure

1.     Access the Intelligent O&M > VLAN deployment page.

Figure 15 VLAN deployment

 

2.     Select the operation object. Options include Members and SmartMC groups, which indicates creating VLANs for member devices and creating VLANs for SmartMC groups, respectively.

3.     Select the target members or SmartMC groups, and then click Deploy VLAN in one step. In the dialog box that opens, enter the VLAN ID, and then click Certain.

Figure 16 Entering the VLAN ID

 

4.     To view the VLAN deployment result, click View deployment result.

¡     ProcessingIndicates that the member device is in the process of creating a VLAN.

¡     SuccessIndicates that the member device has successfully created a VLAN.

¡     Failure. The port xxx is not an access portIndicates that the member device failed to create a VLAN because the port is not an access port.

¡     Failure. xxx not existIndicates that the member device failed to create a VLAN because the port does not exist.

Figure 17 Viewing the deployment result

 

Deploying configurations in bulk

About this task

You can use this feature to deploy multiple configurations to member devices at once, without the need to log in to each member to configure them individually. This simplifies the configuration process and saves time. The processing flow of the function is:

·     Users create a command-line batch file on the management device and edit the commands that need to be executed in bulk on the member devices.

·     The management device sends the file to the member devices through a NETCONF session.

·     The member devices execute the batch commands issued by the management device.

Procedure

1.     Access the Intelligent O&M > Batch deployment page.

Figure 18 Batch deployment

 

2.     Select the location where the command line batch file to be saved. The batch file can be stored on the Flash or a file server.

3.     Create a new command-line batch file. If a batch processing file already exists on the device, proceed to the next step.

Click Create. In the Create batch file dialog box, enter the file name and configuration content. After completing the configuration, click OK to finish creating the batch configuration file. As shown in the figure below, enter the commands that the member devices need to execute in the configuration content area, with each command occupying one line. The device does not check the correctness of the commands, so when editing the commands, you must make sure their accuracy.

Figure 19 Creating a batch file

 

4.     Select the created .cmdset batch file, click the Edit icon  to view or edit the file.

Figure 20 Batch file list

 

5.     On the Batch deployment page, click Deploy batch config. In the dialog box that opens, select the deployment target. If you select Members, you can enter the device ID or a list of device IDs. If you select SmartMC groups, you can select one or more SmartMC groups. Then, click Certain.

Figure 21 Deploying configurations

 

6.     To view the command execution result on devices, click View deployment status on the Batch deployment page.

Figure 22 Viewing the deployment status

 

Configuring ports

About this task

The bulk configuration of ports feature is used to deploy configurations from a command-line batch file to one or more specified ports (non-OLT ports).

Restrictions and guidelines

To avoid configuration errors, make sure all the configurations in the port batch configuration file are in port view.

The content of the command-line batch file cannot exceed 8190 characters.

When you configure the command-line batch file, the device does not check the correctness of the commands, so when you edit the commands, you must make sure their accuracy.

Prerequisites

Make sure the batch file already exists before you configuring ports in bulk. To create or edit a batch configuration file:

1.     Access the Intelligent O&M > Batch deployment page.

Figure 23 Batch deployment

 

2.     Select the location where the command line batch file to be saved. The batch file can be stored on the Flash or a file server.

3.     Create a new command-line batch file. If a batch processing file already exists on the device, proceed to the next step.

Click Create. In the Create batch file dialog box, enter the file name and configuration content. After completing the configuration, click OK to finish creating the batch configuration file. As shown in the figure below, enter the commands that the member devices need to execute in the configuration content area, with each command occupying one line. The device does not check the correctness of the commands, so when editing the commands, you must make sure their accuracy.

Figure 24 Creating a batch file

 

4.     Select the created .cmdset batch file, click the Edit icon  to view or edit the file.

Figure 25 Batch file list

 

Procedure

1.     Access the Visibility > Topology page. Select a device enabled with port authentication, view the device ports, and select the target ports (non-OLT ports) on the device panel at the bottom of the page.

Figure 26 Selecting ports

 

2.     Click Configure ports. In the dialog box that opens, select the configuration file, and then click Certain.

Figure 27 Selecting a configuration file

 

Figure 28 Batch deployment prompt

 

3.     View the port status. Access the Intelligent O&M > Port identification page, and click View deployment status. You can view the execution status of the configuration file deployed.

Figure 29 Port identification

 

View the configuration files, and click the icon in the Operation column to view the file details. Select the manual deployment method.

Figure 30 Viewing port configuration status

 

Figure 31 Viewing detailed port configuration status

 

Configuring unified wired and wireless maintenance

Unified wired and wireless maintenance integrates wired network management, basic wireless network management, and PoE power visibility functions, allowing unified management and statistics displaying for both the wired and wireless networks.

Configuring basic WLAN settings

Perform this task to add, delete, or modify wireless services, configure inter-AP Layer 2 isolation, and manage PoE power supply on all devices in the SmartMC network.

Prerequisites

Perform the following tasks to enable the AC function on the TM:

1.     Install the feature image of the unified wired and wireless AC.

The feature image of the unified wired and wireless AC is contained in the switch software image package. When loading the feature image, make sure that the feature image version matches the switch software image version. To obtain the image of the unified wired and wireless AC, contact Technical Support.

