Tp NMS UG
Tpnms Ug tpNMS_UG tpNMS_UG doc down res static.tp-link.com 3:
2016-08-01
: Tp-Link Tpnms Ug tpNMS_UG doc down_res
Open the PDF directly: View PDF .
Page Count: 123
Download | ![]() |
Open PDF In Browser | View PDF |
tpNMS Network Management System User Manual REV1.0.0 1910011672 Content 1 Quick Start.........................................................................................................................1 1.1 Prepare for Installation............................................................................................................... 2 Computer Requirements..............................................................................................................................2 Compatible Devices.......................................................................................................................................2 Installation Topology.....................................................................................................................................2 1.2 Download and Install tpNMS..................................................................................................... 5 1.3 Log in to the Application............................................................................................................ 5 Launch the tpNMS..........................................................................................................................................5 Fix the Launch Problems..............................................................................................................................6 Log in to tpNMS...............................................................................................................................................9 1.4 Change Your Password and Email.......................................................................................... 11 1.5 Set the Email Server for Alarm Notifications......................................................................... 11 2 Monitor Network........................................................................................................... 13 2.1 Customize the Widgets on the Home Screen....................................................................... 13 2.2 View the Widgets........................................................................................................................ 15 3 Discover and Manage Resources............................................................................... 18 3.1 Discover Devices on Your Network......................................................................................... 18 Schedule a Discovery Job.......................................................................................................................... 18 Manage Discovery Templates................................................................................................................. 23 3.2 View and Manage Devices........................................................................................................ 25 View the Device List.................................................................................................................................... 26 Remove a Device.......................................................................................................................................... 28 Synchronize a Device.................................................................................................................................. 28 Log in to a Device......................................................................................................................................... 29 Ping or Traceroute a Device..................................................................................................................... 30 Reboot a Device............................................................................................................................................ 31 Access Config................................................................................................................................................. 31 3.3 Import Devices............................................................................................................................ 33 3.4 Add Devices into Groups.......................................................................................................... 34 View Groups................................................................................................................................................... 34 Add Devices to Static Group.................................................................................................................... 35 Add Devices to Dynamic Group.............................................................................................................. 36 Delete Groups................................................................................................................................................ 36 3.5 View and Manage Links on Your Network............................................................................ 37 View Links on Your Network.................................................................................................................... 37 Discover Links on Your Network............................................................................................................. 38 Add a Link....................................................................................................................................................... 38 3.6 Manage Maps and Topologies................................................................................................. 39 View the Maps in the Map List................................................................................................................. 40 Add a Map....................................................................................................................................................... 40 Add a Device.................................................................................................................................................. 40 Add a Link....................................................................................................................................................... 41 Delete a Device, Link or Map.................................................................................................................... 42 Refresh the Topology.................................................................................................................................. 42 Auto-Refresh.................................................................................................................................................. 42 4 Monitor Devices and Network.................................................................................... 43 4.1 Monitor the Top 10 Devices..................................................................................................... 44 4.2 Monitor the Top 10 Interfaces................................................................................................. 45 4.3 Specify the Device Monitor...................................................................................................... 48 4.4 Manage and View Dashboard.................................................................................................. 53 Create or Modify a Dashboard View...................................................................................................... 53 Launch a Dashboard View........................................................................................................................ 56 Display the Dashboard View.................................................................................................................... 57 5 Manage Alarms and Traps........................................................................................... 58 5.1 View and Manage Traps Sent from Devices.......................................................................... 59 View the Traps............................................................................................................................................... 59 Delete the Traps............................................................................................................................................ 59 Export the Traps............................................................................................................................................ 59 5.2 View and Manage Alarm Configurations............................................................................... 59 View and Manage Current Alarm Configurations............................................................................ 61 Add a New Alarm Configuration............................................................................................................. 62 Modify Current Alarm Configurations.................................................................................................. 