H3C WX Series Access Controllers Web-Based Configuration Manual-6PW103

HomeSupportWLANConfigurationUser ManualH3C WX Series Access Controllers Web-Based Configuration Manual-6PW103
04-Device
Title Size Download
04-Device 337.11 KB

Table of Contents

1 License· 1-1

Overview· 1-1

Configuring License· 1-2

2 Device Basic Information Configuration· 2-1

Overview· 2-1

Configuring Device Basic Information· 2-1

Configuring System Name· 2-1

Configuring Idle Timeout Period· 2-1

3 System Time· 3-1

Overview· 3-1

System Time· 3-1

4 Syslog· 4-1

Overview· 4-1

Configuring System Logs· 4-1

Configuration Task List 4-1

Setting Syslog Related Parameters· 4-1

Displaying Syslog· 4-2

Setting Loghost 4-3

5 Configuration Management 5-1

Back Up Configuration· 5-1

Restore Configuration· 5-1

Save Configuration· 5-2

Initialize· 5-2

6 Software Upgrade· 6-1

Overview· 6-1

Software Upgrade· 6-1

7 File Management 7-1

Overview· 7-1

File Management Configuration· 7-1

Displaying File List 7-1

Downloading a File· 7-1

Uploading a File· 7-2

Removing a File· 7-2

8 Reboot 8-1

9 Interface Management 9-1

Overview· 9-1

Configuring Interface Management 9-2

Displaying Interface Information and Statistics· 9-2

Creating an Interface· 9-2

Editing an Interface· 9-4

Shutting Down/Bringing Up an Interface· 9-5

10 Port Mirroring Configuration· 10-1

Introduction to Port Mirroring· 10-1

Implementing Port Mirroring· 10-1

Other Supported Features· 10-2

Configuring Port Mirroring· 10-2

Configuration Task List 10-2

Creating a Mirroring Group· 10-2

Configuring Ports for a Mirroring Group· 10-3

Configuration Examples· 10-4

Configuration Guidelines· 10-5

11 User Management 11-1

Overview· 11-1

Users· 11-1

Creating a User 11-1

Setting the Super Password· 11-2

Switching the User Access Level to the Management Level 11-3

12 Loopback· 12-1

Overview· 12-1

Loopback Operation· 12-1

Configuration Guidelines· 12-1

 


l          The sample Web page information in this manual was created on the WX5002. The Web page information on your device may vary.

l          The models listed in this manual are not applicable to all regions. Please consult the local agents for the models applicable to your region.

 

The following table shows the support of the H3C WX series access controller products for features:

Feature

WX5000 series

WX6000 series

WX3000 series

WX5002

LS8M1WCMA0

WX5004

WX6103

LSQM1WCMB0

LSBM1WCM2A0

WX3024

WX3010

WX3008

Loopback test

Only GE interfaces support this feature.

Only GE interfaces support internal loopback test.

Only GE interfaces support this feature.

Only XGE interfaces support internal loopback test.

Only XGE interfaces support internal loopback test.

Only XGE interfaces support internal loopback test.

Only GE interfaces support internal loopback test.

Only GE interfaces support internal loopback test.

Only GE interfaces support internal loopback test.

Port Mirroring

Supported

Not supported

Supported

Not supported

Not supported

Not supported

Not supported

Not supported

Not supported

 

Overview

Licenses are used on the H3C WX series access controller products to control how many APs can be connected concurrently to a WX access controller product. The supported number of concurrent APs depends on the device model.

 

l          The WX5002-64 supports 32 concurrent APs by default, and can be extended to support 64.

l          The WX5002-128 does not support the license function.

l          The WX5004 supports 64 concurrent APs by default, and can be extended to support 256.

l          The WX6000 series support 128 concurrent APs by default, and can be extended to support 640.

l          The WX3024 unified switch supports 24 concurrent APs by default, and can be extended to support 48.

l          The WX3010 and WX3008 unified switches support 12 concurrent APs by default, and can be extended to support 24.

 

Configuring License

 

After adding the license successfully, you need to reboot the device to make the license effective.

 

Select Device > License from the navigation tree to enter the license configuration page, as shown in Figure 1-1.

Figure 1-1 License configuration

 

Table 1-1 describes license configuration items.

Table 1-1 License configuration items

Item

Description

License Key

Type the license key of the license.

Activation Key

Type the activation key of the license.

 

Check that Activation Key you input is correct and click Add. The license is displayed in the license table.