2.     Activate the feature image of the unified wired and wireless AC.

install activate feature filename&<1-30> slot slot-number [ test ]

3.     Configure the feature image to remain activated after the system reboots.

install commit

4.     Install licenses.

To increase the number of APs that the AC can manage, you must install licenses. For more information about installing licenses, see H3C Comware 7 and Comware 9 WLAN Products Local Licensing Guide at http://www.h3c.com/cn/home/qr/default.htm?id=607.

Restrictions and guidelines

By default, the authentication mode is PSK for created wireless services.

Procedure

1.     Access the Intelligent O&M > WLAN setup page.

2.     Click Add.

Figure 32 Adding a wireless service

 

3.     Configure wireless service parameters and then click Confirm.

Figure 33 Configuring wireless service parameters

 

4.     Click the Edit icon for the wireless service.

Figure 34 Editing a wireless service

 

5.     Configure advanced wireless service settings as needed.

Figure 35 Configuring advanced wireless service settings

 

Configuring PoE power supply

1.     From the left navigation pane, click Visibility.

2.     To view PSE information, click the PSEs tab. You can click an action link in the Actions column to view PSE details or PDs, or configure PoE power supply.

Figure 36 Viewing PSE information

 

Figure 37 Viewing PSE details

 

Figure 38 Configuring PoE power supply

 

3.     To view PD information, click the PDs tab.

Figure 39 Viewing PD information

 

Viewing the network topology and device details

You can view the network topology on the Visibility > Topology page.

To view details information about an AP, click Expand.

To view neighbor information about a device, double click the device icon.

Figure 40 Viewing the network topology and device details

 

Configuring camera monitoring

Perform this task to monitor the association and disassociation of cameras in VLANs. With this feature configured, the system displays monitored cameras on the Visibility > Topology page and refreshes camera status in real time.

Managing cameras in static mode

To manage cameras in static mode, access the Intelligent Management > Camera management page and select Static for Management mode.

On the page that opens, you must specify parameters such as MAC addresses of cameras to be monitored, and the device will monitor associations and disassociations of the cameras by matching MAC address entries.

You can manage a single camera or manage multiple cameras in one operation.

Adding cameras to monitor

To add a single camera, specify the MAC address of the camera and the VLAN in which the camera will be monitored, and then click Add.

To add multiple cameras in bulk, click Import config, and then import a configuration file that contains camera information.

Figure 41 Import cameras to monitor

 

Viewing all monitored cameras

To view all camera monitoring configurations, click View all config.

Figure 42 Viewing all camera monitoring configurations

 

Deleting cameras

You can delete a camera or multiple cameras in bulk. (Details not shown.)

Managing cameras in dynamic mode

To manage cameras in dynamic mode, access the Intelligent Management > Camera management page and select Dynamic for Management mode.

In this mode, the device uses Open Network Video Interface Forum (ONVIF) to monitor associations and disassociations of ONVIF endpoints.

Dynamic camera management supports the following features:

·     ONVIF Probe—Detects ONVIF endpoints in a network proactively. To use this feature, you must enable it on the TM VLAN interface in the same VLAN as the monitored endpoints.

·     ONVIF Snooping—Identifies ONVIF endpoints and monitors associations and disassociations of ONVIF endpoints. To use the feature, you must enable it on the TCs or TM to which the ONVIF endpoints are directly connected.

·     ONVIF Reset—Clears information about ONVIF endpoints detected on the specified interface. After the clearing, the device can detect the ONVIF endpoints again and generate updated endpoint information.

Enabling ONVIF probe

To enable ONVIF probe and configure the probe interval, click the  icon in the Operation column for a TM. With this feature enabled, the device can detect ONVIF endpoints on the subnet where the VLAN interface resides.

Figure 43 Accessing ONVIF probe configuration

 

Figure 44 Configuring ONVIF probe parameters

 

Enabling ONVIF snooping

To enable ONVIF snooping, click the  icon in the Operation column for a device (TM or TC) to which the monitored endpoint is directly connected. With this feature enabled, the device can identify directly connected ONVIF endpoints and monitor the associations and disassociations of these endpoints.

Figure 45 ONVIF snooping configuration

 

Figure 46 Enabling ONVIF snooping

 

(Optional) Configuring ONVIF reset

To clear information about endpoints detected on an interface through ONVIF, click the ONVIF Reset tab, select the device and interface, and click OK. After the clearing, the device can detect the ONVIF endpoints again.

Figure 47 Configuring ONVIF reset

 

Viewing cameras in the topology

You can access the Visibility > Topology page to view monitored cameras in the topology.

Figure 48 Viewing cameras in the topology

 

To view detailed information about monitored cameras, click View camera information.

Figure 49 Viewing detailed camera information

 

Configuring audio and video monitoring

Perform this task to monitor audio and video sessions for multimedia traffic. You can configure SIP-based service quality analysis (SQA) on devices one by one from the CLI or configure SIP-based SQA for multiple devices in bulk from the Web interface.

Configuring SQA

Configuring SQA on a single device from the CLI

You must perform this task on both the commander and members.

To configure SQA on a single device:

1.     Enter system view.

system-view

2.     Enter SQA view.

sqa

3.     Enable SIP-based SQA.

sqa-sip enable

By default, SIP-based SQA is disabled.

