- Table of Contents
-
- 11-Network Management and Monitoring Configuration Guide
- 00-Preface
- 01-System maintenance and debugging configuration
- 02-NQA configuration
- 03-NTP configuration
- 04-PoE configuration
- 05-SNMP configuration
- 06-RMON configuration
- 07-NETCONF configuration
- 08-Ansible configuration
- 09-SmartMC configuration
- 10-AON Ethernet system configuration
- 11-EPA configuration
- 12-CWMP configuration
- 13-EAA configuration
- 14-Process monitoring and maintenance configuration
- 15-Sampler configuration
- 16-Mirroring configuration
- 17-NetStream configuration
- 18-IPv6 NetStream configuration
- 19-sFlow configuration
- 20-Information center configuration
- 21-Packet capture configuration
- 22-VCF fabric configuration
- 23-Cloud connection configuration
- 24-eMDI configuration
- 25-Performance management configuration
- 26-TCP connection trace configuration
- Related Documents
-
Title | Size | Download |
---|---|---|
09-SmartMC configuration | 651.85 KB |
Self-mesh SmartMC and non-self-mesh SmartMC
Configuring non-self-mesh SmartMC (SmartMC 1.0)
Restrictions: Hardware compatibility with SmartMC
Restrictions and guidelines: SmartMC configuration
Configuring an outgoing interface for the SmartMC network
Enabling automatic Ethernet link aggregation
Modifying the password of the default user for members
Deploying a batch file to members
Configuring a batch file for ports connecting APs or IP phones
Backing up configuration files
Configuring resource monitoring
Upgrading the startup software and configuration file on members
About upgrading the startup software and configuration file on members
Restrictions and guidelines for startup software and configuration file upgrade
Upgrading the startup software and configuration file on members
Upgrading the startup software and configuration file on all members in SmartMC groups
Refreshing the network topology
Display and maintenance commands for SmartMC
SmartMC configuration examples
Configuring self-mesh SmartMC (SmartMC 2.0)
Self-mesh SmartMC application scenarios
Basic concepts of self-mesh SmartMC
Role selection in self-mesh SmartMC
Self-mesh SmartMC network establishment and changing
Self-mesh SmartMC configuration management
Time synchronization (NTP) for self-mesh SmartMC
Auto-switching of the DHCP server in SmartMC self-mesh networking
UWEB management system login with a fixed domain name
Restrictions and guidelines: Self-mesh SmartMC configuration
Restrictions: Hardware compatibility with SmartMC
Self-mesh SmartMC tasks at a glance
Setting the network-wide SmartMC password
Setting the FTP server information
Display and maintenance commands for self-mesh SmartMC
Self-mesh SmartMC configuration examples
Example: Configuring self-mesh SmartMC with the switch acting as a TC
Example: Configuring self-mesh SmartMC with the switch acting as the TM
Configuring SmartMC
About SmartMC
Smart Management Center (SmartMC) centrally manages and maintains dispersed network devices at network edges. In a SmartMC network, only one device acts as the commander and the remaining devices all act as members. SmartMC provides the following features for you to manage the members from the commander:
· Configuration file backup and download.
· Software upgrade.
· Configuration deployment.
· Faulty member replacement.
SmartMC network framework
Figure 1 shows the basic framework of a SmartMC network.
The SmartMC network contains the following elements:
· Commander—Also called topology master (TM), which manages all members in the SmartMC network.
· Member—Also called topology client (TC), which is managed by the commander.
· FTP server—Stores startup software images and configuration files for the commander and members.
Figure 1 SmartMC network framework
Self-mesh SmartMC and non-self-mesh SmartMC
|
NOTE: · The theory behind SmartMC self-mesh and non-self-mesh modes differ, so as the supported commands. Choose the appropriate mode based on device support and network scenarios. The device determines which mode to operate in based on the current SmartMC configuration, which can be manually configured by a network administrator or pre-configured by the manufacturer. · To switch the SmartMC mode, execute undo smartmc enable to disable SmartMC and restore the default SmartMC settings, and then use the smartmc enable command to configure SmartMC. |
SmartMC supports two operating modes: self-mesh and non-self-mesh, depending on the role selection method.
· Self-mesh mode:
In the self-mesh mode, the role of the device in the SmartMC network (either TM or TC) can be manually specified through the CLI or determined through an automatic role election mechanism. Devices can automatically form a SmartMC network using the default factory configuration.
In a self-mesh SmartMC network, the following commands are supported to enable the SmartMC function:
¡ smartmc enable: Enables SmartMC and enters self-mesh mode. Devices configured with this command determine their roles through auto election.
¡ smartmc enable auto tm: Enables SmartMC and enters self-mesh mode. The device configured with this command acts as the TM.
¡ smartmc tc enable: Enables SmartMC. Devices configured with this command act as TCs. The enabling status of the self-mesh mode on these devices is consistent with the self-mesh mode status of the TM.
Support for these commands depends on the device model.
· Non-self-mesh mode:
In this mode, you can only manually specify the role of a device through the CLI. Before setting up the SmartMC network, you must log in to the device to complete the necessary configuration. In a non-self-mesh SmartMC network, the following commands are supported to enable the SmartMC function:
¡ smartmc tm enable: Enables SmartMC and enters non-self-mesh mode. The device configured with this command acts as the TM.
¡ smartmc tc enable: Enables SmartMC. Devices configured with this command act as TCs. The enabling status of the self-mesh mode on these devices is consistent with the self-mesh mode status of the TM.
Table 1 Differences between self-mesh SmartMC and non-self-mesh SmartMC
Item |
Self-mesh SmartMC |
Non-self-mesh SmartMC |
Setup |
Use factory default settings. TCs support plug-and-play. The TM must be deployed from the Web interface and then the SmartMC network can be established automatically |
Require manual role (TM or TC) configuration |
Role election |
Manual configuration or auto election |
Manual configuration |
Management method |
Use the UWEB platform, a lightweight Web management platform parallel to the device local web interface |
Use the CLI, the SmartMC network management platform, or both (the SmartMC network management platform is a primary feature of the device local web interface) |
Applicable network scenarios |
· Wired access · Unified wired and wireless access |
Wired access |
Supported SmartMC commands |
Only the smartmc enable, smartmc password, and smartmc ftp-server commands |
All SmartMC commands except the smartmc password command |
Configuring non-self-mesh SmartMC (SmartMC 1.0)
|
NOTE: For simplicity purposes, the term "SmartMC" in this chapter refers to non-mesh SmartMC. For more information about self-mesh SmartMC, see "Configuring self-mesh SmartMC." |
About non-mesh SmartMC
Non-mesh SmartMC is a technology where network administrators manually configure devices as TM or TC in the SmartMC network using command lines and complete other relevant configurations before interconnecting them. The devices will join the SmartMC network according to the specified roles and complete the network formation. The TM manages TCs. It is the administrator's responsibility in a non-mesh SmartMC network to ensure that only one TM is present.
SmartMC network establishment
A SmartMC network can be established semi-automatically or manually.
· In a semi-automatically established SmartMC network, the commander obtains member information through NETCONF sessions to form the network topology. The member information includes port information, LLDP neighbor information, STP information, device type, and software version.
· In a manually established SmartMC network, the commander obtains member's LLDP neighbor information through NETCONF sessions and member's hardware information through SNMP Get operations.
Semi-automatic SmartMC network establishment
The commander and members use the following procedure to establish a SmartMC network semi-automatically:
1. After SmartMC is enabled, the commander broadcasts a SmartMC packet at an interval of 15 seconds to detect members in the network. The SmartMC packet contains information of the commander, such as its bridge MAC address and the IP address of VLAN-interface 1.
2. When a member receives the packet, it records the commander information, and returns a response packet to the commander. The response packet contains information of the member, such as its bridge MAC address and the IP address of VLAN-interface 1.
3. When the commander receives the response packet, it initiates a NETCONF session to the member with the default username admin and the default password admin and sets up TCP keepalive. The commander then obtains detailed information about the member through the session, including port information, LLDP neighbor information, STP information, device type, and software version.
4. The commander notifies the member of online success, and adds the member to the SmartMC network.
5. Based on the LLDP neighbor information obtained from all members, the commander forms a SmartMC topology.
After the successful establishment of the SmartMC network, the commander becomes aware of members through NETCONF session status, while members become aware of each other through SmartMC broadcast messages sent by the commander:
· When a member receives a SmartMC broadcast packet from the commander, it compares the bridge MAC address in the packet with the recorded bridge MAC address. If the two bridge MAC addresses are the same and the device with the MAC address is offline, the member returns a response packet to the commander. If the member does not receive a broadcast packet from the commander within the time limit, the member determines that the commander does not exist in the network anymore. Then, the member clears the commander information. The time limit is a random value in the range of 60 to 120 seconds.