 


Overview

The device basic information feature provides you the following functions:

l          Set the system name of the device

l          Set the idle timeout period for a logged-in user. That is, the system will log an idle user off the Web for security purpose after the configured period.

Configuring Device Basic Information

Configuring System Name

Select Device > Basic from the navigation tree to enter the system name page, as shown in Figure 2-1.

Figure 2-1 System name

 

Table 2-1 describes the system name configuration item.

Table 2-1 System name configuration item

Item

Description

Sysname

Set the system name, which cannot include question marks (?), less than signs (<), greater than signs (>), backward slashes (\), double quotation marks (“), percent signs (%), single quotation marks (‘), ampersand signs (&) or pound signs (#).

 

Configuring Idle Timeout Period

Select Device > Basic from the navigation tree to enter the idle timeout page, as shown in Figure 2-2.

Figure 2-2 Configuring idle timeout period

 

Table 2-2 describes the idle timeout period configuration item.

Table 2-2 Idle timeout period configuration item

Item

Description

Idle timeout

Set the idle timeout period for a logged-in user

 

 


Overview

You need to configure a correct system time so that the device can work with other devices properly.

The device supports setting system time through manual configuration and automatic synchronization of NTP server time.

An administrator can by no means keep time synchronized among all the devices within a network by changing the system clock on each device, because this is a huge amount of workload and cannot guarantee the clock precision. NTP, however, allows quick clock synchronization within the entire network and ensures a high clock precision.

Defined in RFC 1305, the Network Time Protocol (NTP) synchronizes timekeeping among distributed time servers and clients. NTP runs over the User Datagram Protocol (UDP), using UDP port 123.

The purpose of using NTP is to keep consistent timekeeping among all clock-dependent devices within the network so that the devices can provide diverse applications based on the consistent time.

System Time

Select Device > System Time from the navigation tree to enter the system time configuration page, as shown in Figure 3-1. On the upper side of the interface, the current system time is displayed.

Figure 3-1 System time configuration page

 

Table 3-1 describes the configuration items.

Table 3-1 System time configuration items

Item

Description

Automatic Synchronization

NTP Server 1

Enable clock automatic synchronization with an NTP server. You can specify two NTP servers by inputting their IP addresses. NTP Server 1 is the primary and NTP Server 2 is the secondary.

l      With automatic synchronization configured, the device periodically synchronizes its time with the NTP server. If the synchronization fails, the system uses the manually configured time; after the synchronization recovers, the system uses the synchronized time.

l      The IP address of an NTP server is a host address, and cannot be a broadcast or a multicast address, or the IP address of the local clock.

NTP Server 2

Manual Setup

Date

Set the system time manually. The date and time is in the form of Year/Month/Day and Hour:Minute.

Time

 

 


Overview

System logs contain a large amount of network and device information, including running status and configuration changes. System logs are an important way for administrators to know network and device status. With system log information, administrators can take corresponding actions against network problems and security problems.

System logs can be stored in the log buffer, or sent to the loghost.

Configuring System Logs

Configuration Task List

Perform the tasks in Table 4-1 to configure system logs.

Table 4-1 System logs configuration task list

Task

Description

Setting Syslog Related Parameters

Optional

Set the number of logs that can be stored in the log buffer.

Set the refresh period of the log information displayed on the Web interface.

Displaying Syslog

Display detailed information of system logs.

Setting Loghost

Optional

Set the loghost that can receive system logs.

 

Setting Syslog Related Parameters

Select Device > Syslog from the navigation tree, and click the Logset tab to enter the syslog configuration page, as shown in Figure 4-1.

Figure 4-1 Set system logs related parameters

 

Table 4-2 describes the syslog configuration items.

Table 4-2 Syslog configuration items

Item

Description

Log Buffer Size

Sets the number of logs that can be stored in the log buffer.

Refresh Period

Sets the refresh period on the log information displayed on the Web interface.

You can select manual refresh or automatic refresh:

l      Manual: You need to click Refresh to refresh the Web interface when displaying log information.

l      Automatic: You can select to refresh the Web interface every 1 minute, 5 minutes, or 10 minutes.

 

Return to System logs configuration task list.

Displaying Syslog

Select Device > Syslog from the navigation tree to enter the syslog display page, as shown in Figure 4-2.

Figure 4-2 Display syslog

 

Table 4-3 describes the syslog display items.

Table 4-3 Syslog display items

Item

Description

Time/Date

Displays the time/date when system logs are generated.

Source

Displays the module that generates system logs.

Level

Displays the severity level of system logs. For the detailed description of the severity levels, refer to Table 4-4.