64 5.3 View and Manage Alarms......................................................................................................... 67 View and Manage Current Alarms......................................................................................................... 67 View and Manage History Alarms.......................................................................................................... 70 5.4 View and Manage Remote Notice Profiles............................................................................ 71 View and Manage the Recipients........................................................................................................... 71 View and Manage the Notice Rules....................................................................................................... 73 6 Manage the Configuration and Firmware Files...................................................... 79 6.1 Back Up Device Configurations............................................................................................... 80 Add or Modify a Backup Schedule......................................................................................................... 80 Execute a Backup Schedule...................................................................................................................... 82 View the Execution Result of a Backup Schedule............................................................................. 83 Remove a Backup Schedule..................................................................................................................... 84 6.2 Restore Device Configurations................................................................................................ 85 Import a Configuration File...................................................................................................................... 85 Modify a Configuration File...................................................................................................................... 86 Remove a Configuration File.................................................................................................................... 87 Add a Restore Schedule............................................................................................................................. 87 6.3 Upgrade Device Firmwares...................................................................................................... 89 Import a Firmware File............................................................................................................................... 89 Remove a Firmware File............................................................................................................................. 90 Add a Firmware Upgrade Schedule....................................................................................................... 91 6.4 View and Manage Schedules................................................................................................... 92 View the Execution Status of the Schedules...................................................................................... 93 Edit a Schedule.............................................................................................................................................. 93 Remove a Schedule..................................................................................................................................... 95 Execute a Schedule ..................................................................................................................................... 95 6.5 Example: Upgrade Firmware for Several Devices................................................................ 96 7 View and Manage Tasks.............................................................................................. 99 7.1 View and Manage the Tasks...................................................................................................100 View the Tasks.............................................................................................................................................100 Enable/Disable the Tasks.........................................................................................................................101 Delete the Tasks..........................................................................................................................................101 8 Manage Users.............................................................................................................. 102 8.1 View and Manage Roles..........................................................................................................103 View Roles.....................................................................................................................................................103 Add a Role.....................................................................................................................................................104 Modify a Role...............................................................................................................................................105 Delete a Role................................................................................................................................................106 8.2 View and Manage Users..........................................................................................................106 View Users.....................................................................................................................................................107 Add a User.....................................................................................................................................................107 Modify a User...............................................................................................................................................108 Delete a User................................................................................................................................................109 8.3 View and Log off Users............................................................................................................109 9 System and Global Settings...................................................................................... 111 9.1 Device Count.............................................................................................................................112 9.2 Configure Email Server............................................................................................................112 9.3 Configure Idle Timeout...........................................................................................................113 9.4 Configure Auto Refresh Interval............................................................................................114 9.5 Configure Data Retention.......................................................................................................114 9.6 Icons in the Upper-Right Region...........................................................................................115 Notification Messages..............................................................................................................................115 Current Alarms............................................................................................................................................116 System Information...................................................................................................................................116 Current Account.........................................................................................................................................117 Log out...........................................................................................................................................................117 1 Quick Start The tpNMS (TP-LINK Network Management System) is a centralized management software that allows you to discover, monitor and configure your TP-LINK Managed Switches using a web browser. Follow the steps below to complete the basic settings of the tpNMS. 1. Prepare for Installation 2. Download and Install tpNMS 3. Log in to the Application 4. Change Your Password and Email 5. Set the Email Server for Alarm Notifications 1 1.1 Prepare for Installation You can install the tpNMS to centrally manage the switches in the LAN or in different network segments. • Computer Requirements • Compatible Devices • Installation Topology Computer Requirements Hardwares: Operating System: Microsoft Windows XP/Vista/7/8/10. Web Browser: Mozilla Firefox 32 (or above), Google Chrome 37 (or above), Opera 24 (or above), or Microsoft Internet Explorer 8-11. // Not We recommend you deploy the tpNMS on a 64-bit operating system to guarantee the software stability. Compatible Devices TP-LINK 2/3/5/T series switches. Installation Topology You can deploy tpNMS to manage devices in three types of network topologies. ·In the Same LAN If you want to manage the compatible switches in the same LAN with the tpNMS host, refer to the following network topology. 