· When the commander receives a response message from a member, it establishes a NETCONF session with the member and sets up TCP keepalive. If no data packet is exchanged within 40 seconds, TCP keepalive detection will be triggered. The device initiates a detection every 5 seconds. If the detection fails 4 times in a row, the member is considered offline, and the commander sets it to offline status. This means that if the commander does not receive any packets from the member within 60 seconds, it sets the member to offline status.
Manual SmartMC network establishment
You can log in to the Web interface of the commander, and enter the IP address, username, and password of the members to manually add them to the network. The members can join the network without exchanging SmartMC packets with the commander. For more information, see Comware 7 Web-Based Products User Guide.
After you specify the information of a member on the commander, the commander performs the following operations to add the member to the network:
· Verify that the member can be accessed through Telnet.
· Obtain basic member information, including LLDP neighbor information through NETCONF.
· Obtain hardware information through SNMP Get operations.
SmartMC features
Bulk configuration deployment for members
This feature allows you to deploy multiple command lines to members from the commander, eliminating the need to log in to members and configure the command one by one.
The procedure for bulk configuration deployment is as follows:
1. The commander acts as a Telnet client and establishes Telnet connections to the members.
2. The commander deploys a batch file to the members through NETCONF sessions. The batch file is created on the commander and contains command lines to be deployed.
3. The members run the command lines in the file.
Bulk configuration deployment for ports connecting APs and IP phones
With batch file deployment enabled, the commander automatically deploys configurations in the specified batch file to a port connecting an AP or IP phone, simplifying access port configuration.
When the commander first detects the association of an AP or IP phone on a port through LLDP, it deploys the command lines in the specified batch file to the port. If no batch file is specified for the device type, the configurations on the port remain unchanged.
If the AP or IP phone disconnects from the port, the configurations on the port remain. When a new device comes online from the port, configurations used by the port depend on the new device type.
· If the new device is an AP or IP phone and has the same type as the disconnected device, the configurations on the port remain unchanged.
· If the new device is an AP or IP phone but has a different type as the disconnected device, the commander deploys the command lines in the specified batch file to the port. If no batch file is specified for the device type, the configurations on the port remain unchanged.
· If the new device is neither an AP nor an IP phone, the configurations on the port remain unchanged.
To disable the commander from deploying a batch file to ports, remove the specified batch file or execute the undo smartmc batch-file-apply enable command to disable batch file deployment.
Configuration file backup
You can use the following methods to back up the next-startup configuration file on the commander and members:
· Automatic backup—Enable this feature for the commander and all members in the network to immediately perform a backup. After that, the commander and members back up the configuration file at a user-specified interval.
· Manual backup—Manually trigger a backup on the commander or the specified members or SmartMC groups.
To back up the configuration file on a member, the commander instructs the member by unicasting a SmartMC packet. When a member receives the packet, it saves the running configuration to the next-startup configuration file and uploads the file to the file server.
Startup software and configuration file upgrade
This feature enables users to upgrade startup software and the configuration file of member devices from the commander.
Before upgrade, you must upload the upgrade files from the commander to the file server and specify the upgrade files on the file server for the members to download.
The procedure for startup software and configuration file upgrade is as follows:
1. The commander instructs the members (or SmartMC group) to download the upgrade files from the file server.
2. The members download the upgrade files from the file server.
3. The members upgrade the startup software and configuration file as follows:
¡ Startup software upgrade—Performs an ISSU with the upgrade startup software files. The members might be restarted during the upgrade process.
¡ Configuration file upgrade—Replaces the current configuration file with the upgrade configuration file. The members will not be restarted during the upgrade process.
Faulty member replacement
You can use the following methods to replace a faulty member:
· Automatic replacement—Enables the commander to record the positions of all members in the topology for replacement. When the commander discovers that the new member has physically replaced the faulty member, it compares the new member with the faulty one. The commander performs a replacement if the following requirements are met:
¡ The new member is deployed at the same topological position as the faulty one.
¡ The models of the new member and faulty member are the same.
The commander then instructs the new member to download the configuration file of the faulty member from the file server. After downloading the configuration file, the new member runs the configuration file to complete the replacement.
· Manual replacement—After the faulty member is physically replaced, you manually trigger a configuration replacement. The new member will download the configuration file of the faulty member from the file server and run the file to complete the replacement.
Outgoing interface for a SmartMC network
The outgoing interface feature allows hosts connecting to an outgoing interface to access all the members in a SmartMC network. You can configure multiple outgoing interfaces for a SmartMC network.
As shown in Figure 2, the host is connected to port 1 on the TM and TC 1 and TC 2 are in a different network segment than the host. The host can access the Web interface of the TM but cannot access the Web interface of any member.
If port 1 on the TM is configured as the outgoing interface, the system mirrors the IP address of each member to a new address. The new address contains the IP address of the outgoing interface and the port number assigned by the commander to the member in the format of IP address:Port number. This enables the host to access the Web interfaces of members from the Web interface of the TM.
To access the Web interface of a member, enter the Web interface of the commander, and click Visibility from the navigation pane. Then, click the Topology tab, select the target member, and click Login to Web interface.
Automatic link aggregation
Automatic link aggregation automatically bundles multiple physical Ethernet links between two members into one logical link, called an aggregate link. This feature provides increased link bandwidth and improved link reliability.
|
NOTE: · Automatic link aggregation cannot be performed between the commander and a member, or between a member and a device outside the SmartMC network. You can aggregate the links between the commander and a member manually. For more information about manual link aggregation, see Ethernet link aggregation in Layer 2—LAN Switching Configuration Guide. · If a member enabled with automatic link aggregation joins a SmartMC network whose commander is disabled with the aggregation feature, the feature will be disabled for the member as well. This might affect service traffic forwarding on the member. |
VLAN creation for members
To simplify configuration and management, you can create a VLAN for members. Then, all access ports on a member that are not connected to other members or the commander are assigned to the VLAN.
If a member has access ports that are connected to offline devices, you must remove the offline devices before creating a VLAN for the member.
The VLAN creation fails for a member if one or more access ports cannot be assigned to the VLAN. If the VLAN creation fails, the VLAN memberships for the access ports are restored to the state before the VLAN was created.
The failure to create a VLAN for a member does not affect the VLAN creation for other members.
Resource monitoring
Resource monitoring allows you to view CPU usage, memory usage, temperature information, and packet dropping information of commanders and members on the commander. Packet dropping monitoring monitors packet dropping on members and on interfaces.
You can view the usage and temperature information on the commander, and view packet dropping information from the SmartMC > Intelligent O&M > Resource monitoring page of the commander's Web interface.
Restrictions: Hardware compatibility with SmartMC
The S5130S-EI-G&S5100-D-G&S5500-D-G switch series can only function as a member device, and does not support the role of a commander for SmartMC.
Restrictions and guidelines: SmartMC configuration
Only users with the network-admin role can configure SmartMC. For more information about user roles, see RBAC in Fundamentals Configuration Guide.
Devices exchange SmartMC protocol packets and establish and maintain the SmartMC network only in VLAN 1. To ensure the proper functioning of SmartMC, make sure the interfaces connecting member devices within the SmartMC network allow VLAN 1 packets to pass through.
You need to enable SmartMC on both the commander and members and perform all the other SmartMC tasks only on the commander.
SmartMC tasks at a glance
To configure SmartMC, perform the following tasks:
This task is required for configuring automatic configuration file backup, replacing faulty members, and upgrading the startup software and configuration file on members.
3. (Optional.) Configuring an outgoing interface for the SmartMC network
4. (Optional.) Enabling automatic Ethernet link aggregation
5. (Optional.) Modifying the password of the default user for members
This task is required for upgrading the startup software and configuration file on members and deploying a batch file to a SmartMC group.
7. (Optional.) Deploying and managing configuration
¡ Deploying a batch file to members
¡ Configuring a batch file for ports connecting APs or IP phones
¡ Backing up configuration files
8. (Optional.) Monitoring and maintaining the SmartMC network
¡ Configuring resource monitoring
¡ Upgrading the startup software and configuration file on members
¡ Managing the network topology
Prerequisites for SmartMC
Before you configure SmartMC, perform the following tasks on the commander and members:
· Enable the Telnet service, and configure scheme authentication for VTY user lines. For information about Telnet service and VTY user lines, see CLI login configuration in Fundamentals Configuration Guide.
· Configure a local user.
¡ Specify the username and password.
- On the commander, make sure the username and password are the same as the username and password configured by using the smartmc tm username username password { cipher | simple } string enable command.
- On a member, set both the username and password to admin, and execute the password-control length 4, password-control composition type-number 1 type-length 1, and undo password-control complexity user-name check commands to lower the password complexity requirements.
This is because SmartMC requires that the commander use username admin and password admin to communicate with members, which does not meet the default password complexity requirements. For more information about these commands, see password control commands in Security Command Reference.