Digest

Displays the brief description of system logs

Description

Displays the contents of system logs.

 

You can perform the following operations in the syslog display page:

l          Click Clear to clear the log buffer.

l          Click Sequential Display to change the order in which system logs are displayed, and then the Sequential Display button will be changed to Reverse Display. After you change the order in which system logs are displayed, the system logs are displayed in this order, unless you change it again.

Table 4-4 System logs severity level

Severity level

Description

Value

Emergency

The system is unavailable.

0

Alert

Information that demands prompt reaction

1

Critical

Critical information

2

Error

Error information

3

Warning

Warnings

4

Notification

Normal information that needs to be noticed

5

Informational

Informational information to be recorded

6

Debugging

Information generated during debugging

7

Note: A smaller value represents a higher severity level.

 

Return to System logs configuration task list.

Setting Loghost

Select Device > Syslog from the navigation tree, and click the Loghost tab to enter the loghost configuration page, as shown in Figure 4-3.

Figure 4-3 Set loghost

 

Table 4-5 describes the loghost configuration item.

Table 4-5 Loghost configuration item

Item

Description

Loghost IP

IP address of the loghost.

l      You can specify up to four loghosts.

l      You must input a valid IP address.

l      If you input a loopback address, for example 127.0.0.1, the system will not give any prompt, but your configuration will not take effect.

 

Return to System logs configuration task list.

 


Back Up Configuration

Configuration backup provides the following functions:

l          Open and view the configuration file (.cfg file or .xml file) for the next startup

l          Back up the configuration file (.cfg file or .xml file) for the next startup to the host of the current user

Select Device > Configuration from the navigation tree at the left side of the interface to enter the backup configuration page, as shown in Figure 5-1.

Figure 5-1 Backup configuration page

 

l          After you click the upper Backup button in this figure, a file download dialog box appears. You can select to view the .cfg file or to save the file locally.

l          After you click the lower Backup button in this figure, a file download dialog box appears. You can select to view the .xml file or to save the file locally.

Restore Configuration

Configuration restore provides the following functions:

l          Upload the .cfg file on the host of the current user to the device for the next startup

l          Upload the .xml file on the host of the current user to the device for the next startup, and delete the previous .xml configuration file that was used for the next startup

Select Device > Configuration from the navigation tree at the left side of the interface, and then click the Restore tab to enter the configuration restore page, as shown in Figure 5-2.

Figure 5-2 Configuration restore page

 

l          After you click the upper Browse button in this figure, the file upload dialog box appears. You can select the .cfg file to be uploaded, and then click OK.

l          After you click the lower Browse button in this figure, the file upload dialog box appears. You can select the .xml file to be uploaded, and then click OK.

Save Configuration

The save configuration module provides the function to save the current configuration to the configuration file (.cfg file or .xml file) for the next startup.

Select Device or Configuration from the navigation tree at the left side of the interface, and then click the Save tab to enter the save configuration confirmation page, as shown in Figure 5-3.

Figure 5-3 Save configuration confirmation

 

Click the Save Current Settings button to save the current configuration to the configuration file.

 

l          Saving the configuration takes a period of time.

l          The system does not support the operation of saving configuration of two or more consecutive users. If such a case occurs, the system prompts the latter users to try later.

 

Initialize

This operation will restore the system to factory defaults, delete the current configuration file, and reboot the device.

Select Device > Configuration from the navigation tree at the left side of the interface, and then click the Initialize tab to enter the initialize confirmation page as shown in Figure 5-4.

Figure 5-4 Initialize confirmation dialog box

 

Click the Restore Factory-Default Settings button to restore the system to factory defaults.

 

An access controller product has a factory default configuration when it is shipped. With this configuration, you can input http://192.168.0.100 in the address bar of the browser on a Web network management terminal (PC), supposing that a route between the Web network management terminal and the access controller product is available, and the browser will display the login page. Input the default username and password admin, select the language, and then you can log in to the Web interface.

 

 


Overview

Software upgrade allows you to obtain a target application file from the current host and set the file as the main boot file or backup boot file to be used at the next reboot.

A boot file, also known as the system software or device software, is an application file used to boot the device. A main boot file is used to boot a device and a backup boot file is used to boot a device only when the main boot file is unavailable.

Software Upgrade

Select Device > Software Upgrade from the navigation tree to enter the software upgrade configuration page, as shown in Figure 6-1.

Figure 6-1 Software upgrade configuration page

 

Table 6-1 shows the detailed configuration for software upgrade.

Table 6-1 Software upgrade configuration items

Item

Description

File

Specifies the filename of the local application file, which must be with an extension .bin or .app.