2 Figure 1-1 Topology of the same LAN Host A (tpNMS Host) IP: 192.168.0.100 Switch tpNMS Router (Gateway) LAN IP:192.168.0.1 Internet Host B IP: 192.168.0.200 2/3/5/T Series Switch 2/3/5/T Series Switch 2/3/5/T Series Switch In the LAN, only one host needs to install tpNMS. The host is called as tpNMS Host. And the other hosts in the same LAN can access the tpNMS Host to manage the network. In this topology, you can visit tpNMS interface from Host B by entering “192.168.0.100: 8888” in a web browser. It’s recommended to set a static IP address to the tpNMS Host for the convenient login to the tpNMS interface. // Not: The tpNMS must be running all the time when you manage the network. ·In Different Network Segments If the tpNMS Host needs to manage switches in different network segments, refer to the following topology. 3 Figure 1-2 Topology with different subnets Host A (tpNMS Host) IP: 192.168.0.100 Router (Gateway) LAN IP:192.168.0.1 L2+/L3 Switch tpNMS Internet Host B IP: 192.168.1.200 2/3/5/T Series Switch IP: 192.168.2.200 2/3/5/T Series Switch IP: 192.168.3.200 2/3/5/T Series Switch IP: 192.168.4.200 The tpNMS Host and the switches are connected to different ports on the L2+/L3 switch. The tpNMS Host and the switches can access each other via the routing interfaces configured on the L2+/L3 switch. To ensure the switches can be discovered by the tpNMS Host and be managed, configure the switches to send SNMP traps to the IP address of the tpNMS host. ·Over VPN Tunnel The tpNMS Host can manage the switches over the VPN tunnel, referring to the following topology. Figure 1-3 Topology over VPN tunnel Host A (tpNMS Host) IP: 192.168.0.100 2/3/5/T Series Switch IP: 192.168.3.200 L2+/L3 Switch VPN Tunnel 2/3/5/T Series Switch L2+/L3 Switch Host B IP: 192.168.1.200 IP: 192.168.2.200 4 tpNMS After the VPN tunnel is established, the tpNMS can manage the switches on the other side of the tunnel remotely. 1.2 Download and Install tpNMS Get the installation file of tpNMS from our website www.tplink.com/en in this directory For Business > Switches > Accessories, or click this link. Then follow the on-screen instructions to properly install the tpNMS software. After successful installation, a shortcut icon of the tpNMS will be created on the tpNMS host’s desktop. 1.3 Log in to the Application Launch the software on the tpNMS Host and follow the instructions to complete the basic configurations, and then you can log in to the management interface. • Launch the tpNMS • Fix the Launch Problems • Log in to tpNMS Launch the tpNMS Launch the tpNMS and the following window will pop up. You can click Hide to hide this window but do not close it. After a while, your web browser will automatically open. Figure 1-4 Launch Window 5 // Not: ··If your browser does not open, please click Launch a Browser to Manage Network. ··If it opens but prompts a problem with the website's security certificate, please click Continue to this website. ··If the port 69, 162 and 1099 are already used by other processes, tpNMS will fail to initialize. Please kill the tasks occupying these ports and click Retry to launch tpNMS again. Fix the Launch Problems tpNMS will use several ports in its launch process, which include but are not limited to: 69, 162 and 1099. If any of these ports is occupied by the other processes, tpNMS will fail to initialize. The conflicting port and the PID of the process using this port will be displayed in the launch window. Please kill the process with this PID and click Retry to launch the tpNMS again. 1. For example, the tpNMS encounters with a port conflict in initialization. Figure 1-5 Initializing error We can see that the conflict port is 162 and the process with PID 2108 is occupying this port. 6 2. Open the Processes tab in the Windows Task Manager. Figure 1-6 Windows Task Manager 7 3. Click View and select Select Columns.... Figure 1-7 Select Columns In the pop-up window, select the PID (Process Identification) and click OK. Figure 1-8 Show the PID column 8 4. Kill the process that occupying the conflict port. Click the process with the specified PID and click the End Process. Figure 1-9 Kill the conflicting process 5. Click Retry to launch tpNMS again. Figure 1-10 Launch tpNMS again Log in to tpNMS tpNMS uses a browser-server architecture. Administrators and other types of users can access tpNMS from any accessible host in the network. Before you log in to tpNMS, please make sure that tpNMS host has a static IP address. 9 // Not: Since tpNMS supports multiple users’ operations at the same time, we recommend that different users coordinate their application activities. Thus the modifications on the screen made by one user are not inadvertently changed by another user. 1. Open a browser and connect to tpNMS through the static IP address of the tpNMS host and the port 8843. ·To connect to tpNMS from the tpNMS host, enter the URL https://127.0.0.1:8843/. ·To connect to tpNMS from a remote computer, replace 127.0.0.1 with the IP address of the tpNMS host. For example, enter https://1.1.1.100:8843/, in which 1.1.1.100 is the IP address of the tpNMS host and 8843 is the port number for the tpNMS server. 2. After you connect to tpNMS, enter the default account and password (both are admin) in the Login screen to sign in. Figure 1-11 Login Window 3. The Home screen displays as below. Figure 1-12 Home Page 10 1.4 Change Your Password and Email It is suggested to change the admin user’s default password for safety considerations. tpNMS defines three types of roles: administrator, operator and observer. Only administrators have the authority to modify the user’s user name, password and email. Following the steps below to modify your password and email address. 1. Click in the top right corner of the page and the following My Account window will pop up. Figure 1-13 Modify account information 2. Modify the Email address of the admin user. 3. Select the Change Password check box . Enter the new password and re-enter to confirm. 4. Click Apply to save your changes. 1.5 Set the Email Server for Alarm Notifications Before tpNMS can send alarm notifications, you should configure the email server settings. Only an administrator role user can configure the alarm email server settings. 11 1. Go to System > System Settings > Email Server. Figure 1-14 Configure Email server settings 2. Enter your SMTP server address in the SMTP Server field. For example: smtp.gmail.com. 3. Enter your email address in the Sender Address field. For example: jerry@gmail.com. 4. If you want to encrypt the communications between the server and the recipient, select the Use Secure Connect (SSL) check box. 5. Enter your SMTP server port in the Server Port field. 6. If your SMTP server requires authentication, select the Need Check Authority check box and enter your user name and password for your email account. 7. Click the Test button to verify your email server settings. A test mail will be sent from the sender to itself, to verify the settings of the email server and the user credentials are correct. 8. Click the Save button to save your email server settings. 12 2 Monitor Network With tpNMS you can monitor the summary information about the network, devices and interfaces. You can monitor the device status, the network topology, the latest alarms and the top 10 widgets for devices and interfaces by certain criteria. You can customize these widgets on the Home screen. This chapter includes the following sections: • Customize the Widgets on the Home Screen • View the Widgets 2.1 Customize the Widgets on the Home Screen You can add, delete or re-sort the widgets displayed on the Home screen. 1. Go to Home screen. 13 2. Click Customize Portal in the upper right corner of the Home screen. Figure 2-1 Home screen customize 3. Select a checkbox to add the widget. Deselect a checkbox to delete the widget. Figure 2-2 Add or delete the widgets 4. The right part is a thumbnail of the Home page. Drag the widgets to re-sort their display order. When you move the cursor onto the title bar of a widget, the cursor will turn into 14 a four-head arrow. Click and hold the title bar to drag the widget to the place you want, and release the left button of your mouse to complete the operation. Figure 2-3 Re-sort the widgets 5. Click Apply to save your changes. 