After the SmartMC network is established, you can increase the password complexity requirements and use the smartmc tc password command to modify the username and password.
¡ Specify the Telnet, SSH, HTTP, and HTTPS services for the user.
¡ Set the RBAC role of the local user to network-admin.
For information about local users, see AAA configuration in Security Configuration Guide. For information about user roles, see RBAC configuration in Fundamentals Configuration Guide.
· Enable NETCONF over SOAP over HTTP. For information about NETCONF over SOAP, see NETCONF configuration in Network Management and Monitoring Configuration Guide.
· Enable NETCONF over SSH. For more information about NETCONF over SSH, see "Configuring NETCONF."
· Configure public key management for SSH authentication. Execute the ssh user admin service-type netconf authentication-type publickey assign publickey -smartmc-publickey- command on the member to configure the authentication method for SSH users. Digital signature is supported. The username must be admin for an SSH user and the public key name must be -smartmc-publickey- for the SSH client. For more information about public key management, see Security Configuration Guide.
· Enable LLDP globally. For information about LLDP, see Layer 2—LAN Switching Configuration Guide.
· To manage the commander and members through a Web interface, you must enable the HTTP and HTTPS services, and set the service type to HTTP and HTTPS for the local user. For information about Web login, HTTP, and HTTPS, see Fundamentals Configuration Guide.
· To manually establish a SmartMC network, you must configure the snmp-agent community read public and snmp-agent sys-info version v2c commands on the members. For information about SNMP, see Network Management and Monitoring Configuration Guide.
Enabling SmartMC
About this task
Enable this feature on both the commander and members to enable management of members from the commander.
Restrictions and guidelines
A SmartMC network must have one and only one commander.
If you change the role of the commander to member or disable SmartMC on the commander, all SmartMC settings in its running configuration will be cleared.
SmartMC fails to be enabled if ACL resources are insufficient. If ACL resources are insufficient, use the undo acl command to delete unnecessary ACLs and then enable SmartMC. You can execute the display acl command to view ACL configuration and match statistics. For more information about ACLs, see ACL and QoS Configuration Guide.
SmartMC fails to be enabled if ports 80 and 443 have been used.
If you execute the smartmc enable command multiple times, the most recent configuration takes effect. You can execute the command to change the device role or the password.
Procedure
1. Enter system view.
system-view
2. Enable SmartMC and set the device role.
smartmc { tc | tm username username password { cipher | simple } string } enable
By default, SmartMC is disabled.
Specifying a file server
About this task
In a SmartMC network, a file server is used to store the following files:
· Upgrade startup software files and upgrade configuration file for members.
· Backup configuration files of the commander and members.
The system supports using an FTP or SFTP server as the file server. For information about FTP servers, see configuring FTP in Fundamentals Configuration Guide. For information about SFTP servers, see configuring SSH in Security Configuration Guide.
Restrictions and guidelines
You can use the following methods to specify a file server:
· Specify the IP address of a file server.
· Specify the IP address of the commander. The commander will act as a file server.
To configure the commander to act as a file server, make sure the commander has enough storage space for storing the files required by members.
To use an independent file server, connect the file server to the commander instead of the members as a best practice. The file server uses VLAN 1 to communicate with the SmartMC network. If you connect the file server to members, creating a VLAN for members will assign member interfaces connecting to the file server to the created VLAN, causing file server disconnection. For more information about member VLAN creation, see "Creating a VLAN for members."
Procedure
1. Enter system view.
system-view
2. Specify a file server.
smartmc { ftp-server | sftp-server } { ipv4-address | ipv6 ipv6-address } [ port port ] [ vpn-instance vpn-instance-name ] [ directory directory ] username username password { cipher | simple } string
By default, no file server is specified.
Configuring an outgoing interface for the SmartMC network
Restrictions and guidelines
VLAN-interface 1 cannot be used as an outgoing interface, because the SmartMC network is established in VLAN 1.
A member port of a Layer 3 aggregation group cannot be used as an outgoing interface for SmartMC, and vice versa. If a configured outgoing interface is a member port of a Layer 3 aggregation group, the outgoing interface does not take effect. For more information about Layer 3 aggregation groups, see Ethernet link aggregation in Layer 2—LAN Switching Configuration Guide.
If you specify a Layer 3 Ethernet interface as the outgoing interface, the system issues the command only to VLAN-interface 1. If you remove the outgoing interface configuration, the service slot slot-number configuration remains, and you can modify the configuration manually as needed.
Procedure
1. Enter system view.
system-view
2. Enter VLAN interface view or Layer 3 Ethernet interface view.
¡ Enter VLAN interface view.
interface vlan interface-number
¡ Enter Layer 3 Ethernet interface view.
interface interface-type interface-number
3. Configure the interface as an outgoing interface.
smartmc outbound
By default, no interface is used as an outgoing interface.
Enabling automatic Ethernet link aggregation
Restrictions and guidelines
Enabling or disabling automatic link aggregation might cause network flapping, and the members might go offline for a short period of time.
Procedure
1. Enter system view.
system-view
2. Enable automatic Ethernet link aggregation.
smartmc auto-link-aggregation enable
By default, automatic Ethernet link aggregation is disabled.
Modifying the password of the default user for members
About this task
During SmartMC network establishment, the commander uses the default username and password to establish NETCONF sessions to members automatically added to the network. The default username and password of the members for NETCONF session establishment are admin and admin.
To enhance security, you can perform this task to change the password for the default user admin of the members after the commander adds the members to the network.
Restrictions and guidelines
Do not modify the password for members that are manually added to the SmartMC network. If you modify the password for a manually added member, you will not be able to manage that member from the commander.
You can use the display smartmc tc verbose command to identify the method used to add the members.
Procedure
1. Enter system view.
system-view
2. Modify the password of the default user for members.
smartmc tc password [ cipher ] string
Creating a SmartMC group
About this task
This feature allows you to create a SmartMC group on the commander and add members to the group. When you perform the following operations, you can specify a SmartMC group to apply the operations to all members in the group:
· Startup software upgrade.
· Configuration file upgrade.
· Configuration deployment.
Procedure
1. Enter system view.
system-view
2. Create a SmartMC group and enter its view.
smartmc group group-name
3. (Optional.) Display predefined device types.
match device-type ?
4. Set a match criterion.
match { device-type device-type | ip-address ip-address { ip-mask-length | ip-mask } | mac-address mac-address mac-mask-length }
By default, no match criterion is set.
5. If the device type of the members is not predefined on the commander, perform the following tasks to manually define the device type on the commander:
a. Return to system view.
quit
b. Define a device type on the commander.
smartmc tc sysoid sysoid device-type device-type
To obtain the SYSOID of a member, execute the display smartmc tc verbose command.
You cannot define a predefined member type as another type.
Creating a VLAN for members
Restrictions and guidelines
If you perform this task multiple times to create a VLAN for members, the most recent configuration takes effect.
Procedure
1. Enter system view.
system-view
2. Creating a VLAN for members and assign access ports on the members to the VLAN.
smartmc vlan vlan-id { group group-name-list | tc tc-id-list }
Deploying a batch file to members
About this task
Perform this task to distribute the configurations from a specified configuration file to multiple member devices at once, in order to reduce the workload of configuring each device individually.
Restrictions and guidelines
Make sure the configuration file does not contain the undo smartmc enable and undo telnet server enable commands as these two commands might cause the configuration link to disconnect, leading to the failure of the remaining configuration distribution.
To facilitate user access to this function, use .cmdset or .cfg as the suffix for the batch file name.
Procedure
1. Execute the following command in user view to create a batch file and edit the command lines to be deployed to members.
create batch-file cmd-filename
Each command occupies a line in the batch file. When you finish editing, enter a percent sign (%) to return to user view.
Make sure the command lines that you enter are correct because the system does not verify whether the command lines are correct.
2. Enter system view.
system-view
3. Deploy the batch file to a list of members or SmartMC groups.
smartmc batch-file cmd-filename deploy { group group-name-list | tc tc-id-list }
Configuring a batch file for ports connecting APs or IP phones
Restrictions and guidelines
All commands in the batch file must be commands used in interface view.
The size of the batch file cannot exceed 8190 characters.
Make sure the file name is correct when specifying the batch file because the system does not verify whether the file name is correct. After specifying the batch file, do not delete the file or rename the file.
To facilitate user access to this function, use .cmdset or .cfg as the suffix for the batch file name.
Procedure
1. Execute the following command in user view to create a batch file and edit the command lines to be deployed to members.
create batch-file cmd-filename
Each command occupies a line in the batch file. When you finish editing, enter a percent sign (%) to return to user view.
Make sure the command lines that you enter are correct because the system does not verify whether the command lines are correct.