4.     (Optional.) Specify the SIP listening port number.

sqa-sip port port-number

By default, the SIP listening port number is 5060.

Make sure the SIP listening port number on the device is the same as that on the SIP server.

5.     (Optional.) Specify an IP address range for SIP-based SQA.

sqa-sip filter address start-address end-address

By default, no IP address range is specified for SIP-based SQA. The device performs SQA on all SIP packets.

After this command is executed, the device performs SQA only on SIP calls in the specified IP address range.

Configuring SQA on multiple devices from the Web interface

1.     Create configuration file Config.cfg and save the file to the file server. The content of the configuration file must contain the following commands:

<FTP Server> more Config.cfg

system-view

sqa

sqa-sip enable

sqa-sip port 5066

sqa-sip filter address 192.168.56.1 192.168.56.244

2.     Access the Intelligent O&M > Batch deployment page, select the file server as the batch file storage location, and select Config.cfg from the file list.

3.     Click Deploy batch config.

4.     Select Members as the deployment object, specify the member ID range, and then click Confirm.

Figure 50 Deploying a batch configuration file

 

5.     Click View deployment status to verify the deployment result.

To view deployment details, click the right chevron icon.

Figure 51 Viewing the deployment status

 

Viewing audio and video monitoring information

You can access the Visibility > Audio and video monitoring page to view detailed information about audio and video monitoring and identify session quality based on the uplink and downlink MOS values.

Figure 52 Viewing audio and video monitoring information

 

 

NOTE:

The device whose TC ID is 0 is the commander.

A higher MOS value represents a higher session quality. MOS values are in the range of 0 to 5.

·     0 to 1—Extremely poor session quality.

·     1 to 2—Poor session quality.

·     2 to 3—Average session quality.

·     3 to 4—Good session quality.

·     4 to 5—Excellent session quality.

·     N/A—The system fails to obtain the MOS value.

 

Automatic endpoint identification

When an endpoint accesses the network, a TM or TC obtains fingerprint information from the authentication request of an endpoint and matches the fingerprint with the endpoint identification rules. If a match is found, the device considers that the endpoint is online, records the MAC address, endpoint category, and vendor of the endpoint, and sends the information to the TM for unified display. Devices that support automatic endpoint identification are mobile phones, tablets, laptops, and routers.

The following fingerprint types are supported:

·     DHCP Option 55 fingerprint—Parameter request list option. The option is used by an endpoint to request specified configuration parameters. To use this fingerprint, enable DHCP snooping entries on the access interface of endpoints and configure the access interface as a trusted port.

·     HTTP user agent fingerprint—Located in the header of HTTP requests to carry information about the endpoint operating system, Web browser, and versions. To use this fingerprint, enable portal authentication on the access interface of endpoints.

·     MAC address fingerprint—MAC address of the endpoint or MAC address range to which the endpoint belongs.

The device matches fingerprint information for an endpoint in the following order:

·     DHCP Option 55 fingerprint.

·     HTTP user agent fingerprint.

·     MAC address fingerprint.

The priority of static camera management is higher than automatic recognition of access endpoints. If an endpoint matches the static mode camera management function (matches an EPA endpoint static identification rule), it will prioritize the endpoint information determined by that function. For more information about static camera management, see "Managing cameras in static mode."

Identifying an endpoint through DHCP Option 55 fingerprint

As a best practice, connect endpoints to TCs in the SmartMC network. Configure the TM interface to act as the DHCP server and enable DHCP snooping on TCs. After an endpoint comes online through DHCP, the corresponding TC can identify the endpoint by using the DHCP Option 55 fingerprint.

Configuring the TM interface to act as the DHCP server

1.     Enter system view of the TM.

system-view

2.     (Optional.) Specify IP addresses excluded from automatic address allocation.

dhcp server forbidden-ip start-ip-address [ end-ip-address ] [ vpn-instance vpn-instance-name ]

By default, all IP addresses in the DHCP address pool, except for the IP address of the DHCP server interface, are available for automatic address allocation.

3.     Create a DHCP address pool and enter its view.

dhcp server ip-pool pool-name

4.     Specify the subnet for dynamic allocation in the DHCP address pool.

network network-address [ mask-length | mask mask ]

By default, no subnet is specified in a DHCP address pool.

5.     (Optional.) Set the lease duration in the DHCP address pool.

expired { day day [ hour hour [ minute minute [ second second ] ] ] | unlimited }

By default, the lease duration is 1 day.

6.     Return to system view.

quit

7.     Enable DHCP.

dhcp enable

By default, DHCP is disabled.

Enabling DHCP snooping on the TC globally

1.     Enter system view of the TC.

system-view

2.     Enable DHCP snooping globally.

dhcp snooping enable

By default, DHCP snooping is disabled.

3.     Enter interface view.

interface interface-type interface-number

Specify the interface connected to endpoints.

4.     Specify the port as a trusted port.

dhcp snooping trust

By default, all ports are untrusted after DHCP snooping is enabled.

Identifying an endpoint through HTTP user agent fingerprint

As a best practice, connect endpoints to TCs in the SmartMC network. Enable portal authentication on the TC. After an endpoint comes online through portal authentication, the corresponding TC can identify the endpoint by using the HTTP user agent fingerprint.