2.2 View the Widgets You can view the widgets displayed on the Home page. Figure 2-4 Home Page view 15 You can click the device name or interface name in the tables to view their detailed information. The widgets and the elements they contain are introduced below. Widget Label Description Default Items Displayed The percentage of the online devices Device Status The number and percentage of the managed devices online and offline. The percentage of the offline devices The number of the online devices The number of the offline devices Alarm Name Latest 10 Alarms The latest 10 alarms of the entire network. Severity Device IP Alarm Time Top 10 Devices By Average CPU (Today) Top 10 devices by the average CPU utilization today. Click device name to show device detail view. Top 10 Devices By Average Memory (Today) Top 10 devices by the average memory utilization today. Click device name to show device detail view. Device Name Device Type CPU Utilization (%) Device Name Device Type Memory Utilization (%) Device Name Top 10 Interfaces By Traffic (Today) Top 10 devices by the traffic received and transmitted today. Click device name to show device detail view. Click interface name to show interface detail view. Interface Name Rx Tx Total Device Name Top 10 Interfaces By Traffic Rate (Today) Top 10 devices by the average rate of traffic received and transmitted today. Click device name to show device detail view. Click interface name to show interface detail view. Interface Name Rx (bps) Tx (bps) Total (bps) Device Name Top 10 Interfaces By Utilization (Today) Top 10 interfaces by the average utilization on both receiving and transmitting today. Click device name to show device detail view. Click interface name to show interface detail view. Interface Name Rx Utilization Tx Utilization Total 16 Widget Label Description Default Items Displayed Device Name Top 10 Interfaces By Errors (Today) Top 10 devices by errors on both receiving and transmitting today. Click device name to show device detail view. Click interface name to show interface detail view. Interface Name Rx Errors Tx Errors Total Device Name Top 10 Interfaces By Discard (Today) Top 10 devices by discards on both receiving and transmitting today. Click device name to show device detail view. Click interface name to show interface detail view. Interface Name Rx Discards Tx Discards Total Network Topology Map The network topology of the managed devices. Double click the node in the map to jump to the Network Topology tab and see the detailed map information. 17 3 Discover and Manage Resources With tpNMS you can manage the resources in the network, including devices, interfaces and Topology. This chapter includes the following sections: • Discover Devices on Your Network • View and Manage Devices • Import Devices • Add Devices into Groups • View and Manage Links on Your Network • Manage Maps and Topologies 3.1 Discover Devices on Your Network • Schedule a Discovery Job • Manage Discovery Templates Schedule a Discovery Job The discovery profile can filter the devices that tpNMS can detect. tpNMS can discover devices by a single IP or in an IP range, device name, SNMP template and Telnet template. • Add or modify a discovery profile • Delete a discovery profile 18 ·· Add or modify a discovery profile 1. Go to Resource > Device Management > Device Discovery. 2. Click Add to create a new discovery profile, or click the schedule name in the table to modify the schedule. Figure 3-1 Schedule modify To add or delete columns displayed in the device list table, click the and specify the columns by selecting or deselecting the corresponding checkboxes. To filter the schedules in the list, click the Filter. Figure 3-2 Schedule filter 19 . Enter the Schedule Name and click 3. Edit the discovery schedule's information. Figure 3-3 Edit schedule's basic information Basic Information Schedule Name Enter the name of the schedule. Discovery IP Specify the target IP type as Single IP or IP Range. Device IP Enter the target device's IP address or IP address range. Device Label Assign a device label to the device discovered if you select Single IP. SNMP Template Click Choose Template or edit the SNMP Template manually. SNMP Version Select the SNMP version. SNMP Port Enter the SNMP port, which is 161 by default. Timeout Enter the timeout value, which is 4 seconds by default. The target device will be assumed as unaccessible if it doesn’t respond within the timeout value. Retries Enter the number of SNMP query messages that tpNMS sends, which is 3 by default. 20 Read Community (v1/v2c only) Enter the read community strings to match the target device for authentication. Write Community (v1/v2c only) Enter the write community strings to match the target device for authentication. Security Name (v3 only) Enter the user name to log in the switch. Context Name (v3 only) Enter the SNMP context. Authentication Mode (v3 only) Select the Authentication Mode for the SNMP v3 User. ··None: No authentication method is used. ··MD5: The port authentication is performed via HMAC-MD5 algorithm. ··SHA: The port authentication is performed via SHA (Secure Hash Algorithm). This authentication mode has a higher security than MD5 mode. Authentication Key (v3 only) Enter the password for authentication. Privacy Mode (v3 only) Select the Privacy Mode for the SNMP v3 User. ··None: No privacy method is used. ··DES: DES encryption method is used. Privacy Key (v3 only) Enter the Privacy Password. Telnet Template Click Choose Template or edit the Telnet Template manually. Authentication Mode Select the authentication mode to telnet the target device. Port Enter the port for telnet connection, which is 23 by default. Timeout Enter the timeout value, which is 4 seconds by default. Retries Enter the number of retries, which is 3 by default. Username Enter the username for the telnet connection. Password Enter the password for the telnet connection. 21 Discovery Schedule Config Figure 3-4 Choose Schedule's Execute Circle Unscheduled Select Unscheduled and the discovery job will not be executed. Recurrent Select Recurrent and the discovery job will be executed periodically. Schedule Mode Select the recurrent mode as Hourly, Daily, Weekly or Monthly. Configure the exact time of the discovery schedule according to the schedule mode you choose. 4. Click Apply to save this profile. Click Execute to run this schedule immediately. Figure 3-5 Save or execute a schedule 22 5. An example of discovery result is displayed below. Figure 3-6 Discovery result ·· Delete a discovery profile Click Delete to remove the selected discovery schedule from the table. Figure 3-7 Delete a discovery schedule Manage Discovery Templates • Add or modify an SNMP Template • Add or modify a Telnet Template ·· Add or modify an SNMP Template You can manage SNMP Templates on the Resource > Template Management> SNMP Template screen. 23 Figure 3-8 Manage SNMP templates Click Add or click the template name in the table to edit the template. Figure 3-9 Add or edit an SNMP template ·· Add or modify a Telnet Template You can manage Telnet Templates on the Resource > Template Management > Telnet Template screen. Figure 3-10 Manage Telnet Templates Click Add or click the template name in the table to edit the template. 24 Figure 3-11 Add or Edit an SNMP Template 3.2 View and Manage Devices This section describes the following tasks that you can perform: • View the Device List • Remove a Device • Synchronize a Device • Log in to a Device • Ping or Traceroute a Device • Reboot a Device • Access Config You can manage devices on the Resource > Device Management > Device Table screen. 25 View the Device List 1. Go to Resource > Device Management > Device Table. The screen displays all the devices that the application has discovered. Figure 3-12 Device List 2. To add or delete columns displayed in the device list table, click the the columns by selecting or deselecting the corresponding checkboxes. 26 and specify 3. To filter the devices in the list, click the Figure 3-13 . Enter the filter conditions and click Filter. An example of filtering the TL-SG series switches You can filter the listed devices through one or more of the following conditions: Device Label, Device IP, Device MAC and Device Status. Click Clear to display all the discovered devices. 27 Remove a Device Go to Resource > Device Management > Device Table. Click Delete to remove the selected devices from the device table. Figure 3-14 Remove a device Synchronize a Device Go to Resource > Device Management > Device Table. Click Synchronize to synchronize the selected devices in the device table. The synchronization result pops up as below. Figure 3-15 Synchronization result 28 Your successful synchronization operation will synchronize the device’s information to tpNMS immediately. By default the devices‘ information in this list is synchronized every 2 minutes. Log in to a Device Go to Resource > Device Management > Device Table. Select a device and click Web Management to log into the device's web interface. The login interface opens in a new tab. This connection uses the TCP port 80, which cannot be changed. Figure 3-16 Login to the device Enter the username and password to log in to the device. For TP-LINK switches, the default User Name is admin and the default Password is admin. 