2. Enter system view.
system-view
3. Specify the batch file for ports connecting APs or IP phones.
smartmc batch-file batch-file-name apply { ap | phone }
4. (Optional.) Disable batch file deployment.
undo smartmc batch-file-apply enable
By default, batch file deployment is enabled.
Backing up configuration files
About this task
Perform this task to back up the configuration file of the commander or the specified members. Configuration files automatically backed up to the file server are named in the format of device_bridge_MAC_address_backup.cfg.
Restrictions and guidelines
When you change the commander in the SmartMC network, make sure the backup configuration file of the original commander on the file server is deleted. If the file still exists, the new commander might download the file and run the settings. This will cause a conflict in the network.
The maximum number of members that can perform automatic configuration at the same time is limited by the performance of the file server. If automatic configuration backup fails, set the maximum number of members to a smaller value.
Prerequisites
Before performing this task, you must specify a file server (see "Specifying a file server").
Procedure
1. Enter system view.
system-view
2. Set the maximum number of members that can perform configuration file backup at the same time.
smartmc backup configuration max-number max-number
By default, a maximum of five members can perform automatic configuration backup at the same time.
3. Back up configuration files.
Choose one option as needed:
¡ Enable automatic configuration file backup and set the backup interval.
smartmc backup startup-configuration interval interval-time
By default, automatic configuration file backup is disabled.
¡ Manually back up the configuration file on the commander or the specified members.
smartmc backup configuration { group group-name-list | tc [ tc-id-list ] }
TC ID 0 represents the commander.
Configuring resource monitoring
Restrictions and guidelines
Enable and disable this feature as needed. Enabling resource monitoring when the number of online members reaches a certain threshold may cause the commander's CPU to become busy and memory space to be insufficient.
Procedure
1. Enter system view.
system-view
2. Set the interval for the commander to obtain resource monitoring information.
smartmc resource-monitor interval interval
The default setting is 1 minute.
3. Set the aging time for resource monitoring information.
smartmc resource-monitor max-age max-age
The default setting is 24 hours.
4. Enable resource monitoring.
smartmc resource-monitor [ cpu | memory | packet-drop | temperature ] * [ group group-name-list | tc { tc-id-list | mac-address mac-address } | tm ]
By default, resource monitoring is disabled.
If you do not specify a resource type, this command enables resource monitoring for all resource types.
If you do not specify a device to monitor (member or commander), this command enables resource monitoring on the commander and all members.
Upgrading the startup software and configuration file on members
About upgrading the startup software and configuration file on members
You can use the following methods to upgrade the startup software and configuration file on members:
· Schedule an upgrade by specifying an upgrade time or upgrade delay.
· Upgrade immediately by not specifying an upgrade time or upgrade delay.
Restrictions and guidelines for startup software and configuration file upgrade
A member can perform only one upgrade task at a time.
An immediate upgrade cannot be cancelled. If you specify a delay time or upgrade time to perform a scheduled upgrade, the upgrade operation can be cancelled by using the undo smartmc upgrade command before it starts.
Prerequisites
Before performing this task, you must specify a file server (see "Specifying a file server").
Upgrading the startup software and configuration file on members
Upgrading the startup software and configuration file in one step
1. Enter system view.
system-view
2. Upgrade the startup software on members in one step.
smartmc upgrade boot-loader tc { tc-id-list { boot boot-filename system system-filename | file ipe-filename } }&<1-40> [ delay delay-time | time in-time ]
CAUTION: Upgrading the startup software might interrupt services. Before upgrading the startup software, make sure no services will be interrupted. |
3. Upgrade the configuration file on members in one step.
smartmc upgrade startup-configuration tc { tc-id-list cfg-filename }&<1-40> [ delay delay-time | time in-time ]
CAUTION: After you update the configuration file, the configuration in the new configuration file will become the running configuration. Before upgrading the configuration file, make sure the contents of the new configuration file are correct. |
Configuring startup software and configuration file upgrade step by step
1. Enter system view.
system-view
2. Configure startup software upgrade for members step by step:
a. Specify the upgrade startup software files.
smartmc tc tc-id boot-loader { ipe-filename | boot boot-filename system system-filename }
b. Upgrade the startup software on members.
smartmc upgrade boot-loader tc tc-id-list
CAUTION: Upgrading the startup software might interrupt services. Before upgrading the startup software, make sure no services will be interrupted. |
3. Configure configuration file upgrade for members step by step:
a. Specify the upgrade configuration file.
smartmc tc tc-id startup-configuration cfg-filename
b. Upgrade the configuration file on members.
smartmc upgrade startup-configuration tc tc-id-list
CAUTION: After you update the configuration file, the configuration in the new configuration file will become the running configuration. Before upgrading the configuration file, make sure the contents of the new configuration file are correct. |
Upgrading the startup software and configuration file on all members in SmartMC groups
Upgrading the startup software and configuration file in one step
1. Enter system view.
system-view
2. Upgrade the startup software on all members in SmartMC groups in one step.
smartmc upgrade boot-loader group { group-name-list [ boot boot-filename system system-filename | file ipe-filename ] }&<1-40> [ delay minutes | time in-time ]
CAUTION: Upgrading the startup software might interrupt services. Before upgrading the startup software, make sure no services will be interrupted. |
3. Upgrade the configuration file on all members in SmartMC groups in one step.
smartmc upgrade startup-configuration group { group-name-list file cfg-filename }&<1-40> [ delay minutes | time in-time ]
CAUTION: After you update the configuration file, the configuration in the new configuration file will become the running configuration. Before upgrading the configuration file, make sure the contents of the new configuration file are correct. |
Configuring startup software and configuration file upgrade step by step
1. Enter system view.
system-view
2. Enter SmartMC group view.
smartmc group group-name
3. Specify the upgrade startup software files for the SmartMC group.
boot-loader file { ipe-filename | boot boot-filename system system-filename }
By default, no upgrade startup software files are specified for a SmartMC group.
4. Specify the upgrade configuration file for the SmartMC group.
startup-configuration cfgfile
By default, no upgrade configuration file is specified for a SmartMC group.
5. Return to system view.
quit
6. Upgrade the startup software and configuration file on all members in the SmartMC group.
Choose one option as needed:
¡ Upgrade the startup software.
smartmc upgrade boot-loader group group-name-list [ delay minutes | time in-time ]
CAUTION: Upgrading the startup software might interrupt services. Before upgrading the startup software, make sure no services will be interrupted. |
¡ Upgrade the configuration file.
smartmc upgrade startup-configuration group group-name-list [ delay minutes | time in-time ]
CAUTION: After you update the configuration file, the configuration in the new configuration file will become the running configuration. Before upgrading the configuration file, make sure the contents of the new configuration file are correct. |
Managing the network topology
Refreshing the network topology
About this task
You can use the following methods to refresh the network topology:
· Automatic topology refresh—Specify the refresh interval to allow the commander to refresh the network topology periodically.
· Manual topology refresh—Execute the smartmc topology-refresh command to manually refresh the network topology.
Restrictions and guidelines
The topology refresh time depends on the number of members in the network.
When the number of online members in the network is greater than 64, the commander calculates the refresh interval of the network topology based on the number of online members. The calculation formula is (N+64)/64 multiplied by the set refresh interval, where N represents the number of online members.
Procedure
Choose one option as needed:
· Manually refresh the network topology in any view.
smartmc topology-refresh
· Configure automatic network topology refresh.
a. Enter system view.
system-view
b. Set the automatic topology refresh interval.
smartmc topology-refresh interval interval
By default, the automatic topology refresh interval is 60 seconds.
Saving the network topology
About this task
This task allows you to save the current network topology to the topology.dba file in the flash memory. After the commander reboots, it uses the topology.dba file to restore the network topology.
Procedure
1. Enter system view.
system-view
2. Save the network topology.
smartmc topology-save
Replacing faulty members
Restrictions and guidelines
Make sure the new member for replacement and the faulty member have the same neighbor relationship and device model.
Make sure the new member has a different member ID than all the members in the SmartMC network, including offline members. Faulty members are considered offline.
To automatically replace a faulty member, first enable automatic replacement, and then install the new member at the location where the faulty member was installed and connect all cables.
To manually replace a faulty member, first install the new member at the location where the faulty member was installed, connect all cables, and then execute the manual replacement command.
Prerequisites
Before you replace a faulty member, specify a file server (see "Specifying a file server").
Procedure
1. Enter system view.
system-view
2. Replace faulty members.
Choose one option as needed:
¡ Enable automatic faulty member replacement.
smartmc auto-replace enable
By default, automatic faulty member replacement is disabled.
¡ Manually replace a faulty member.
smartmc replace tc tc-id1 faulty-tc tc-id2
Display and maintenance commands for SmartMC
Execute display commands in any view.