To configure portal authentication for automatic endpoint identification through HTTP user agent fingerprint:

1.     Enter system view of a TC.

system-view

2.     Create an ISP domain and enter its view.

domain isp-name

By default, an ISP domain named system exists.

3.     (Optional.) Specify the default authentication method for the current ISP domain as local.

authentication default local

By default, the default authentication method for an ISP domain is local.

4.     Enable local portal authentication.

authentication portal local

By default, the default authentication method in the current ISP domain is used.

5.     Configure local portal authorization.

authorization portal local

By default, the default authorization method in the ISP domain is used.

6.     Configure local portal accounting.

accounting portal local

By default, the default accounting method in the ISP domain is used.

7.     Return to system view.

quit

8.     Create a portal Web server and enter its view.

portal web-server server-name

9.     Specify a URL for the portal Web server.

url url-string

By default, no URL is specified for the portal Web server.

10.     Return to system view.

quit

11.     Enter interface view.

interface interface-type interface-number

12.     Configure direct portal authentication.

portal enable method direct

By default, portal authentication is disabled on an interface.

13.     Apply a portal Web server.

portal apply web-server server-name

By default, no portal Web server is applied.

14.     Return to system view.

quit

15.     Return to user view.

quit

16.     Obtain an authentication page file from the TFTP server.

tftp tftp-server get source-filename

17.     Enter system view.

system-view

18.     Enable the HTTP-based local portal Web service.

portal local-web-server http

19.     Specify the default authentication page file for a local portal Web service. For the feature to take effect, make sure the authentication page file already exists in the root directory of the storage medium on the device.

default-logon-page file-name

20.     (Optional.) Specify the listening port for the HTTP-based local portal Web service.

tcp-port port-number

By default, the number of the listening port is 80.

Configuring fingerprints on a TM

A fingerprint entry records a set of fingerprint information, including the fingerprint type, fingerprint value, endpoint type, endpoint category, endpoint vendor, and endpoint OS. The TM is predefined with some common fingerprints and you can add fingerprints based on network requirements.

To add a fingerprint, access the Intelligent Management > Fingerprint management page and then click Add.

Figure 53 Accessing fingerprint management

 

Figure 54 Adding a fingerprint

 

For an online endpoint, if the fingerprint information of the endpoint in the fingerprint library is modified, the updated fingerprint information will take effect after the SmartMC management or member device recognizes the endpoint upon its next access.

Viewing online clients

To view access client information, access the Visibility > Access endpoints page and then click Endpoint identification enabling. After endpoint identification is enabled, when an endpoint accesses the SmartMC network, the TC compares the endpoint information with the configured endpoint fingerprints. If a match is found, the TC records the MAC address, category, and vendor of the endpoint, and sends the endpoint information to the TM for unified display.

Figure 55 Viewing online clients

 

Health degree

The SmartMC network management platform offers a health check feature, where administrators can enable the health analysis function for all member devices of the SmartMC network or for specified ones. After the health analysis function is enabled, it automatically calculates the health status of devices every 30 minutes and presents the calculated device health status in a graphical form, allowing administrators to quickly and intuitively understand the condition of devices.

Based on industry consensus and operational experience, devices use certain key parameters to reflect their operating status, which are called Key Performance Indicators (KPIs). Devices collect these KPI data periodically and convert these KPI data into a health score according to certain rules to reflect whether the device is operating normally. A good health score indicates that the device is in good condition. A poor health score suggests that the device might be experiencing abnormalities. Users can further analyze and pinpoint faults based on the detailed health data.

Enabling or disabling health analysis

After enabling the health analysis function for a device, you can view the device health status through the health summary, environmental health details, capacity health details, performance health details, and status health details pages.

Prerequisites

The health analysis function of SmartMC requires data provided by the Key Performance Indicator (KPI) module. For the normal operation of SmartMC's health analysis function, complete the KPI data collection configuration first. By default, all service modules on the device that support KPI data collection have the KPI data collection function enabled.

For more information about KPI data collection configuration, see KPI data collection configuration in Intelligent O&M Configuration Guide.

Procedure

By default, the health analysis function of the device is disabled. Select Visibility from the navigation pane, and click the Health Analysis Configuration tab. On the health analysis configuration page, you can enable the device's health analysis function in the following two ways (with the most recent configuration taking effect in case of multiple configurations):

1.     Enable network-wide health analysis.

Click Refresh to refresh the list of devices, and select Enable to enable the network-wide health analysis function for all devices in the SmartMC network.

2.     Enable health analysis for specific devices.

Click Refresh to refresh the list of devices. Select the target devices, click Enable Health Analysis.

Figure 56 Enabling health analysis

 

3.     Disable network-wide health analysis.

Click Refresh to refresh the list of devices, and select Disable to disable the network-wide health analysis function for all devices in the SmartMC network.

4.     Disable health analysis for specific devices.

Click Refresh to refresh the list of devices. Select the target devices, click Disable Health Analysis.

Viewing health status

From the left navigation pane, select Visibility and click the Health Degree tab. You can select an item from the Device ID field to display the health status of the entire network or a specific device.