29 Figure 3-17 Login to the device's interface Ping or Traceroute a Device Go to Resource > Device Management > Device Table. Click Ping or Traceroute to ping or traceroute the selected device in the device table. The result displays in the pop-up window. Figure 3-18 Ping result 30 Figure 3-19 Traceroute result Reboot a Device Go to Resource > Device Management > Device Table. Click Reboot to reboot the selected devices in the device table. Access Config Go to Resource > Device Management > Device Table. Click Access Config to configure the credentials that pertain to the devices you are trying to access. Figure 3-20 Access configurations 31 SNMP Template Configure the SNMP template to match the SNMP configurations on the target switches. SNMP Version Select the SNMP version as v1,v2c or v3. SNMP Port Enter the SNMP port, which is 161 by default. Timeout Enter the timeout value, which is 4 seconds by default. The target device will be assumed as unaccessible if it doesn’t respond within the timeout value. Retries Enter the number of SNMP query messages that tpNMS sends, which is 3 by default. Read Community (v1/v2c only) Enter the read community strings to match the target device for authentication. Write Community (v1/v2c only) Enter the write community strings to match the target device for authentication. Security Name (v3 only) Enter the user name to log in the switch. Context Name (v3 only) Enter the SNMP context. Authentication Mode (v3 only) Select the Authentication Mode for the SNMP v3 User. ··None: No authentication method is used. ··MD5: The port authentication is performed via HMAC-MD5 algorithm. ··SHA: The port authentication is performed via SHA (Secure Hash Algorithm). This authentication mode has a higher security than MD5 mode. Authentication Key (v3 only) Enter the password for authentication. Privacy Mode (v3 only) Select the Privacy Mode for the SNMP v3 User. ··None: No privacy method is used. ··DES: DES encryption method is used. Privacy Key (v3 only) Enter the Privacy Password. Telnet Template Authentication Mode Select the authentication mode to telnet the target device. Port Enter the port for telnet connection. Timeout Enter the timeout value, which is 4 seconds by default. Retries Enter the number of retries, which is 3 by default. 32 Username Enter the username for the telnet connection. Password Enter the password for the telnet connection. 3.3 Import Devices You can customize a template file and use the file as a criteria to search for devices in the network. Only the devices that match the customized conditions will be discovered. The Import Devices function gives you more control over the discovery process because the conditions you set are a bit more complicated. 1. Go to Resource > Device Management > Device Import. 2. Click template.xls to download the excel file Config Template. Figure 3-21 Download Config Template 3. Edit the parameters in the downloaded template.xls. Figure 3-22 Edit Template 4. Upload customized template file to import devices that match the criteria. Figure 3-23 Upload Config Template and Import Devices Click Choose to select your customized template file and click Import to search for devices that match the conditions. 33 Figure 3-24 Import Result 3.4 Add Devices into Groups Once the devices are discovered, you can group them by model, category, location or other criteria. You can create static and dynamic device groups. Device group offers a convenient way for the batch backup, restore and update actions. • View Groups • Add Devices to Static Group • Add Devices to Dynamic Group • Delete Groups View Groups Go to Resource > Device Management > Device Groups. The device groups are displayed below. Figure 3-25 Device groups 34 Add Devices to Static Group 1. Go to Resource > Device Management > Device Groups. 2. Click Add Static Group to create a static device group. Enter the group name and description. Figure 3-26 Create a static group 3. Click Add to add devices into the group. Figure 3-27 Add Devices to a static group You can select devices manually in the device list, or use the filter function to filter the specified devices. In this example all the TL-SG3 switches are filtered out. Select the devices and click Apply to add these devices to the group. 35 4. Click Apply to save the static group. Add Devices to Dynamic Group Go to Resource > Device Management > Device Groups. Click Add Dynamic Group to add the devices that match the specified criteria to a dynamic group. Figure 3-28 Add devices to a dynamic group Delete Groups Go to Resource > Device Management > Device Groups. Click Delete to remove the selected device groups from the group table. Figure 3-29 Remove device groups 36 3.5 View and Manage Links on Your Network • View Links on Your Network • Discover Links on Your Network • Add a Link View Links on Your Network Go to Resource > Link Management > Link Table. The links are displayed below. Figure 3-30 View links Link Status Displays whether the link is up or down. Link Name Displays the link name. There are two types of link names. 'auto-discovery' means the link is established by LLDP automatically, while links with the other names are created by users manually. Link Type Displays the link type. Cable means it's a physical link. Link layer link means it's a link in layer 2. Source Device Displays the source device of the link. Source Port Displays the source port of the link. Destination Device Displays the destination device of the link. Destination port Displays the destination port of the link. Link Speed Displays the speed of the link. 37 Discover Links on Your Network Go to Resource > Link Management > Link Discovery. Click Start Discovery to discover all the links between the devices with LLDP enabled. For devices that do not support LLDP, you can manage links manually. Figure 3-31 Link discovery Add a Link Go to Resource > Link Management > Link Addition. You can add a link on this page manually. You can also draw these links manually on the map in Discovery and Manage Resources > Manage Maps and Topologies > Add a Link. Figure 3-32 Add a link Link Name Enter the link's name. Link Type Select the link's type. Source Device Select source device from the device list. Source Port Select the port on source device as source port. Destination Device Select destination device from the device list. Destination Port Select the port on destination device as destination port. Click Apply to save the configuration. 38 3.6 Manage Maps and Topologies tpNMS provides a world map as the default map. The world map is the root map for any child map that you add. You can locate devices and links onto the maps manually, thus establishing visual topologies. This section introduces the following tasks: • View the Maps in the Map List • Add a Map • Add a Device • Add a Link • Delete a Device, Link or Map • Refresh the Topology • Auto-Refresh Go to Resource > Topology Management > Network Topology. The default map displays below. Figure 3-33 Network topology 39 View the Maps in the Map List The map list contains the world map as the Root map by default. The map list is a hierarchical directory structure. Add a Map Click the icon Figure 3-34 to upload a new child map to your selected map. Add a map Enter the map name and upload a map with .png or .jpg extension from your computer. Add a Device Click the icon Figure 3-35 to add a device to the current map. Add a device Select the target device and click Apply. The device will appear on the map. 40 Figure 3-36 Device on the map Add a Link Click the icon Figure 3-37 to add a new link between devices. Add a link 41 Draw a line between the two target devices and complete the link information, which includes link name, link type and the connecting interfaces on both ends. Delete a Device, Link or Map Select a device, link or map and click to remove your selected object. Refresh the Topology Click to refresh the current topology manually. Auto-Refresh Click and the topology will refresh every 2 minutes automatically. Click this icon again to cancel the auto refresh. 42 4 Monitor Devices and Network You can view summary and detailed information of the devices, interfaces and the network statistics. This chapter includes the following sections: • Monitor the Top 10 Devices • Monitor the Top 10 Interfaces • Specify the Device Monitor • Manage and View Dashboard Please note that only T-series models’ CPU and Memory utilization can be monitored in tpNMS. For other models’ utilization status, you can log in their web or CLI interface to view. 43 4.1 Monitor the Top 10 Devices You can monitor today’s top 10 devices by average CPU and by average memory. Go to Monitor > TopN > TopN Devices. ·Top 10 Devices by Average CPU (Today) Figure 4-1 Top 10 devices by average CPU Device Name Displays the name of the device. Device Type Displays the type of the device. CPU Utilization (%) Displays the CPU utilization of the device. Click the device name to view its detailed information. Figure 4-2 Device information 44 ·Top 10 Devices by Average Memory (Today) Figure 4-3 Top 10 devices by average memory Device Name Displays the name of the device. Device type Displays the type of the device. Memory Utilization (%) Displays the memory utilization of the device. Click the device name to view its detailed information. 4.2 Monitor the Top 10 Interfaces You can monitor today’s top 10 interfaces by traffic, traffic rate, bandwidth utilization, error packets and discard packets. Go to Monitor > TopN > TopN Interfaces. ·Top 10 Interfaces by Traffic (Today) Figure 4-4 Top 10 interfaces by traffic Device Name The name of the device. Interface Name The name of the interface. Rx The received traffic on this interface. Tx The sent traffic on this interface. 