Task |
Command |
Display the backup status on members. |
display smartmc backup configuration status |
Display the batch file execution results. |
display smartmc batch-file status [ ap | last number | phone ] |
Display SmartMC configuration. |
display smartmc configuration |
Display connections between the devices in the SmartMC network. |
display smartmc device-link |
Display SmartMC group information. |
display smartmc group [ group-name ] [ verbose ] |
Display the faulty member replacement status. |
display smartmc replace status |
Display resource monitoring information. |
display smartmc resource-monitor [ cpu | memory | temperature ] * [ tc tc-id | tm ] |
Display resource monitoring configuration. |
display smartmc resource-monitor configuration |
Display member information. |
display smartmc tc [ tc-id ] [ verbose ] |
Display log information in the log buffer on a member. |
display smartmc tc tc-id log buffer [ module module-name [ mnemonic mnemonic-value ] ] |
Display restart log information for a member. |
display smartmc tc tc-id log restart |
Display VLAN creation results for members. |
display smartmc vlan |
Display member upgrade status. |
display smartmc upgrade status |
SmartMC configuration examples
Example: Configuring SmartMC
Network configuration
As shown in Figure 3, member 1, member 2, and member 3 belong to the same device type: S5130S-EI-G&S5100-D-G&S5500-D-G series. The IP address of the file server is 192.168.2.1. The username and password for accessing the file server are admin and hello12345, respectively.
Perform the following tasks to establish a SmartMC network and upgrade the configuration file on the members:
1. Configure the commander and members to automatically establish a SmartMC network.
2. Configure interface GigabitEthernet 1/0/1 as the outgoing interface for the SmartMC network.
3. Create a SmartMC group and add the members to the group.
4. Upgrade the configuration file on all members in the SmartMC group.
5. Save configuration file startup.cfg on the file server.
Procedure
1. Configure TC 1:
# Configure VLAN-interface 1.
<TC1> system-view
[TC1] interface vlan-interface 1
[TC1-Vlan-interface1] ip address 192.168.2.3 24
[TC1-Vlan-interface1] quit
# Enable HTTP and HTTPS.
[TC1] ip http enable
[TC1] ip https enable
# Enable the Telnet service.
[TC1] telnet server enable
# Enable NETCONF over SOAP over HTTP.
[TC1] netconf soap http enable
# Enable NETCONF over SSH.
[TC1] netconf ssh server enable
# Enable LLDP globally.
[TC1] lldp global enable
# Create a user.
[TC1] local-user admin
# Lower password complexity requirements. For more information about these commands, see password control commands in Security Command Reference.
[TC1-luser-manage-admin] password-control length 4
[TC1-luser-manage-admin] password-control composition type-number 1 type-length 1
[TC1-luser-manage-admin] undo password-control complexity user-name check
# Set the username and password to admin, add the telnet, http, and https service types, and authorize the user to use the network-admin user role.
[TC1-luser-manage-admin] password simple admin
[TC1-luser-manage-admin] service-type telnet http https ssh
[TC1-luser-manage-admin] authorization-attribute user-role network-admin
[TC1-luser-manage-admin] quit
# Set the system to support public key authentication for the administrator to login through SSH. The public key name must be -smartmc-publickey-.
[TC1] ssh user admin service-type netconf authentication-type publickey assign publickey -smartmc-publickey-
# Set scheme authentication for VTY user lines 0 to 63.
[TC1] line vty 0 63
[TC1-line-vty0-63] authentication-mode scheme
[TC1-line-vty0-63] quit
# Enable SmartMC and set the device role to tc.
[TC1] smartmc tc enable
2. Configure TC 2 and TC 3 in the same way TC 1 is configured. (Details not shown.)
3. Configure the TM:
# Configure GigabitEthernet 1/0/1.
<TM> system-view
[TM] interface gigabitethernet 1/0/1
[TM-GigabitEthernet1/0/1] port link-mode route
[TM-GigabitEthernet1/0/1] ip address 192.168.52.2 24
[TM-GigabitEthernet1/0/1] quit
# Configure VLAN-interface 1.
[TM] interface vlan-interface 1
[TM-Vlan-interface1] ip address 192.168.2.2 24
[TM-Vlan-interface1] quit
# Enable HTTP and HTTPS.
[TM] ip http enable
[TM] ip https enable
# Enable the Telnet service.
[TM] telnet server enable
# Enable NETCONF over SOAP over HTTP.
[TM] netconf soap http enable
# Enable NETCONF over SSH.
[TM] netconf ssh server enable
# Enable LLDP globally.
[TM] lldp global enable
# Create a user. Set the username to admin and the password to hello12345, add the telnet, http, and https service types, and authorize the user to use the network-admin user role.
[TM] local-user admin
[TM-luser-manage-admin] password simple hello12345
[TM-luser-manage-admin] service-type telnet http https ssh
[TM-luser-manage-admin] authorization-attribute user-role network-admin
[TM-luser-manage-admin] quit
# Set scheme authentication for VTY user lines 0 to 63.
[TM] line vty 0 63
[TM-line-vty0-63] authentication-mode scheme
[TM-line-vty0-63] quit
# Enable SmartMC, set the device role to commander, and set the username to admin and the password (plaintext) to hello12345.
[TM] smartmc tm username admin password simple hello12345 enable
# Specify GigabitEthernet 1/0/1 as the outgoing interface.
[TM] interface gigabitethernet 1/0/1
[TM-GigabitEthernet1/0/1] smartmc outbound
[TM-GigabitEthernet1/0/1] quit
# Set the file server IP address, username, and plaintext password to 192.168.2.1, admin, and hello12345, respectively.
[TM] smartmc ftp-server 192.168.2.1 username admin password simple hello12345
# Create SmartMC group S1 and enter its view.
[TM] smartmc group S1
# Create an IP address match criterion to add all members in the specified network segment to SmartMC group S1.
[TM-smartmc-group-S1] match ip-address 192.168.2.0 24
# Specify the upgrade configuration file startup.cfg for SmartMC group S1.
[TM-smartmc-group-S1] startup-configuration startup.cfg
[TM-smartmc-group-S1] quit
# Upgrade the configuration file on all members in SmartMC group S1.
[TM] smartmc upgrade startup-configuration group S1 file startup.cfg
Verifying the configuration
# Display brief information about all members after the SmartMC network is established.
[TM] display smartmc tc
TCID DeviceType Sysname IpAddress MacAddress Status Version
1 S5130S-EI-G TC1 192.168.2.3 201c-e7c3-0300 Normal COMWAREV700R001
2 S5130S-EI-G TC2 192.168.2.4 201c-e7c3-0301 Normal COMWAREV700R001
3 S5130S-EI-G TC3 192.168.2.5 201c-e7c3-0302 Normal COMWAREV700R001
# Display the configuration file upgrade status on the members.
[TM] display smartmc upgrade status
ID IpAddress MacAddress Status UpdateTime UpdateFile
1 192.168.2.3 201c-e7c3-0300 Finished Immediately startup.cfg
2 192.168.2.4 201c-e7c3-0301 Finished Immediately startup.cfg
3 192.168.2.5 201c-e7c3-0302 Finished Immediately startup.cfg
Configuring self-mesh SmartMC (SmartMC 2.0)
About self-mesh SmartMC
Self-mesh SmartMC is a technology where devices automatically form a network. In a self-mesh SmartMC scenario, devices are enabled with SmartMC by default. Through automatic elections, the TM and TCs are determined. The TM manages TCs.
Benefits of self-mesh SmartMC
Self-mesh SmartMC has the following advantages:
· Simplifies network setup by supporting device plug-and-play. By using factory default settings, self-mesh SmartMC initializes configurations from the Web interface and then allows devices to automatically form a SmartMC network.
· Simplifies network maintenance by enabling centralized management and maintenance of many network devices through simple web-based operations on the SmartMC network management platform. This effectively solves operational problems in small and medium-sized campus networks.
Self-mesh SmartMC application scenarios
Self-mesh SmartMC is typically used for plug-and-play and zero-configuration startup of LAN devices. The application scenarios of self-mesh SmartMC are divided into the following main categories: Pure wired self-mesh SmartMC and unified wired and wireless self-mesh SmartMC.
Scenario one: Pure wired self-mesh SmartMC
As shown in Figure 4, the network contains switches, routers, and security devices. Self-mesh SmartMC can be used to achieve the following if all of the devices support self-mesh SmartMC:
· The network administrator configures the role of the core switch as TM. The other switches are defined as TCs through manual configuration or in the factory configuration file.
· The router and the firewall automatically become TCs.
Figure 4 Pure wired self-mesh SmartMC (switch acting as the TM)
Scenario two: Unified wired and wireless self-mesh SmartMC
As shown in Figure 5, the network contains switches, a router, a security device, a wireless AC, and APs. Assuming that all the devices support self-mesh SmartMC, configure the feature to achieve the following:
· The wireless AC is automatically elected as the TM.