Filename

Specifies a filename for the file to be saved on the device. The filename must have an extension, which must be the same as that of the source application file.

File Type

Specifies the type of the boot file for the next boot:

l      Main

l      Backup

If the file with same name exists, overwrite it without remind.

Specifies whether to overwrite the file with the same name.

If you do not select the option, when a file with the same name exists, the system will pop up a dialog box asking whether to overwrite the existing file.

Reboot after the upgrading finished.

Specifies whether to reboot the device to make the upgraded software take effect after the application file is uploaded.

 

Software upgrade takes some time. Do not perform any operation on the web interface during the upgrading procedure; otherwise, the upgrade operation will be interrupted.

 

 


 

There are many types of storage media such as flash, compact flash (CF), and universal serial bus (USB). The WX6000 series support CF card and USB; the WX5002 and the WX3000 series only support flash; the WX5004 supports CF card only.

 

Overview

The device saves useful files (such as host software, configuration file) into the storage device, and the system provides the file management function for the users to manage those files conveniently and effectively. File management function provides the following operations:

l          Displaying File List

l          Downloading a File

l          Uploading a File

l          Removing a File

File Management Configuration

Displaying File List

Select Device > File Manage from the navigation tree at the left side of the interface to enter the file management page, as shown in Figure 7-1. This page displays all files saved on the storage device, and filenames are displayed in the format of path + filename.

Figure 7-1 File management

 

Downloading a File

Select Device > File Manage from the navigation tree at the left side of the interface to enter the file management page, as shown in Figure 7-1. Select a file from the list, click the Download File button, and then a File Download dialog box appears. You can select to open the file or to save the file locally. You can download only one file at one time.

Uploading a File

Select Device > File Manage from the navigation tree at the left side of the interface to enter the file management page, as shown in Figure 7-1. You can type the file path and filename in the Upload File box at the bottom of the page, or click Browse to select a file, and then select a storage device from the drop-down list. Click Apply to upload the file to the specified storage device.

Removing a File

Select Device > File Manage from the navigation tree at the left side of the interface to enter the file management page, as shown in Figure 7-1. You can remove a file by using one of the following ways:

l          Click the icon to remove a file.

l          Select one or multiple files from the file list, and then click Remove File.

 


 

Before rebooting the device, save the configuration; otherwise, all unsaved configuration will be lost after device reboot. After the device reboots, you need to re-log in to the Web interface.

 

Select Device > Reboot from the navigation tree at the left side of the interface to enter the device reboot configuration page, as shown in Figure 8-1. Click Apply to reboot the device.

Figure 8-1 Device reboot page

 

You can choose to check whether the current configuration has been saved to the configuration file to be used at the next startup.

l          If you select the check box before “Check configuration with next startup configuration file”, the system will check the configuration before rebooting the device. If the check succeeds, the system will reboot the device; if the check fails, the system will pop up a dialog box to tell you that the current configuration and the saved configuration are inconsistent, and will not reboot the device. In this case, you need to save the current configuration manually before you can reboot the device.

l          If you do not select the check box, the system will reboot the device directly.

 


Overview

In communications, an external interface (simply referred to as an interface defines a set of methods for two devices to exchange data and interact with each other. In the broad sense, interfaces fall into physical interfaces and logical interfaces. Physical interfaces are entities that physically exist and supported by components. Ethernet interfaces are an example of physical interfaces. Logical interfaces are interfaces created administratively or automatically by the system for data exchange but they do not exist in physical forms.

Interface management on the Web-based configuration interface is to manage all physical interfaces on your device and the following two types of logical interfaces:

l          Loopback interfaces, that is, logical interfaces whose IP addresses are on the network segment 127.0.0.0. Loopback interfaces are used for receiving packets destined for the local device.

l          Null interfaces, which are always up but can neither forward data packets nor be configured with an IP address or any link layer protocol. Any data packets sent to a null interface will be dropped.

l          WLAN-ESS interfaces, which are virtual Layer 2 interfaces. A WLAN-ESS interface operates like a Layer 2 Ethernet access port. It has Layer 2 attributes and supports multiple Layer 2 protocols. In addition, a WLAN-ESS interface can also be used as a template for configuring WLAN-DBSS interfaces. WLAN-DBSS interfaces created on a WLAN-ESS interface adopt the configuration of the WLAN-ESS interface.