45 Total The total traffic forwarded on this interface. Click the device name to view detailed information about the device. Click the interface name to view detailed information about the interface. Figure 4-5 Interface information ·Top 10 Devices by Traffic Rate (Today) Figure 4-6 Top 10 interfaces by traffic rate Device Name The name of the device. Interface Name The name of the interface. Rx (bps) The received traffic rate on this interface. Tx (bps) The sent traffic rate on this interface. 46 Total (bps) The total traffic rate forwarded on this interface. Click the device name to view detailed information about the device. Click the interface name to view detailed information about the interface. ·Top 10 Interfaces by Utilization (Today) Figure 4-7 Top 10 interfaces by utilization Device Name The name of the device. Interface Name The name of the interface. Rx Utilization The interface's utilization on receiving bandwidth. Tx Utilization The interface's utilization on sending bandwidth. Total The total utilization of the interface. Click the device name to view detailed information about the device. Click the interface name to view detailed information about the interface. ·Top 10 Interfaces by Errors (Today) Figure 4-8 Top 10 interfaces by errors Device Name The name of the device. Interface Name The name of the interface. 47 Rx Errors The error packets received on the interface. Tx Errors The error packets sent on the interface. Total The total error packets forwarded on the interface. Click the device name to view detailed information about the device. Click the interface name to view detailed information about the interface. ·Top 10 Devices by Discard (Today) Figure 4-9 Top 10 interfaces by discard Device Name The name of the device. Interface Name The name of the interface. Rx Discards The discarded packets in the interface's received packets. Tx Discards The discarded packets in the interface's sent packets. Total The total discarded packets on the interface. Click the device name to view detailed information about the device. Click the interface name to view detailed information about the interface. 4.3 Specify the Device Monitor tpNMS provides monitors for the following device metrics: ·IP Traffic ·ICMP Traffic ·TCP Traffic ·UDP Traffic ·SNMP Traffic 48 ·Interface Traffic ·CPU ·Memory By default all the monitors are enabled. You can enable/disable and specify these monitors on the page Monitor > Monitor Management > Device Monitor. For information about how to configure alarms basing on these monitors, please refer to View and Manage Alarm Configurations. Go to Monitor > Monitor Management > Device Monitor. Figure 4-10 Device Monitor Monitor Name The name of the monitor. Status The status of the monitor. Monitor Type The monitor type. Interval The interval of the monitor obtains the parameters from the target devices. Description The description for this monitor. ·· Enable/Disable the Monitors Click Enable/Disable to enable/disable the selected monitors. 49 ·· Specify the information of the Monitors Click the monitor name to modify its detailed information. 1. Click General Information to edit the monitor's basic information. Figure 4-11 General Settings Monitor Name The name of the monitor. Enable Enable or disable this monitor. Interval Select the interval of the monitor obtains the parameters from the target devices. Description Description for this monitor. 50 2. Click Monitor Devices to specify the devices or device groups that are monitored. Figure 4-12 Add monitor devices Monitor Devices Specify the devices that are monitored. The options are All Applicable Devices, Select Devices and Select Device Groups. Use the Add and Delete button to edit the target devices or device groups, and click Save to save the changes. The Select Devices window displays as below. Figure 4-13 Add devices 51 The Select Device Groups window displays as below. Figure 4-14 Add device groups 3. Click Monitor Indicators to specify the parameters that are monitored by this monitor. Figure 4-15 Add indicators Edit the parameters that are monitored. By default all the parameters are selected. Click Save to save the changes. 52 4.4 Manage and View Dashboard You can create and customize network information to be displayed on the tpNMS dashboard. • Create or Modify a Dashboard View • Launch a Dashboard View • Display the Dashboard View Create or Modify a Dashboard View Go to Monitor > Dash Board > Dash Board Setting. Figure 4-16 Dash Board View 1. Click Add to create a new dashboard view, or click the view name in the table to edit the existed dashboard view. 2. Click General Info to edit the basic information of the dashboard view. Figure 4-17 Dashboard general information View Name Enter or modify the name for the dashboard view. 53 Interval Type Specify the time period over which you want to view the performance. • Real Time: View the performance in real time. • Last 1 Hour: View the performance over the last 1 hour. • Last 24 Hours: View the performance over the last 24 hours. • Last 7 Days: View the performance over the last 7 days. • Last 30 Days: View the performance over the last 30 days. Interval If you select Real Time, select the refresh frequency of the view here. The information of this dashboard refreshes in the interval you set. Data Source Specify the data source as Device or Interface. 3. Click Monitor Type to configure the monitors of the dashboard view. Figure 4-18 Dashboard monitor type Monitor Type Select the monitor type. There are a series of monitors for devices and a series of monitors for interfaces. Monitor Indicators Specify the monitor sources. 54 4. Click Add Devices/Add Interfaces to configure the target devices/interfaces of the monitor. The following screenshots use Devices as an example. Figure 4-19 Dashboard target devices Click Add to add devices in the device table. Click OK to save your selections. Figure 4-20 Add target devices 55 5. Click Apply to save your configurations on the dashboard. Launch a Dashboard View Go to Monitor > Dash Board > Dash Board Setting. Select a dashboard view in the table and click Launch. Figure 4-21 Launch a dashboard The dashboard view will be displayed in a new tab of the browser. The following tab is the dashboard monitoring the CPU utilization of several T-series switches. Figure 4-22 Display a dashboard 56 Display the Dashboard View Go to Monitor > Dash Board > Dash Board View. Click Select Dashboard and select one dashboard name for display. The dashboard will be displayed on current page. 57 5 Manage Alarms and Traps tpNMS can manage the traps sent from the devices. tpNMS can define alarms basing on traps, monitor and the tpNMS system. tpNMS can define the recipients to receive the notification emails when the specific alarms are triggered. This chapter includes the following contents: • View and Manage Traps Sent from Devices • View and Manage Alarm Configurations • View and Manage Alarms • View and Manage Remote Notice Profiles 58 5.1 View and Manage Traps Sent from Devices Go to Alarms > Trap Management > Traps. The Trap table displays the traps sent from devices. On this screen, you can view details of the traps, remove the traps and export the traps. Figure 5-1 Trap list View the Traps Click the trap OID to view the trap’s detail information. Delete the Traps Select the traps and click Delete to remove them from the Trap table. Export the Traps Select the traps and click Export to PDF or Export to Excel to save the traps to your computer. 5.2 View and Manage Alarm Configurations tpNMS provides three types of alarms depending on their sources: Trap Alarms, Monitor Alarms and System Alarms. Trap alarms, system alarms and some of the monitor alarms are system built-in alarms which cannot be deleted. Users can add new monitor-type alarms. tpNMS provides the following four severity levels for alarms. Four shortcut icons representing the four level alarms are placed in the upper-right region of the main page. The color represents the severity, while red represents the highest level severity and blue 59 represents the lowest severity. The numbers beside these icons represent each alarm’s current quantity. • Urgent (Red) • Serious (Orange) • Normal (Yellow) • Hint (Blue) Click on the alarm icon to view the alarm’s detail information. Figure 5-2 Urgent Alarm Details The following sections describe the alarm-related tasks: • View and Manage Current Alarm Configurations • Add a New Alarm Configuration • Modify Current Alarm Configurations 60 View and Manage Current Alarm Configurations Go to Alarms > Alarm Management > Alarm Configuration. You can view, enable, disable, delete and export alarm configurations on this page. Figure 5-3 Alarm configuration list ·· View the alarms To add or delete columns displayed in the alarm list table, click the columns by selecting or deselecting the corresponding checkboxes. and specify the . Enter the filter conditions and click Filter. To filter the alarms in the list, click the Alarm Name The name of the alarm. Click it to view the alarm's detailed configurations. Status The status displays whether this alarm is valid. Severity Four levels of severity: Urgent, Serious, Normal and Hint. Alarm Type Three types of alarms: Trap, Monitor and System. Description Displays the trigger conditions of the alarm. Trap OID Displays the trap OID if this is a trap-type alarm. Click the alarm name to view and edit the alarm's configuration. ·· Enable/Disable the alarms Select alarms and click the Enable/Disable button to enable/disable the corresponding alarm configurations. 