· The switches are defined as TCs through manual configuration or in the factory configuration file.
· The router, the firewall, and the APs automatically become TCs.
· The network administrator manages and maintains the switches, the router, the firewall, and the APs centrally through the wireless AC.
Figure 5 Unified wired and wireless self-mesh SmartMC (AC acting as the TM)
As shown in Figure 6, the network contains switches and APs. Assuming that all the devices support self-mesh SmartMC, configure the feature to achieve the following:
· The AP automatically becomes the TM through TM election.
· The switches are defined as TCs through manual configuration or in the factory configuration file.
· The network administrator manages and maintains other APs and the switches centrally through the AP.
Figure 6 Unified wired and wireless self-mesh SmartMC (AP acting as the TM)
Basic concepts of self-mesh SmartMC
SmartMC device roles
In a self-mesh SmartMC network, devices support two roles:
· Topology master (TM): Manages all devices in the SmartMC network.
In a SmartMC network, the TM can be automatically selected through role election or designated through the smartmc enable auto tm command. When you execute the command, make sure that only one TM can be designated in a SmartMC network. If the current TM fails, a new TM will be automatically selected through role election by TCs.
To make a switch in the network act as the TM, execute the smartmc enable auto tm command on the switch.
· Topology client (TC): Devices managed within the SmartMC network.
¡ For wireless devices, routers, and security devices automatically elected as TCs, their role is displayed as TC(auto) in the output from the display smartmc configuration command.
CAUTION: To avoid disrupting SmartMC functionality, do not use the smartmc { tc | tm username username password { cipher | simple } string } enable command to manually designate devices in self-mesh mode by default as TM or TC. |
SmartMC network management platform (UWEB management platform)
The SmartMC network management platform is a web-based interface provided by devices, allowing for centralized management and maintenance of numerous network devices. It effectively addresses operational issues in small to medium-sized networks.
To distinguish it from the non-self-mesh SmartMC network management platform, the self-mesh SmartMC network management platform is also referred to as the UWEB management system. The UWEB management system is a lightweight Web management platform that employs SmartMC technology to centrally manage and maintain a large number of dispersed network edge devices. These network devices can automatically elect a TM and form a SmartMC network as long as they can communicate with each other with Layer 2 packets and VLAN 1 packets and the SmartMC feature is enabled.
The UWEB management system operates on the TM and provides the following functions:
· Initialization—Configures the project name, network-wide password, Internet parameters, Wi-Fi settings, and time zone for the SmartMC network.
· Network Configuration—Includes WAN and wired configuration. WAN configuration allows Internet parameter modifications, and wired configuration allows service VLAN setup.
· Device Management—Includes adding devices, removing offline devices, rebooting devices, upgrading devices, resetting devices, viewing device details, configuring device interfaces, creating VLANs, editing VLANs, and deleting VLANs.
· Terminal Management—Allows viewing and management of wired and wireless users.
· System Management—Includes upgrading, rebooting, and modifying the network-wide password.
By using the functions mentioned above, you can achieve the following goals:
· Manage the SmartMC network topology.
· Manage member devices in batches.
In the self-mesh SmartMC section, the UWEB management system is used to refer to the SmartMC network management platform.
SmartMC deployment
Devices support plug-and-play and can discover each other through SmartMC Layer 2 packets. To identify the role of a device and view TM information, execute the display smartmc configuration command on the device. However, you cannot view TC information by executing the display smartmc tc command at this point.
Then, log in to the TM. Open a browser and enter quicknet.h3c.com in the address bar to access the UWEB management system, and then follow the instructions to set up the SmartMC network.
During the setup, you can view the network status and configure the network-wide password, Wi-Fi parameters, and time zone. The configurations are distributed to and take effect on all member devices in the SmartMC network.
The TM performs the following operations:
1. Generate a NetID for the current SmartMC network.
2. Require the logged-in administrator to set a management password (the SmartMC network-wide password) and synchronize this password along with the NetID to all member devices in the SmartMC network.
3. Set the devices with the network-wide password and NetID to the deployed state.
The deployment state of a device is a factor that affects TM election in the SmartMC network.
SmartMC network-wide password
After establishing Layer 2 connections in the SmartMC network, the SmartMC module on the TM must establish Layer 3 communication channels with the NETCONF module on the TM and each TC to synchronize configurations and manage devices.
To ensure secure communication, a username and password are required for identity authentication between member devices during Layer 3 communication channel establishment. Devices are factory-set with default usernames and passwords. For both security and convenience purposes, SmartMC supports changing the Layer 3 communication channel password using the network-wide password function. When the TM changes the SmartMC network-wide password, it syncs with all member devices (including the TM and TCs), and all devices use the new password to establish new Layer 3 communication channels.
You can configure the SmartMC network-wide password when setting up the network from the UWEB management system. During TM operation, you can modify the password from the UWEB management system or from the CLI of the TM.
SmartMC NetID
NetID is the identifier of a SmartMC network in the SmartMC system, and one SmartMC network corresponds to only one NetID.
To adapt to various networking applications, multiple SmartMC networks can be deployed in the same network, and NetID is used to distinguish between different SmartMC networks. One device can only join one SmartMC network. As shown in Figure 7, the TM broadcasts SmartMC protocol packets to discover TCs in the respective SmartMC network. To avoid interference between SmartMC protocol packets of two SmartMC networks, SmartMC uses NetID to distinguish between different SmartMC networks. When a member device in a SmartMC network receives a SmartMC packet with a different NetID, it directly discards it.
NetID is automatically generated by the SmartMC module when the network administrator sets up the network from the UWEB management system.
Figure 7 Multi-SmartMC network diagram
Role selection in self-mesh SmartMC
CAUTION: · If a device is specified as TM by the smartmc enable auto enable command, the device role is fixed as TM, and the other devices act as TCs. Role election is not performed. · Devices manually set as TCs by using the smartmc tc enable command will not participate in role election. · Devices manually set as TMs by using the smartmc tm enable command are not allowed to join the self-mesh SmartMC network. |
For devices that support self-mesh SmartMC, the role is not determined at the factory, and the TM is automatically elected through role election. The self-mesh SmartMC network conducts role election in the following situations:
· The devices are first interconnected, which triggers self-mesh SmartMC network formation.
· The TM leaves the network or malfunctions.
· The self-mesh SmartMC network splits.
· Two (or more) independent self-mesh SmartMC networks merge into one.
The following priority order is used to select the TM in the role election:
1. Devices with higher SmartMC election priority are selected first.
The priority of a device is carried by the factory parameters of the device, which is determined by the product according to the device model, the network location of the device, and other information. It cannot be modified by command line. For example, the priority of ACs is higher than that of switches and APs. If an AC, switches, and APs coexist in the network, AC will be selected as the TM first. The current SmartMC election priority of the device from high to low is: AC, router, security device, AP.
¡ If none of the devices participating in the role election have finished startup deployment, the device with higher SmartMC priority will be selected as the TM.
¡ If the SmartMC network has finished startup deployment and a new device with a higher priority than the TM joins, the new device synchronizes the global configuration of the current TM and runs as the TM. The new TM notifies the original TM to change to TC. If the SmartMC election priority of the new device is equal to or lower than that of the current TM, the role of the current TM remains unchanged, and the new device joins as a TC.
2. Devices in the startup state are given priority.
If the election priority is the same, and some devices have started while others have not, devices that have started will be selected as the TM first.
3. The TM in the SmartMC network with more member devices is given priority.
When two SmartMC networks merge, the two SmartMC networks compete for the TM. The SmartMC network with more member devices wins the election, and the TM in the winning SmartMC network becomes the TM for the entire merged SmartMC network. All member devices in the losing SmartMC network run as TC and synchronize the global configuration of the new TM.
4. Devices with higher health scores are given priority.
5. Devices with smaller bridge MAC addresses are given priority.
Devices running in self-mesh mode broadcast SmartMC election packets at Layer 2 and follow the above rules for judging from the first rule. If a rule matches multiple devices, the next rule will be used until a unique optimal member device is found. The unique optimal member device becomes the TM, and the other member devices become TCs.
Self-mesh SmartMC network establishment and changing
Self-mesh SmartMC network establishment
The process of establishing a self-mesh SmartMC network is as follows:
1. After a device starts up, it enters the automatic election process with the TC (auto) role and broadcasts SmartMC election packets at intervals of 5 seconds. The packet includes the device's bridge MAC, NetID, SmartMC election priority, network size (number of member devices in the current SmartMC network), and the IP address of VLAN-interface 1.
2. After the automatic election, one TM is elected and other devices become TCs.
¡ If the device receives an election packet from other devices within 20 seconds, it compares its local parameters and the received SmartMC election packet according to the election rules. If the received packet is more optimal, the device switches to TC. If the device is more optimal, it continues to send SmartMC election packets to participate in the role election.