l          WLAN-BSS interfaces, which are virtual Layer 2 interfaces. A WLAN-BSS interface operates like a Layer 2 Ethernet access port. It has Layer 2 attributes and supports multiple Layer 2 protocols. On a wireless router, a WLAN-Radio physical interface bound with a WLAN-BSS interface works in Layer 2 (bridge) mode.

l          WLAN mesh interfaces, which are virtual Layer 2 interfaces. You can use a WLAN mesh interface as a configuration template to make and save settings made for WLAN mesh link interfaces. Once a WLAN mesh link interface is created, you will not be allowed to change the settings on its associated WLAN mesh interface.

l          VLAN interfaces, which are virtual Layer 3 interfaces used for Layer 3 communications between VLANs. A VLAN interface corresponds to a VLAN. You can assign an IP address to a VLAN interface and specify it as the gateway of the corresponding VLAN to forward traffic destined for an IP network segment different from that of the VLAN.

l          Virtual template (VT) interfaces, which are templates used for configuring virtual access (VA) interfaces.

l          Bridge-Aggregation interfaces, which are Layer 2 aggregate interfaces used in link aggregation.

l          Dialer interfaces, which are logical interfaces delivering dialup services.

You can use the interface management feature to view interface information, create/remove logical interfaces, change interface status, and reset interface parameters.

Configuring Interface Management

Displaying Interface Information and Statistics

Select Device > Interface in the navigation tree to enter the page shown in Figure 9-1. The page displays the interfaces’ names, IP addresses, masks, and status. You can click an interface name in the Name column to display the statistics of that interface, as shown in Figure 9-2.

Figure 9-1 Interface management page

 

Figure 9-2 Statistics on an interface

 

Creating an Interface

Select Device > Interface in the navigation tree to enter the page shown in Figure 9-1. Click Add to enter the page for creating an interface.

Table 9-1 describes the configuration items of creating an interface.

Table 9-1 Configuration items of creating an interface

Item

Description

Interface Name

Set the type and number of a logical interface.

VID

Set the VLANs associated with the Layer 3 subinterface.

This parameter is available only after you set the interface name for a subinterface of a Layer-3 interface in the previous step.

Currently, this parameter is not configurable because the device does not support Layer 3 Ethernet subinterfaces.

MTU

Set the maximum transmit unit (MTU) of the interface.

The MTU value affects fragmentation and reassembly of IP packets.

This parameter can be configured only when the Interface Name field is set to Virtual-Template.

TCP MSS

Set the maximum segment size (MSS) for IP packets on the interface.

The TCP MSS value affects fragmentation and reassembly of IP packets.

This parameter can be configured only when the Interface Name field is set to Virtual-Template.

IP Config

None

The modes to set IP addresses:

l      Not Set: IP address is not set.

l      Static Address: Select the option to manually assign an IP address and mask for the interface.

l      DHCP: Select the option for the interface to obtain an IP address through DHCP.

l      BOOTP: Select the option for the interface to obtain an IP address through BOOTP.

l      PPP Negotiate: Obtains an IP address through PPP negotiation

l      Borrowed Address: Borrows the IP address of another interface on the same device.

Static Address

DHCP

BOOTP

PPP Negotiate

Unnumbered

IP Address

Set the IP address and subnet mask for the interface.

Configure both items when Static Address is selected for the IP Config item, and configure only IP addresses for loopback interfaces.

Mask

Unnumbered Interface

Set the interface whose IP address is to be borrowed.

Configure this item when Borrowed Address is selected for the IP Config item.

IPv6 Link Local config

None

The modes to set an IPv6 link local address, including:

l      None: No IPv6 link local address is set.

l      Auto: An IPv6 link local address is automatically generated.

l      Manual: Manually configure an IPv6 link local address.

By default, an IPv6 link local address is generated when an interface is configured with an IPv6 unicast address.

Auto

Manual

IPv6 unicast config

IPv6 unicast address

Set an IPv6 global unicast address or site-local address for an interface.

EUI64 encoding

Specify an IPv6 global unicast address or site local address in IEEE EUI-64 format. The prefix of the address is the specified prefix, and the interface identifier is converted from the MAC address of the interface.

 

Editing an Interface

Select Device > Interface in the navigation tree to enter the page as shown in Figure 9-1, and then click the  icon corresponding to an interface to enter the Edit Interface page of the interface. For a Layer 2 physical port, the Edit Interface page is shown in Figure 9-3, and the editing items are shown in Table 9-2. For configurations of ports of other types, refer to Table 9-2.

Figure 9-3 Edit a Layer 2 physical port

 

Table 9-2 Configuration items of editing a Layer 2 physical port

Item

Description

Port State

Enables or disables the port.