61 ·· Delete the alarms Click the Delete button to remove the selected alarm configurations. The system built-in alarms cannot be deleted. ·· Export the alarms Select alarms and click the Export to PDF/Export to Excel button to export the corresponding alarm configurations to your computer. Add a New Alarm Configuration Go to Alarms > Alarm Management > Alarm Configuration. You can define new alarms for the monitors. The monitors can be configured on the following page: Monitor > Monitor Management > Device Monitor. The alarm you add is based on an existing monitor and includes a threshold. Click Add to add a monitor-type alarm. 62 Figure 5-4 Add an alarm configuration Monitor Information Monitor Name Select a monitor. Enable Displays whether this monitor is valid. Description Displays the detailed information of this monitor. General Information Alarm Name Enter a name for the alarm. Description Enter a description for the alarm. Enable Select whether to make this alarm configuration effective. Severity Select the alarm's severity. tpNMS supports four levels of severity: Urgent, Serious, Normal and Hint. Indicator Select one indicator in the monitor you chose. 63 Alarm Type You can only create monitor-type alarms. Calculate Type Select a consecutive or average calculation type. Count Select a number of times that a particular event must occur before the threshold is met. Note Enter a note for this alarm. Threshold Information Threshold Type Select an upper or lower threshold. Threshold Enter. If this threshold is exceeded, the alarm will be triggered. Click Apply to save your alarm configurations. Modify Current Alarm Configurations Go to Alarms > Alarm Management > Alarm Configuration. You can modify the current alarm configurations on this page. ·· Modify a trap-type alarm Click the trap-type alarm name to modify this alarm. 64 Figure 5-5 Modify a trap-type alarm configuration Enable Enable or disable this alarm configuration. Severity Modify the alarm's severity. tpNMS supports four levels of severity: Urgent, Serious, Normal and Hint. Note Add a note to this alarm. 65 ·· Modify a monitor-type alarm Click the monitor-type alarm name to modify this alarm. Figure 5-6 Modify a monitor-type alarm configuration Enable Enable or disable this alarm configuration. Severity Modify the alarm's severity. tpNMS supports four levels of severity: Urgent, Serious, Normal and Hint. Count Specify the number of times that a particular event must occur before the threshold is met. Note Add a note to this alarm. Threshold Modify the threshold. If this threshold is exceeded, the alarm will be triggered. 66 ·· Modify a system-type alarm Click the system-type alarm name to modify this alarm. Figure 5-7 Modify a system-type alarm configuration Enable Enable or disable this alarm configuration. Severity Modify the alarm's severity. tpNMS supports four levels of severity: Urgent, Serious, Normal and Hint. Note Add a note to this alarm. 5.3 View and Manage Alarms You can view and manage the current alarms and history alarms. • View and Manage Current Alarms • View and Manage History Alarms View and Manage Current Alarms Go to Alarms > Browse Alarm > Current Alarms. The alarm list on this page displays the current active alarms of the network. You can acknowledge, clear and export alarms. 67 Figure 5-8 Current alarm list ·· View the current alarms To add or delete columns displayed in the alarm list table, click the columns by selecting or deselecting the corresponding checkboxes. and specify the . Enter the filter conditions and click Filter. To filter the alarms in the list, click the Alarm Name The name of the alarm. Click it to view the alarm's detailed configurations. Alarm Status Whether this alarm is valid. Alarm Type Three types of alarms: Trap, Monitor and System. Severity Four levels of severity: Urgent, Serious, Normal and Hint. Device IP The device IP on which the alarm occurred. Alarm Source The source of the alarm. Last Arrived Time Displays the last time the alarm arrived at tpNMS. Acked User User who confirmed the alarm. Description The description of this alarm. Click the alarm name to view the detailed information of the alarm. 68 ·· Acknowledge the current alarms Select your desired alarms and click Acknowledge to confirm the alarms. Acknowledging an alarm means that you are in charge of this alarm. Figure 5-9 Confirm an alarm When an alarm is confirmed, the confirmed user's name will be filled in the Acked User column. Figure 5-10 Confirmed alarm ·· Remove the current alarms Select your desired alarms and click Clear to remove the alarms from this table. The alarms you cleared here will be displayed in the History Alarms list. ·· Export the current alarms Select your desired alarms and click Export to PDF or Export to Excel to save the alarms to your computer. 69 View and Manage History Alarms Go to Alarms > Browse Alarm > History Alarms. You can remove and export history alarms on this page. Figure 5-11 History alarm list ·· View the history alarms To add or delete columns displayed in the alarm list table, click the columns by selecting or deselecting the corresponding checkboxes. and specify the . Enter the filter conditions and click Filter. To filter the alarms in the list, click the Alarm Name The name of the alarm. Click it to view the alarm's detailed configurations. Alarm Status Whether this alarm is valid. Alarm Type Three types of alarms: Trap, Monitor and System. Severity Four levels of severity: Urgent, Serious, Normal and Hint. Device IP The device IP on which the alarm occurred. Alarm Source The source of the alarm. Alarm Time Displays the time the alarm arrived at tpNMS. Acked User User who confirmed the alarm. Description The description of this alarm. Click the alarm name to view the detailed information of the alarm. ·· Remove the history alarms Select your desired alarms and click Clear to remove the alarms from this table. 70 ·· Export the history alarms Select your desired alarms and click Export to PDF or Export to Excel to save the alarms to your computer. 5.4 View and Manage Remote Notice Profiles A remote notice profile defines certain criteria basing on the alarms. tpNMS will generate and send alarm notice emails when specified alarm occurs. The recipients can be customized. Before the application can send notice emails, you should provide the email addresses of the recipients. • View and Manage the Recipients • View and Manage the Notice Rules View and Manage the Recipients Go to Alarms > Remote Notice > User Groups. Figure 5-12 Notification recipients ·· Add or modify a user · To add a user, click the Add button. ·To modify an existing user, click the username. 71 Figure 5-13 Add or modify a user Username Enter the username. Email Enter the email address of the user. The alarm notice emails will be sent to this email address. Phone Optional. Enter the phone number of the user. Description Optional. Enter the description for this user. ·· Add or modify a user group · To add a user group, click the Add button. ·To modify an existing user group, click the group name. Figure 5-14 Add or modify a user group 72 Basic Information User Group Enter the user group name. Description Optional. Enter the description for this group. User List Click Add or Delete to manage users in this user group. ·· View the current users and user groups To add or delete columns displayed in the alarm list table, click the columns by selecting or deselecting the corresponding checkboxes. To filter the notice rules in the list, click the Filter. and specify the . Enter the filter conditions and click Click the user/user group name to view the detailed information of the users/user groups. View and Manage the Notice Rules Go to Alarms > Remote Notice > Notice Rules. Figure 5-15 Notice rule list ·· Add or Modify the notice rules · To add a notice rule, click the Add button. ·To modify an existing notice rule, click the rule name. 73 Figure 5-16 Add or modify a notice rule (general information) General Information Configure the basic information of the remote rule. Rule Name Enter the rule name. Enable Enable or disable this notice rule. Severity Select which level alarms will trigger this notice. Send when the alarm is cleared. A notice mail will be sent when the alarm is cleared if you check this box. Description Enter the description for this notice rule. 74 Alarm Configuration Information Configure the alarms in this notice rule. Figure 5-17 Add or modify a notice rule (alarm configuration) Target Alarms Select All Applicable Alarm Configuration, or select Select Alarm Configuration to add the alarm configurations manually. Add Click Add to add the existing alarm configurations. It is multi-optional. Delete Delete the alarm configurations in the Alarm table below. 