Network-wide health overview

If you select Network-Wide, the page displays the network-wide health overview. This page shows the overall health status of the SmartMC network, including health level, health score, and health distribution.

Figure 57 Network-wide health overview

 

Click a time period in the top right corner of the line chart to view the health scores recorded by the device for a specified time period within the last seven days.

Figure 58 Specifying a custom time period

 

Single-device health overview

If you select a specific device, the page displays the single device health overview. At the same time, the Environmental Health, Capacity Health, Performance Health, and Status Health tabs will also display the details for that particular device.

On the Health Overview tab:

·     The Health Overview section displays the health score and corresponding level of the device in the form of a gauge chart. The health score of the device is equal to the proportion of normal indicator items in the total number of indicators monitored for single device health. The formula is:

Number of normal indicator items for the single device / Total number of indicator items for the single device * 100%.

·     The Health Dimension section displays the health scores of the device from the environment, network, performance, and capacity aspects, represented as percentages, in the form of a radar chart. The percentage value for each dimension is the proportion of the number of normal indicator items within that dimension for the device to the total number of indicator items within the same dimension. The formula is:

Number of normal indicator items for the dimension / Total number of indicator items for the dimension * 100%.

·     The Health Trend section displays the change over time of the overall health score for the device in the form of a line graph, as well as the average, maximum, and minimum values of the overall health score for the device during that time period.

·     The Device Environment section provides a detailed display for the environmental health dimension. The health analysis function calculates the device environmental health rating based on the proportion of the number of normal indicator items to the total number of indicator items within that environmental dimension for the device. The formula is:

Number of normal environmental indicator items / Total number of environmental indicator items * 100%.

·     The Device Environment Trend section displays the change over time of the device environmental health score in the form of a line graph.

Figure 59 Viewing the device health overview

 

If the device has a potential fault, you can click Potential Failures to view the details of the fault. Then, pinpoint the fault based on the question type and score presented on the failure details page.

Figure 60 Viewing potential failures

 

Clicking View Details allows you to view the analysis dimensions, analysis indicators, and health score. If the score is below 60 points, it indicates that the device might have a fault that requires further diagnosis.

Figure 61 Viewing health details

 

Viewing health details

On the health details page, you can view the health data of key indicators within the dimensions of environment, capacity, performance, and status. By selecting a device ID in the top right corner of the page, the display area will show the health details of that device. At the same time, the selected device ID will be passed to the Health Overview and other health details pages, which will also correspondingly display the details of that device.

Environment health

On the Environmental Health tab, you can view the health data for key indicators within the environmental health dimension, such as devices, interfaces, modules, fans, and power supplies.

Figure 62 Viewing the environment health status

 

Capacity health

On the Capacity Health tab, you can view the health data of key indicators within the capacity health dimension, such as CPU usage and memory usage.

Figure 63 Viewing the capacity health status

 

Performance health

On the Performance Health tab, you can view the health data for key indicators within the performance health dimension, including Layer 2 environment, port/queue congestion, port errors, softcar packet loss, and port bandwidth usage.

Figure 64 Viewing the performance health status

 

Status health

On the Status Health tab, you can view the health data of key indicators within the environmental health dimension, such as port status, routing protocol status, DHCP functionality status, attack detection service status, and illegal user detection status.

Figure 65 Viewing the status health

 

Exporting the health report

On any health analysis page, select a device ID from the Device ID field, then click Export Health Report in the top right corner of the page. The system will automatically export the health report of the selected device into an Excel spreadsheet. You can view the specific indicators for the device and the score for each indicator through this spreadsheet. If the score for a certain indicator is below 60 points, it indicates that an anomaly might be present with that parameter, and further diagnosis is required.

Figure 66 Health report

 

Port authentication

About port authentication

You can control access to network resources by configuring port authentication for devices connecting to the network. By default, port authentication on the SmartMC network is disabled, meaning that other devices can access the SmartMC network without authentication when connecting to TM or TC devices.

Port authentication supports the following authentication methods: Web authentication, 802.1X authentication, and MAC address authentication.

·     Web authenticationAccepts a username and password entered by the user on a Web page to authenticate the user identity, with the aim of controlling access to user visits. Web authentication is typically deployed at the access layer and key data entry points that require protection for implementing access control. In a network environment that utilizes Web authentication, users can proactively visit a known portal Web server site for Web authentication or be redirected to a portal Web server site when attempting to access any non-portal Web server site, thereby initiating the Web authentication process.

·     802.1X authenticationBased on the 802.1X protocol, a port-based network access control protocol, which authenticates users and devices connected to ports on LAN access equipment to control the access of user devices to network resources.

·     MAC address authenticationAn authentication method that controls network access permissions for users based on ports and MAC addresses without the need for client software installation. When a device detects a user's MAC address for the first time on a port with MAC address authentication enabled, it initiates the authentication process for that user. During the authentication process, the user does not need to manually enter a username or password. A successfully authenticated user is allowed to access network resources through the port. If a user fails MAC address authentication, the user's MAC address is set as a silent MAC. During the silent period, if packets from this MAC address arrive, the device directly discards them to prevent repeated authentication attempts by illegal MACs in a short time span.