¡ If the device does not receive any election packets from other devices within 20 seconds, it switches to TM.
3. The TM broadcasts SmartMC discovery packets at intervals of 5 seconds to announce its TM identity.
4. Each TC records the device information of the TM and sends a SmartMC discovery ACK packet back to TM. At this time, you can use the display smartmc configuration command on the device to display the configured information of SmartMC.
5. The administrator connects to the TM and visit https://quicknet.h3c.com to access the UWEB management system to set up the SmartMC network. The UWEB management system automatically distributes LLDP, NETCONF, and local user configurations to member devices.
6. After receiving the TC's SmartMC discovery ACK packet, the TM uses the default username (admin) and password to establish a NETCONF connection with each member device, and obtains detailed information (such as port information, LLDP neighbor information, STP information, device type, and software version) through this connection. The default password for APs is h3capadmin, and the default password for other types of devices is admin.
7. A TC sends a SmartMC unicast login request packet to the TM. The packet includes the device's bridge MAC and the IP address of VLAN-interface 1.
8. After receiving the TC's login request packet, the TM replies with a login confirmation packet and adds the TC to the SmartMC network. At this point, the TC completes the online process. You can use the display smartmc tc command on the TM to view information about all TCs.
9. The TM forms the SmartMC network topology by using NETCONF connections to obtain its own and TCs' LLDP neighbor information. At this time, you can view the SmartMC network topology diagram on the UWEB management system, or use the display smartmc device-link command to display the connection information between devices in the SmartMC network.
10. The administrator selects the networking method, sets the administrator password (SmartMC network-wide password), and configures the Internet access parameters as instructed. Then, SmartMC network deployment is completed.
11. The TM synchronizes the network-wide password to itself and all TCs, and establishes a NETCONF connection with each device using the default username and network-wide password.
New device joining
The mechanism for automatically electing TM when a new device joins is as follows:
1. After the SmartMC network is established, the TM broadcasts SmartMC discovery packets every 5 seconds, inquiring if there are member devices in the network.
2. When a new device is connected and powered on:
¡ If the device is a switch and has already been configured as the TM or a TC by the factory, it directly joins the SmartMC network as the TM or a TC.
¡ If the device is a non-switch device, the device's SmartMC function is enabled by default and it operates in self-mesh mode. The device enters the role election state and, according to the election rules, decides whether to run as TM or TC.
Member device leaving
After the SmartMC network is successfully established, the TM and TCs perceive each other's existence through SmartMC broadcast packets and response packets:
· After the TM leaves, a TC will enter the role election state if it fails to receive TM's SmartMC discovery packets within 20 seconds. TCs will then re-elect an TM according to the role election rules.
· After a TC leaves, the TM considers a TC as offline if it fails to receive any SmartMC discovery ACK packet from the TC within 20 seconds.
Self-mesh SmartMC splitting
If link failures occur between member devices in a self-mesh SmartMC network, TCs and TM may fail to reach each other, causing the SmartMC network to split into multiple SmartMC networks. After the splitting, one SmartMC network contains the original TM, while other SmartMC networks do not have a TM.
During the splitting, the SmartMC software module handles the situation as follows:
· For the SmartMC network that contains the original TM, the SmartMC network continues to operate normally, and the departing member devices become offline.
· For the other SmartMC networks, if some devices work in self-mesh mode, they consider the TM as faulty and trigger role election after 20 seconds without receiving any SmartMC broadcast discovery packets from the TM.
As shown in Figure 8, the roles of TM, TC 1, and TC 3 in the self-mesh SmartMC network are generated through election, and the role of TC 2 is manually specified. Assuming that this self-mesh SmartMC network has been established with a NetID of 1, the following scenarios might occur:
· When the link fails between TC 2 and the TM, TC 2 leaves the self-mesh SmartMC network, but its role remains as TC and its NetID remains as 1.
· When the link fails between TC3 and the TM, TC 3 leaves the self-mesh SmartMC network. After 20 seconds without receiving any SmartMC broadcast discovery packets from the TM, TC 3 re-elects itself as TM with a NetID of 1.
Figure 8 Self-mesh SmartMC splitting
Self-mesh SmartMC merging
The process of multiple stable SmartMC networks interconnecting to form a self-mesh SmartMC network is called self-mesh SmartMC merging.
The following rules are followed during the self-mesh SmartMC merging:
· For SmartMC networks that have already been established, only SmartMC networks with the same NetID can be merged. SmartMC networks with different NetIDs cannot be merged. To make a device with a different NetID join the SmartMC network, restore the device to factory settings or disable and then enable the SmartMC feature on the device, which will delete the NetID.
· Established SmartMC networks can be merged with non-established SmartMC networks.
· When merging, the two SmartMC networks will compete for the TM role. For more information about the TM election rules, see "Role selection in self-mesh SmartMC."
As shown in Figure 9, three SmartMC networks exist in the current network. SmartMC network 1 and SmartMC network 3 have the same NetID, and SmartMC network 2 has a different NetID. When the link failure is recovered, the SmartMC networks will try to merge, as follows:
· SmartMC network 1 has two member devices, which is greater than the number of member devices in SmartMC network 2. Therefore, SmartMC network 1 wins the election and its TM will become the TM of the merged SmartMC network.
· The NetID of SmartMC network 2 is different from that of the other SmartMC networks, so it cannot be merged with any of the other SmartMC networks.
Figure 9 Self-mesh SmartMC merging
Self-mesh SmartMC configuration management
After member devices use Layer 2 connections to build the SmartMC network, the TM automatically establishes a NETCONF session with each TC using VLAN-interface 1. The TM uses the NETCONF sessions to distribute configurations to the TCs and obtain the values of some parameters on the TCs in order to manage and maintain the SmartMC network.
SmartMC supports the following configuration methods:
· Global configuration
Administrators can configure settings on the UWEB management system's web page or from the TM's CLI. These configurations are distributed to and take effect on all member devices. Global synchronized configurations include wireless settings, wired settings, Internet settings, SmartMC network-wide password, and FTP server settings.
· Batch configuration
Administrators can configure multiple devices by selecting them on the UWEB management system's web page. These configurations are distributed to and take effect on the selected member devices. Batch synchronization operations include batch reboot and factory reset.
· Single device configuration
In addition to SmartMC global configuration and batch configuration, administrators can configure parameters for a single member device in the following methods:
¡ Configure the settings for the specified device on the web page. These configurations will be distributed to and take effect on that device.
¡ For configurations not supported by the web page, such as disabling/enabling interfaces or adding interfaces to VLANs, administrators must log in to the member device and use the CLI to configure the settings. To log in to a member device, use either of the following methods:
- Use the eWEB or CLI feature in the UWEB management system to access the local Web interface or CLI.
- Use the device IP address to log in to the local Web interface or CLI.
Time synchronization (NTP) for self-mesh SmartMC
After the SmartMC network is deployed, the TM synchronizes the time to all TCs using Network Time Protocol (NTP). The time synchronization precision of NTP is in milliseconds, which can meet the time synchronization requirements of general computer networks. For more information about NTP, see "Configuring NTP."
SmartMC synchronizes time settings across the network as follows:
1. When the SmartMC network is deployed, the TM automatically deletes the existing NTP configuration on the device and generates a new NTP configuration specific to the SmartMC network.
2. The TM acts as an NTP client and synchronizes time with external NTP servers.
The device supports a default of five external NTP servers. When the device receives clock signals from multiple default NTP servers, it selects the optimal clock signal for synchronization. The addresses of the default clock servers are as follows:
¡ registry.h3c.com (H3C time server)
¡ s2f.time.edu.cn (Northeast network center)
¡ cn.pool.ntp.org (NTP project domestic time server)
¡ 1.cn.pool.ntp.org (NTP project domestic time server)
¡ asia.pool.ntp.cn (NTP project Asian time server)
3. If all the five external NTP servers are unavailable, the TM modifies the level of the local clock to 6 and uses the local clock as the clock source for the SmartMC network.
4. The TM acts as an NTP server, and TCs act as NTP clients and synchronize time with the TM.
Figure 10 Time synchronization (NTP) for self-mesh SmartMC
Auto-switching of the DHCP server in SmartMC self-mesh networking
The auto-switching function of the DHCP server refers to the device automatically enabling or disabling its own DHCP server function based on networking needs:
· If the device detects an existing DHCP server in the current network, it automatically disables its own DHCP server function.
· If the device does not detect a DHCP server in the current network, it automatically enables its own DHCP server function.
Both AC and firewall devices support the DHCP server auto-switching function. When both AC and firewall are present in the network, only the DHCP server auto-switching function on the TM is active, and the auto-switching and DHCP server functions are disabled on TCs. The auto-switching function ensures that only one DHCP server exists in the self-mesh SmartMC network at any given time.