Flow Control

Enables or disables flow control on the port.

Link Type

Sets the port’s link type, which can be access, hybrid or trunk.

For more information about link types, refer to Table 9-3.

To change a trunk port to a hybrid port or vice versa, you need to change it to an access port first.

Jumbo Frame

Allows or forbids jumbo frames to pass through the port.

Speed

Set the port’s transmission rate:

l      10: indicates 10 Mbps

l      100: indicates 100 Mbps

l      1000: indicates 1000 Mbps

l      Auto: indicates auto-negotiation

Duplex

Set the port’s duplex mode:

l      Auto: indicates auto-negotiation

l      Full: indicates full duplex

l      Half: indicates half duplex

MAX MAC Count

Sets the maximum number of MAC addresses the port can learn:

l      User Defined: the user needs to manually input the maximum number

l      No Limited: there is no limit on the number of MAC addresses that can be learned

PVID

Set the port’s default VLAN ID

l      The trunk ports at the two ends of a link must have the same PVID. Otherwise, the link cannot properly transmit packets.

l      The hybrid ports at the two ends of a link must have the same PVID. Otherwise, the link cannot properly transmit packets.

Broadcast Suppression

Selects the parameter used in broadcast suppression and sets its value:

l      Ratio: indicates the maximum percentage of broadcast traffic to the total transmission capability of an Ethernet interface. When this parameter is selected, you need to provide a percentage in the box below.

l      PPS: indicates the maximum number of broadcast packets that can be forwarded on an Ethernet interface per second. When this parameter is selected, you need to provide a number in the box below.

Multicast Suppression

Selects the parameter used in multicast suppression and sets its value:

l      Ratio: indicates the maximum percentage of multicast traffic to the total transmission capability of an Ethernet interface. When this parameter is selected, you need to provide a percentage in the box below.

l      PPS: indicates the maximum number of multicast packets that can be forwarded on an Ethernet interface per second. When this parameter is selected, you need to provide a number in the box below.

Unicast Suppression

Selects the parameter used in unicast suppression and sets its value:

l      Ratio: indicates the maximum percentage of unicast traffic to the total transmission capability of an Ethernet interface. When this parameter is selected, you need to provide a percentage in the box below.

l      PPS: indicates the maximum number of unicast packets that can be forwarded on an Ethernet interface per second. When this parameter is selected, you need to provide a number in the box below.

 

Table 9-3 Link type description

Link type

Description

Access

An access port can belong to only one VLAN and is usually used to connect a user device.

Hybrid

A hybrid port can be assigned to multiple VLANs, receive and send packets of multiple VLANs, and allow packets of multiple VLANs to pass through untagged. It can be used to connect network devices, as well as user devices.

Trunk

A trunk port can be assigned to multiple VLANs, receive and send packets of multiple VLANs, but allows only packets of the default VLAN to pass through untagged. It is usually used to connect network devices.

 

Shutting Down/Bringing Up an Interface

Select Device > Interface in the navigation tree to enter the page shown in Figure 9-1. By clicking the status icon of an interface, you can shut down the interface if it is currently up or bring up the interface if it is currently down.

The following three icons show the status of an interface:

l          : indicates that the interface is up and connected.

l          : indicates that the interface is up but disconnected.

l          : indicates that the interface is down.


 

There are two kinds of port mirroring: local port mirroring and remote port mirroring. Only the WX5002 supports local port mirroring.

 

Introduction to Port Mirroring

Port mirroring is to copy the packets passing through one or multiple ports (called mirroring ports) to a port (called the monitor port) on the local device. The monitor port is connected with a monitoring device. By analyzing on the monitoring device the packets mirrored to the monitor port, you can monitor the network and troubleshoot possible network problems.

Figure 10-1 A port mirroring implementation

 

Implementing Port Mirroring

Port mirroring is implemented through mirroring groups.

The mirroring ports and the monitor port are in the same mirroring group. With port mirroring enabled, the device copies packets passing through the mirroring ports to the monitor port.

Other Supported Features

Mirroring groups support inter-board mirroring, that is, the mirroring ports and the monitor port can be located on different boards.

Besides, you can use one monitor port to monitor multiple mirroring ports

 

Support for inter-board mirroring depends on your device model.

 

Configuring Port Mirroring

Configuration Task List

Follow the steps in Table 10-1 to configure port mirroring:

Table 10-1 Port mirroring configuration task list

Task

Remarks

Create a mirroring group

Required

Refer to section Creating a Mirroring Group for details.