With port authentication enabled, SmartMC automatically distributes the relevant authentication configurations to the device where the port is located, and configures the device to act as both a RADIUS server and RADIUS client. For more information about port authentication configurations automatically distributed by SmartMC, see "Appendix  Configurations automatically deployed by port authentication."

Restrictions and guidelines

When you configure port authentication, follow these restrictions and guidelines:

·     To ensure the normal operation of port authentication, after enabling port authentication on a Layer 2 Ethernet interface of the access device, do not enable the port security feature or configure port security mode on this interface.

·     The following ports do not support port authentication configuration: ports that connect member devices to each other, ports that connect management devices to member devices, OLT ports, and IRF physical ports.

·     An interface does not support the configuration of multiple authentication methods. To change the authentication method for a port, first remove the configured authentication method and then configure the new method.

·     Configuring port authentication on a large number of ports at once takes a significant amount of time. As a best practice, configure port authentication for them in batches.

·     Before using the SmartMC port authentication feature, make sure IP address 1.1.1.1 is not in use to avoid IP address conflicts, which could lead to authentication failure.

·     Before using the port authentication feature, make sure the RADIUS schemes named rs1, rs2, and rs3 are not in use to avoid conflicts with RADIUS schemes, which could lead to authentication failure.

Prerequisites

Creating and activating a user

1.     Access the Intelligent Services > User management page, and create and activate a user. If MAC address authentication is used, create a user with the user's MAC address as the username and password.

Figure 67 User management page

 

For more information about authorization VLAN, authorization ACL, expiration time, and remarks, see Security Configuration Guide.

Figure 68 Creating a user

 

Figure 69 Creating a user for MAC address authentication

 

2.     Activate the user. On the User management page, select Local, click Activate, and then click Certain to activate all local users.

Figure 70 Viewing local users

 

Figure 71 Confirming user activation

 

Figure 72 Viewing activated local users

 

Configuring port authentication

1.     Access the Intelligent Visibility > Topology page, select the target device, and view the device ports.

Figure 73 Viewing device ports

 

2.     Select one or more ports. The selected ports are blue marked. Click Port authentication. In the dialog box that opens, select the authentication method. If you select no authentication, the system cancels authentication settings on the ports.

Figure 74 Selecting an authentication method

 

3.     Click Certain.

Figure 75 Port authentication configuration completed

 

4.     After the configuration, the ports are yellow marked. If you hover over a port, the system prompts the port number and authentication method.

Figure 76 Viewing the topology

 

Verifying the configuration

For the configuration steps of the username and password used in this step, see "Creating and activating a user." For MAC address authentication, the username and password are both the MAC address of the accessing device.

Web authentication

After the configuration is complete, when a client with a browser running HTTP/HTTPS protocol accesses from the specified port, the device initiates Web authentication and redirects the page to http://1.1.1.1/portal/. The user can access the SmartMC network after entering the correct account and password.

MAC address authentication

After the configuration is complete, when a device with the specified MAC address accesses through the port, the device initiates the authentication process for that user. During authentication, the user is not required to manually enter a username or password. After being authenticated successfully, the user is allowed to access network resources through the port.

802.1X authentication

After the configuration is complete, when an 802.1X user enters the correct username and password, the user can access the SmartMC network. Client software that supports 802.1X authentication must be installed on the user's device.

Appendix  Configurations automatically deployed by port authentication

After port authentication is enabled, SmartMC will automatically distribute the relevant configurations to the devices and ports where authentication has been activated. Taking the activation of the GE1/0/1 interface as an example, the configurations distributed for different authentication methods are as follows.

Configuration deployed for Web authentication

1.     Specify an IP address for interface LoopBack 3.

<Device> system-view

[Device] interface loopback 3

[Device-LoopBack3] ip address 1.1.1.1 255.255.255.255

[Device-LoopBack3] quit

2.     Configure the RADIUS server.

# Specify the IP address of the RADIUS client as 192.168.77.2 and set a ciphertext password.

[Device] radius-server client ip 192.168.77.2 key cipher $c$3$mHjMHiLgn93EwyFFdn3B0VsjPBmyzUw=

# Activate the current RADIUS client.

[Device] radius-server activate

3.     Configure a RADIUS scheme.

# Create a RADIUS scheme named rs1 and enter its view.

[Device] radius scheme rs1

# Specify the primary authentication server and the communication password.

[Device-radius-rs1] primary authentication 192.168.77.2 key cipher $c$3$1EKfg0B/Lxfr8cNMhIsLn2AkPBT9EhA=

# Remove the ISP domain names from the usernames sent to the RADIUS server.

[Device-radius-rs1] user-name-format without-domain

[Device-radius-rs1] quit

4.     Configure the authentication domain.

# Create an ISP domain named dm1 and enter its view.

[Device] domain dm1

# Configure the ISP domain to use RADIUS scheme rs1.

[Device-isp-dm1] authentication lan-access radius-scheme rs1

[Device-isp-dm1] authorization lan-access radius-scheme rs1

[Device-isp-dm1] quit

5.     Configure the local portal Web service.

# Enable the local portal Web service and enter the HTTP-based local portal Web service view.

[Device] portal local-web-server http

# Specify the default authentication page file provided by the local portal Web service as defaultfile.zip. For the portal Web service to take effect, make sure the authentication page file must already exist in the root directory of the device storage medium.