To support the self-mesh SmartMC function, the DHCP server function is enabled on VLAN-interface 1 on the AC that supports self-mesh SmartMC, firewall, and router devices by default. This setup allows VLAN interface 1 to assign IP addresses to VLAN-interface 1 of the connected switches and APs when only AC, firewall, or router devices are present in the network. This enables these devices to automatically form a SmartMC network using factory settings, as shown in Figure 11.
Figure 11 Using the AC as the DHCP server when no firewall or router exists in the network
However, when the network contains two or more types of devices (ACs, firewalls, and routers), multiple DHCP servers might be present, which might cause IP address conflicts and prevent the devices from automatically form a SmartMC network. To ensure that only one DHCP server is operational at any given time in the self-mesh SmartMC network, SmartMC stipulates:
· For an operational self-mesh SmartMC network, the gateway specified at the start acts as the DHCP server. The DHCP server function must be disabled on the AC and firewall devices in the network and the auto-switching function of the DHCP server must also be disabled.
· For an undeployed self-mesh network:
¡ If a router is deployed (only one router is allowed) and the router acts as the DHCP server, the router does not support auto-switching of the DHCP server.
Figure 12 Using the router as the DHCP server
¡ The AC and firewall devices acting as TCs must be disabled with the DHCP server function and the auto-switching function of the DHCP server.
¡ The AC or firewall device acting as the TM must be enabled with the auto-switching function of the DHCP server. The TM will continuously detect if a DHCP server exists in the network.
- If a DHCP server is detected, the TM disables the DHCP server function.
- If no DHCP server is detected, the TM enables the DHCP server function and resets the IP addresses of VLAN-interface 1 on all TCs. The TCs re-obtain IP addresses for VLAN-interface 1 assigned by the new DHCP server.
This ensures that only one operating DHCP server exists in the network before the SmartMC network is deployed.
Figure 13 Using the TM as the DHCP server when no router exists in the network
UWEB management system login with a fixed domain name
In a self-mesh SmartMC network, use the UWEB management system for managing and configuring the network as a best practice. The platform is a web-based interface provided by the devices, allowing for easy management and maintenance of numerous network devices, addressing operational issues in small and medium-sized networks.
Typically, accessing the device's web interface requires its IP address or domain name. If you use a domain name, a DNS server must be deployed in the network and the domain-to-IP mapping must be configured. To simplify network deployment and user operations, SmartMC supports accessing the UWEB management system using fixed domain name https://quicknet.h3c.com, even without a DNS server.
The TM automatically establishes a mapping between https://quicknet.h3c.com and the IP address of the TM's VLAN-interface 1 and synchronizes it with all member devices. Users can log into the UWEB management system by connecting to any member device and entering the domain name https://quicknet.h3c.com.
Restrictions and guidelines: Self-mesh SmartMC configuration
SmartMC is supported only on the default MDC.
The device is initially started with factory settings. After administrators initialize the devices on the UWEB management system at https://quicknet.h3c.com, the devices can automatically form a SmartMC network.
Device exchange SmartMC protocol packets and establish/maintain the SmartMC network within VLAN 1. To ensure normal operation of SmartMC, make sure that VLAN 1 packets are allowed to pass through interfaces that connect member devices to each other.
Restrictions: Hardware compatibility with SmartMC
The S5130S-EI-G&S5100-D-G&S5500-D-G series switches can act only as TCs in a SmartMC network, and cannot act as the TM.
Self-mesh SmartMC tasks at a glance
To configure self-mesh SmartMC, perform the following tasks:
2. Setting the network-wide SmartMC password
For security purposes, set the network-wide SmartMC password as a best practice.
3. (Optional.) Setting the FTP server information
Enabling SmartMC
Restrictions and guidelines
In a self-mesh SmartMC network, avoid manually assigning roles of TM or TC to non-switch devices. Doing so will start the non-SmartMC mode, preventing joining into the SmartMC network. For a switch, you must execute smartmc enable auto tm or smartmc tc enable for the switch to join the self-mesh SmartMC network. Switches of this series come with the smartmc tc enable setting.
Make sure only one management device exists in a SmartMC network.
SmartMC requires some ACL resources. Insufficient resources can result in enabling failure of SmartMC. You can use the display acl command to view ACL configuration and running status, and use the undo acl command to delete unused ACLs to release resources. For more information about ACLs, see the ACL and QoS Configuration Guide.
When you enable SmartMC, the device examines if ports 80 and 443 are in use. If they are occupied, SmartMC cannot be enabled because HTTP and HTTPS services require the ports.
When you switch the management device to a member device or disable SmartMC, the system clears SmartMC-related settings in the running configuration.
Specifying the device role as TM
1. Enter system view.
system-view
2. Enable SmartMC and specify the device role as TM.
smartmc enable auto tm
By default, SmartMC is disabled.
Specifying the device role as TC
1. Enter system view.
system-view
2. Enable SmartMC and specify the device role as TC.
smartmc tc enable
By default, SmartMC is enabled.
Setting the network-wide SmartMC password
About this task
To manage and maintain a SmartMC network, the TM establishes a NETCONF channel with each TC by using the local username (admin) and the default password. To increase device security, you can perform this task to change the password used for NETCONF channel establishment. With the network-wide password set on the TM, the TM issues the password to all member devices. The TM and TCs use the password to re-establish NETCONF channels.
Procedure
1. Enter system view.
system-view
2. Set the network-wide SmartMC password.
smartmc password [ cipher ] string
By default, the default password is h3capadmin for APs and admin for devices of other types.
Setting the FTP server information
About this task
In a SmartMC network, an FTP server is used to store the following files:
· Upgrade startup software files and upgrade configuration file for members.
· Backup configuration files of the commander and members.
After you configure FTP server information on the TM, the TM deploys the information to all member devices. This ensures that the FTP configuration remains active when another device takes up the TM role.
Restrictions and guidelines
You can use the following methods to specify an FTP server:
· Use the TM as the FTP server. Make sure the TM has sufficient space to save files required by TCs. For more information about FTP servers, see Fundamentals Configuration Guide.
· Use an independent FTP server. To use an independent FTP server, connect the FTP server to the TM as a best practice. The FTP server uses VLAN 1 to communicate with the SmartMC network. If you connect the FTP server to TCs, creating a VLAN for members will assign member interfaces connecting to the FTP server to the created VLAN, causing FTP server disconnection.
Procedure
1. Enter system view.
system-view
2. Configure FTP server information.
smartmc ftp-server server-address username username password { cipher | simple } string
By default, no FTP server is specified.
Display and maintenance commands for self-mesh SmartMC
Execute display commands in any view.
Task |
Command |
Display SmartMC configuration. |
display smartmc configuration |
Display member device information. |
display smartmc tc [ tc-id ] [ verbose ] |
Display information about inter-device connections in the SmartMC network. |
display smartmc device-link |
Self-mesh SmartMC configuration examples
Example: Configuring self-mesh SmartMC with the switch acting as a TC
Network configuration
As shown in Figure 14, the network contains a gateway, an aggregation switch, access switches, and fat APs. The gateway acts as the DHCP server to assign an IP address to VLAN-interface 1. The IP address of the DHCP server is 192.168.0.1/24 and the allocable address range for address allocation is 192.168.0.0/24 (excluding 192.168.0.1).
Configure self-mesh SmartMC for devices to automatically form a SmartMC network upon starting up and allow users to manage all the network devices through the UWEB management system.
Procedure
1. Power on all devices with the default factory configurations. No additional settings are required.
2. Once devices finish booting up, connect a PC to the TM and enter https://quicknet.h3c.com in the address bar of a browser to log in to the UWEB management system.
Then, set up the SmartMC network as instructed.
Verifying the configuration
Verify that you can view the topology and information about all member devices on the summary page of the UWEB management system.
Example: Configuring self-mesh SmartMC with the switch acting as the TM
Network configuration
As shown in Figure 15, in the wired network, the gateway acts as the DHCP server to assign an IP address to VLAN-interface 1. The IP address of the DHCP server is 192.168.0.1/24 and the allocable address range for address allocation is 192.168.0.0/24 (excluding 192.168.0.1).
Configure self-mesh SmartMC for devices to automatically form a SmartMC network upon starting up and allow users to manage all the network devices through the UWEB management system.
Procedure
1. Configure Device A:
# Enable SmartMC and specify the device role as TM.
<DeviceA> system-view
[DeviceA] smartmc enable auto tm
2. Power on the other switches with the default factory configurations. No additional settings are required.
3. Once devices finish booting up, connect a PC to Device A and enter https://quicknet.h3c.com in the address bar of a browser to log in to the UWEB management system.
Then, set up the SmartMC network as instructed.
Verifying the configuration
Verify that you can view the topology and information about all member devices on the summary page of the UWEB management system.