You need to select the mirroring group type local in the Type drop-down list.

Configure the mirroring ports

Required

Refer to section Configuring Ports for a Mirroring Group for details.

During configuration, you need to select the port type Mirror Port.

Configure the monitor port

Required

Refer to section Configuring Ports for a Mirroring Group for details.

During configuration, you need to select the port type Monitor Port.

 

Creating a Mirroring Group

Select Device > Port Mirroring in the navigation tree and click the Create tab to enter the page for creating a mirroring port, as shown in Figure 10-2.

Figure 10-2 The page for creating a mirroring group

 

Table 10-2 describes the configuration items of creating a mirroring group.

Table 10-2 Configuration items of creating a mirroring group

Item

Description

Mirroring Group ID

ID of the mirroring group to be created

Type

Specify the type of the mirroring group to be created:

Local: Creates a local mirroring group.

 

Return to Port mirroring configuration task list.

Configuring Ports for a Mirroring Group

Select Device > Port Mirroring in the navigation tree and click Modify Port to enter the page for configuring ports for a mirroring group, as shown in Figure 10-3.

Figure 10-3 The page for configuring ports for a mirroring group

 

Table 10-3 describes the configuration items of configuring ports for a mirroring group.

Table 10-3 Configuration items of configuring ports for a mirroring group

Item

Description

Mirroring Group ID

ID of the mirroring group to be configured

The available groups were created in advance.

Port Type

Sets the types of the ports to be configured:

l      Monitor Port: configures the monitor port for the mirroring group.

l      Mirror Port: configures mirroring ports for the mirroring group.

Stream Orientation

Set the direction of the traffic monitored by the monitor port of the mirroring group

This configuration item is available when Mirror Port is selected is the Port Type drop-down list.

l      both: Mirrors both received and sent packets on mirroring ports.

l      inbound: Mirrors only packets received by mirroring port.

l      outbound: Mirrors only packets sent by mirroring ports.

Support for monitoring directions depends on you device model.

interface name

Select the ports to be configured from the interface name list.

 

Return to Port mirroring configuration task list.

Configuration Examples

Network requirements

The customer network is as described below:

l          Department 1 accesses Device C through Ethernet 1/1.

l          Department 2 accesses Device C through Ethernet 1/2.

l          Server is connected to Ethernet1/3 of Device C.

Configure port mirroring to monitor the bidirectional traffic of Department 1 and Department 2 on the server.

To satisfy the above requirement through port mirroring, perform the following configuration on Device C:

l          Configure Ethernet1/1 and Ethernet 1/2 as mirroring ports.

l          Configure Ethernet1/3 as the monitor port.

Figure 10-4 Network diagram for port mirroring configuration

 

Configuration procedure

# Create a mirroring group.

l          Select Device > Port Mirroring in the navigation tree and click Create

l          Type mirroring group ID 1.

l          Select Local in the Type drop-down list.

l          Click Apply to complete the operation.

# Configure the mirroring ports.

l          Click Modify Port.

l          Select 1 – Local in the Mirroring Group ID drop-down list.

l          Select Mirror Port in the Port Type drop-down list.

l          Select both in the Stream Orientation drop-down list.

l          Select Ethernet 1/1 and Ethernet 1/2 in the interface name list.

l          Click Apply to complete the operation.

# Configure the monitor port.

l          Select 1 – Local in the Mirroring Group ID drop-down list.

l          Select Monitor Port in the Port Type drop-down list.

l          Select Ethernet 1/3 in the interface name list.

l          Click Apply to complete the operation.

Configuration Guidelines

When configuring port mirroring, note that:

l          To ensure operation of your device, do not enable STP, MSTP, or RSTP on the monitor port.

l          You can configure multiple mirroring ports but only one monitor port for a mirroring group.

l          A port can be assigned to only one mirroring group.

 


Overview

In the user management part, you can:

l          Set the username, password, and access level for an FTP or Telnet user.

l          Set the super password for switching the current Web user level to the management level

l          Switch the current Web user access level to the management level

Users

Creating a User

Select Device > Users from the navigation tree, and click the Create tab to enter the page for creating local users, as shown in Figure 11-1.

Figure 11-1 Create a user

 

Table 11-1 describes the configuration items for creating a user.

Table 11-1 Configuration items for creating a user

Item

Description

Username

Sets the username for a user. The username cannot include two or more successive spaces and the signs mentioned on the page.

Access Level

Sets the access level for a user. Users of different levels can perform different operations.