 [Device-portal-local-websvr-http] default-logon-page defaultfile.zip

# Configure the local portal Web service to listen to TCP port 80 for HTTP services.

[Device–portal-local-websvr-http] tcp-port 80

[Device-portal-local-websvr-http] quit

6.     Configure local Web authentication.

# Create a local Web server named user and enter its view.

[Device] web-auth server user

# Specify the redirect URL for the Web authentication local Web server as http://1.1.1.1/portal/.

[Device-web-auth-server-user] url http://1.1.1.1/portal/

# Specify the IP address of the local Web server as 1.1.1.1 and the port number as 80.

[Device-web-auth-server-user] ip 1.1.1.1 port 80

[Device-web-auth-server-user] quit

# Specify the authentication domain used by Web authentication users as domain dm1.

[Device] interface gigabitethernet 1/0/1

[Device-GigabitEthernet1/0/1] web-auth domain dm1

# Enable Web authentication and configure Web authentication to use the local Web server named user.

[Device-GigabitEthernet1/0/1] web-auth enable apply server user

[Device-GigabitEthernet1/0/1] quit

Configuration deployed for MAC address authentication

1.     Configure the RADIUS server.

# Specify the IP address of the RADIUS client as 192.168.77.2 and set a ciphertext password.

 [Device] radius-server client ip 192.168.77.2 key cipher $c$3$mHjMHiLgn93EwyFFdn3B0VsjPBmyzUw=

# Activate the current RADIUS client.

[Device] radius-server activate

2.     Configure the system to use the RADIUS server for MAC address authentication.

# Configure the RADIUS scheme.

[Device] radius scheme rs2

[Device-radius-rs2] primary authentication 192.168.77.2 key cipher $c$3$hrZlHhTWMvw/3g/PodeD+aPLIYSWH5Q=

[Device-radius-rs2] user-name-format without-domain

[Device-radius-rs2] quit

# Specify the MAC address authentication method as PAP.

[Device] mac-authentication authentication-method pap

# Configure AAA for the ISP domain.

[Device] domain dm2

[Device-isp-dm2] authentication lan-access radius-scheme rs2

[Device-isp-dm2] authorization lan-access radius-scheme rs2

[Device-isp-dm2] quit

# Enable MAC address authentication on interface GigabitEthernet 1/0/1.

[Device] interface gigabitethernet 1/0/1

[Device-GigabitEthernet1/0/1] mac-authentication

[Device-GigabitEthernet1/0/1] mac-authentication domain dm2

[Device-GigabitEthernet1/0/1] quit

# Specify the ISP domain used by MAC authentication users.

[Device] mac-authentication domain dm2

# Enable MAC address authentication globally.

[Device] mac-authentication

Configuration deployed for 802.1X authentication

1.     Configure the RADIUS server.

# Specify the IP address of the RADIUS client as 192.168.77.2 and set a ciphertext password.

[Device] radius-server client ip 192.168.77.2 key cipher $c$3$mHjMHiLgn93EwyFFdn3B0VsjPBmyzUw=

# Activate the current RADIUS client.

[Device] radius-server activate

2.     Configure the RADIUS scheme.

# Create a RADIUS scheme named rs3 and enter its view.

[Device] radius scheme rs3

# Specify the IP address of the primary authentication server and the communication password.

[Device-radius-rs3] primary authentication 192.168.77.2 key cipher $c$3$07XPuTCBvom+Tvaj8vuSEU9RnDzID8g=

# Remove the ISP domain names from the usernames sent to the RADIUS server.

[Device-radius-rs3] user-name-format without-domain

[Device-radius-rs3] quit

3.     Configure an ISP domain.

# Create an ISP domain named dm3 and enter its view.

[Device] domain dm3

# Configure 802.1X users to use RADIUS scheme radius1 for authentication, authorization, and accounting, and use the local method as the backup.

[Device-isp-dm3] authentication lan-access radius-scheme radius1 rs3

[Device-isp-dm3] authorization lan-access radius-scheme radius1 rs3

[Device-isp-dm3] quit

4.     Configure 802.1X authentication.

# Enable 802.1X authentication on interface GigabitEthernet 1/0/1.

[Device] interface gigabitethernet 1/0/1

[Device-GigabitEthernet1/0/1] dot1x

# Set the port 802.1X access control mode to MAC-based. This configuration is optional, as the port access control is MAC address-based by default.

[Device-GigabitEthernet1/0/1] dot1x port-method macbased

# Specify a mandatory domain for 802.1X users that come online from the interface.

[Device-GigabitEthernet1/0/1] dot1x mandatory-domain dm3

# Disable the 802.1X unicast triggering feature.

[Device-GigabitEthernet1/0/1] undo dot1x unicast-trigger

[Device-GigabitEthernet1/0/1] quit

# Enable 802.1X globally.

[Device] dot1x

SmartMC feature specifications

Item

Value

Maximum number of supported members

Varies by device model

Maximum number of supported APs

Same as the number supported by the unified wired and wireless AC on the commander

Maximum number of supported camera monitoring rules

512

Maximum number of supported SIP sessions on the commander or a member

1000

Maximum number of devices supported by the management device for health monitoring

256

 

SmartMC restrictions and guidelines

As a best practice, use the automatic method to deploy the SmartMC network.