Web user levels, from low to high, are visitor, monitor, configure, and management.

l      Visitor: Users of visitor level can only use the network diagnostic tool ping. They can neither access the device data nor configure the device.

l      Monitor: Users of this level can only access the device data but cannot configure the device.

l      Configure: Users of this level can access data on the device and configure the device, but they cannot upgrade the host software, add/delete/browse users, modify the passwords of other users, or restore the application file.

l      Management: Users of this level can perform any operations on the device.

Password

Sets the password for a user

l      When the password mode is Simple, the input password is in plain text.

l      When the password mode is Cipher, the input password is either in plain text or cipher text with a length of 24 or 88. In this case, the input plain password with the length smaller than or equal to 16 will be converted to a cipher password with a length of 24; the input plain password with a length greater than 16 but smaller than 63 will be converted to a cipher password with a length of 88. When the length of the input password is 24, if the system can decrypt the password, it considers the password as a ciphertext password; if not, the system considers the password as a plaintext password. When the length of the input password is 88, if the system can decrypt the password, it considers the password as a ciphertext password; if not, the system prompts that the password is invalid.

Confirm Password

Inputs the same password again. Otherwise, the system prompts that the two passwords input are not consistent when you apply the configuration.

Password Display Mode

Sets the password display mode.

l      Simple: The password will be saved in the configuration file in plain text.

l      Cipher: The password will be saved in the configuration file in cipher text, even if the password is input in plain text when configured.

The plaintext password is not safe, and you are recommended to use the ciphertext password.

No matter the password mode is set to Simple or Cipher, you must enter the password in the form of plain text for login authentication.

Service Type

Sets the service type, including FTP and Telnet services. You must select either of them.

 

Setting the Super Password

In this part, users of the management level can specify the password for a lower-level user to switch from the current access level to the management level. If no such a password is configured, the switchover will fail.

Select Device > Users from the navigation tree, and click the Super Password tab to enter the super password configuration page, as shown in Figure 11-2.

Figure 11-2 Super password

 

Table 11-2 describes the configuration items of specifying a super password.

Table 11-2 Super password configuration items

Item

Description

Create/Remove

Sets the operation type:

l      Create: Configure or modify the super password.

l      Remove: Remove the current super password.

Password

Sets the password for a user to switch to the management level.

Confirm Password

Inputs the same password again. Otherwise, the system prompts that the two passwords input are not consistent when you apply the configuration.

Password Display Mode

Sets the password display mode.

l      Simple: The password will be saved in the configuration file in plain text.

l      Cipher: The password will be saved in the configuration file in cipher text.

The plaintext password is not safe, and you are recommended to use the ciphertext password.

 

Switching the User Access Level to the Management Level

This function is provided for a user to switch the current user level to the management level. Note the following:

l          Before switching, make sure that the super password is already configured. A user cannot switch to the management level without a super password.

l          The access level switchover of a user is valid for the current login only. The access level configured for the user is not changed. When the user re-logs in to the Web interface, the access level of the user is still the original level.

Select Device > Users from the navigation tree, and click the Switch To Management tab to enter the access level switching page, as shown in Figure 11-3. Type the super password and click Login.

Figure 11-3 Switch to the management level.

 


Overview

You can check whether an Ethernet port works normally by performing Ethernet port loopback test. During a loopback test, a port cannot forward data packets normally.

Ethernet port loopback test can be internal or external.

l          In an internal loopback test, self loop is established in the switching chip to check whether there is a chip failure related to the port.

l          In an external loopback test, a self-loop header is used on the port. Packets forwarded by the port will be received by itself through the self-loop header. The external loopback test can be used to check whether there is a hardware failure on the port.

Loopback Operation

Select Device > Loopback from the navigation tree to enter the loopback test configuration page, as shown in Figure 12-1.

Figure 12-1 Loopback test configuration page

 

Table 12-1 describes the loopback test configuration items.

Table 12-1 Loopback test configuration items

Item

Description

Testing type

External

Sets the loopback test type, which can be selected between External and Internal.

Support for the test type depends on the device model.

Internal

Interface

Specifies the Ethernet interface to have a loopback test.

 

After the above configuration, click Test to start the loopback test, and you can see the test result at the right of the Test button.

Configuration Guidelines

Note the following when performing a loopback test:

l          You can perform an internal loopback test but not an external loopback test for a port that is physically down, while you can perform neither test for a port that is manually shut down.

l          The system does not allow Rate, Duplex, and Port Status configuration on a port under the loopback test.

l          An Ethernet port works in the full duplex mode when the loopback test is performed, and restores its original duplex mode after the loopback test.


  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网