To use PoE, make sure the deployed devices are PoE-capable.

A SmartMC network is established in VLAN 1. For the network to work correctly, do not configure security settings in VLAN 1.

Recommended devices for SmartMC

The table below lists only some models. More devices will support this function in the future. For detailed information on device compatibility with SmartMC, see the configuration guides and command references for the corresponding device.

 

Device model

TM

TC

Recommended version

Remarks

S6520-SI

Supported

Supported

F6509L01 or higher

·     Dynamic camera monitoring (ONVIF) is supported only in F6615 and higher versions.

·     Unified wired and wireless ACs and basic WLAN settings are supported only in R6522 and higher versions.

·     Health degree is supported only in R6652P02 and later versions.

S6520X-SI

Supported

Supported

S6520X-EI

Supported

Supported

S6520X-HI

Supported

Supported

S5560X-30F-HI

S5560X-54F-HI

Supported

Supported

R6530P01 or higher

S5560X-34C-HI

S5560X-58C-HI

Supported

Supported

R6615P03 or higher

MS4600

Supported

Supported

F6509L01 or higher

·     Dynamic camera monitoring (ONVIF) and automatic endpoint identification are supported only in R6615P03 and higher versions.

·     Unified wired and wireless ACs and basic WLAN settings are supported only in R6522 and higher versions.

·     The series devices do not support health degree.

S5000-EI

Supported

Supported

F6509L01 or higher

S5560X-EI

Supported

Supported

F6509L01 or higher

·     Dynamic camera monitoring (ONVIF) and automatic endpoint identification are supported only in F6615 and higher versions.

·     Unified wired and wireless ACs and basic WLAN settings are supported only in F6512P01 and higher versions.

·     Health degree is supported only in R6652P02 and later versions.

MS4520V2-30F

Supported

Supported

F6509L01 or higher

·     Dynamic camera monitoring (ONVIF) and automatic endpoint identification are supported only in R6615P03 and higher versions.

·     Unified wired and wireless ACs and basic WLAN settings are supported only in F6512P01 and higher versions.

·     The series devices do not support health degree.

MS4520V2-30C

MS4520V2-54C

Supported

Supported

R6510P01 or higher

S5500V2-EI

Supported

Supported

F6509L01 or higher

S5560S-EI

Supported

Supported

R6318P01 or higher

·     Devices of these series do not support SIP-based SQA.

·     Devices of these series do not support unified wired and wireless ACs and basic WLAN settings.

·     Static camera management and automatic endpoint identification are supported only in R6328 and higher versions.

·     Dynamic camera monitoring (ONVIF) is supported only on S5130S-EI series switches of R6338 and higher versions.

·     The series devices do not support health degree.

·     Devices of these series can act as TMs. As a best practice, configure device roles as recommended.

S5560S-SI

Supported

Supported

S5500V3-SI

Supported

Supported

MS4520V2

Supported

Supported

S5130S-HI

Not supported

Supported

S5130S-EI

Not supported

Supported

S5130S-SI

Not supported

Supported

MS4320V2

Not supported

Supported

MS4320

Not supported

Supported

MS4300V2

Not supported

Supported

MS4200

Not supported

Supported

S5130S-LI

Not supported

Supported

S5120V2-SI

Not supported

Supported

S5120V2-LI

Not supported

Supported

E128C[E152C]

Not supported

Supported

E500C

Not supported

Supported

E500D

Not supported

Supported

S5110V2

Not supported

Supported

S5110V2-SI

Not supported

Supported

S5000V3-EI

Not supported

Supported

S5000E-X

Not supported

Supported

S3100V3-EI

Not supported

Supported

S3100V3-SI

Not supported

Supported

S1850-X

Not supported

Supported

S5000V5-EI

Not supported

Supported

Release 6319P01 or higher

S5120V3-SI

Not supported

Supported

R6329 or higher

S5120V3-LI

Not supported

Supported

R6329 or higher

S5000X-EI

Not supported

Supported

R6329 or higher

S1850V2-X

Not supported

Supported

R6329 or higher

MS4320V3

Not supported

Supported

R6329 or higher

S1850V2-EI

Not supported

Supported

R6330 or higher

E500C-F

Not supported

Supported

R6338 or higher

US500S

Supported

Supported

R3507P09 or higher

US300S

Not supported

Supported

R8305 or higher

S5130V2-LI

Supported

Supported

R3507P12 or higher

S5130V2-SI

Supported

Supported

R3507P12 or higher

S12500-S series

Supported

Supported

See the actual product

S12500-XS series

Supported

Supported

S12500G-AF series

Supported

Supported

S10500 series

Supported

Supported

S10500X series

Supported

Supported

S7600 series

Supported

Supported

S7600E-X series

Supported

Supported

S7500E series

Supported

Supported

S7500E-X series

Supported

Supported

S7500X-X series

Supported

Supported

S7500E-XS series

Supported

Supported

S10500X-G series

Supported

Supported

S7500X-G series

Supported

Supported

S7000X series

Supported

Supported

S5590XP-HI-G series

Supported

Supported

S6520X-EI-G series

Supported

Supported

S6520XP-EI-G series

Supported

Supported

S5560-EI-G series

Supported

Supported

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网