75 Device Information Configure the target devices that the alarms are monitoring. Figure 5-18 Add or modify a notice rule (device information) Target Devices Select all the applicable devices or select devices by model, by group or separately. Add Click Add to add devices according to their model, group or separately. Delete Delete the devices in the device table below. 76 The Device Add page displays as below. Figure 5-19 Add or modify a notice rule (add device) Recipient Information Configure the recipients of the notice, and the alarm’s time-range restriction. Figure 5-20 Time Add or modify a notice rule (recipient information) Select the time-range restriction on the alarms. All Day: Alarms that occurs at any time of the day will trigger the notice mail. Specified Time: Specify a time-range. tpNMS will send notice mail only when the alarms occurs in this specified time-range. 77 Add Click Add to add user groups who will receive the notice email. Delete Delete the user groups in the recipient list table below. Click Save to save your modifications. ·· View the current notice rules To add or delete columns displayed in the alarm list table, click the columns by selecting or deselecting the corresponding checkboxes. To filter the notice rules in the list, click the Filter. and specify the . Enter the filter conditions and click Click the rule name to view the detailed information of the notice rules. Rule Name The name of the notice rule. Click it to view and edit the rule's configurations. Status The status displays whether this rule is valid. User Groups Displays the recipients of the notification email. Time The sending time period of the notification email. Severity Displays the filtering criteria of the alarms. Only the alarms of the severity levels displayed will be sent in the email. Description Displays the description on this notice rule. 78 6 Manage the Configuration and Firmware Files This chapter mainly introduces how to manage the device’s configuration files and firmware files. • Back Up Device Configurations • Restore Device Configurations • Upgrade Device Firmwares • View and Manage Schedules • Example: Upgrade Firmware for Several Devices 79 6.1 Back Up Device Configurations You can schedule a backup task to back up the configurations of the devices on your network. The backup configuration files will be saved in the \data\tftpDir in the tpNMS’s installation directory. • Add or Modify a Backup Schedule • Execute a Backup Schedule • View the Execution Result of a Backup Schedule • Remove a Backup Schedule Add or Modify a Backup Schedule 1. Go to Config > Backup Management > Backup Schedule. Figure 6-1 Backup schedule list 2. Add a backup schedule or modify an existing backup schedule. ·To add a backup schedule, click the Add button. ·To modify an existing backup schedule, select your desired schedule entry and click Edit. 80 The following screen displays. Figure 6-2 Add or modify a backup schedule Basic Information Name Enter the name of the backup schedule. Enable CLI Password Check this box and enter the device's privilege-mode password if necessary. Description Enter the description for this schedule. Device Config Select Device By Select the target device by device or by device group. Selected Devices Add Add a device/device group whose configuration files will be backed up. Delete Remove the selected device/device group from the table below. Schedule Config Unscheduled The unscheduled backup task will be displayed in the schedule list, but will not be executed automatically. You can manually perform the backup task on the screen Config > Backup Management > Backup Schedule with the Execute button. 81 One Time Select One Time and enter the Execution Time, the schedule task will be executed automatically at the time you set. Recurrent Select Recurrent and complete the schedule mode and frequency below, the schedule task will be executed recurrently. Click Apply to save your configurations. Execute a Backup Schedule You can execute a backup task in the schedule table immediately, either the task is unscheduled or recurred. 1. Go to Config > Backup Management > Backup Schedule. Figure 6-3 Backup schedule list Schedule Name Displays the name of the backup schedule. Schedule Mode Displays the mode of the backup schedule. Last Execution Time Displays the last execution time of this backup time. Next Execution Time Displays the next execution time of this backup time. Last Execution Result Click the link to view the detailed information of this backup task's last execution result. 82 2. Click the Execute button to execute your selected backup schedule immediately. A window will pop up to display the execution result. Figure 6-4 Backup process Click the in the upper-right corner to close this pop-up window. You can close this window and perform some other operations with tpNMS during the backup process. The backup process will run in the background. You can view the backup's progress on the screen Tasks > Task Management > Tasks. View the Execution Result of a Backup Schedule You can view the execution status of your desired backup job to ensure that the device's configuration is backed up as scheduled. 1. Go to Config > Backup Management > Backup Schedule. Figure 6-5 Backup schedule list Schedule Name Displays the name of the backup schedule. Schedule Mode Displays the mode of the backup schedule. Last Execution Time Displays the last execution time of this backup time. Next Execution Time Displays the next execution time of this backup time. Last Execution Result Click the link to view the detailed information of this backup task's last execution result. 83 2. Click the link in the last row of the schedule table to view the detailed execution result. Figure 6-6 Backup result Schedule Name Displays the label of the device. Device IP Displays the IP address of the device. Device MAC Displays the MAC address of the device. Result (You can close this window while backing up) Displays the backing up result. Backup Time Displays the time of the backup operation. Remove a Backup Schedule You can remove your selected backup schedule task in the schedule Table. 1. Go to Config > Backup Management > Backup Schedule. Figure 6-7 Backup schedule list Schedule Name Displays the name of the backup schedule. Schedule Mode Displays the mode of the backup schedule. Last Execution Time Displays the last execution time of this backup time. 84 Next Execution Time Displays the next execution time of this backup time. Last Execution Result Click the link to view the detailed information of this backup task's last execution result. 2. Select the backup profile and click Delete to remove the profile from this table. 6.2 Restore Device Configurations You can upload the configuration files of the devices to tpNMS, and restore the configuration files to corresponding device(s) on your network. • Import a Configuration File • Modify a Configuration File • Remove a Configuration File • Add a Restore Schedule Import a Configuration File 1. Go to Config > Deploy Management > Config File. Figure 6-8 Configuration file list 85 2. Click Import to upload the configuration file with .cfg extension from your computer. Figure 6-9 Upload a configuration file 3. Click Apply and the configuration file is listed in the Config File table. Modify a Configuration File 1. Go to Config > Deploy Management > Config File. Figure 6-10 Configuration file list 2. Select the desired configuration file in the table and click Edit File to modify this file. Figure 6-11 Edit a configuration file 86 3. Click Apply to save your modifications to the configuration file. Remove a Configuration File 1. Go to Config > Deploy Management > Config File. Figure 6-12 Configuration file list 2. Select the desired configuration file and click Delete to remove this file from the table. 3. Click OK in the pop-up confirm window to complete the deletion. Add a Restore Schedule 1. Go to Config > Deploy Management > Config File. Figure 6-13 Configuration file list 87 2. Select the configuration file in the table and click Restore. 3. In the Deploy Config List > Deploy Schedule window, edit the schedule’s information. Figure 6-14 Edit a restore schedule Basic Info Name Enter the name of the restore schedule. Restore File Display the name of the configuration file. Enable password Click the checkbox to enter the device's privileged password if necessary. Description Enter the description of the restore schedule. Target Devices Select Device By Select the target devices by devices or by device groups. Selected Devices Add/Delete Edit the target devices or device groups. Schedule Unscheduled The unscheduled restore task will be displayed in the schedule list, but will not be executed automatically. You can manually perform the restore task on the screen Config > Deploy Management > Deploy Schedule with the Execute button. 88 One Time Select One Time and enter the Execution Time, the schedule task will be executed automatically at the time you set. Recurrent Select Recurrent and complete the schedule mode and frequency below. The schedule task will be executed recurrently. Click Apply to save the restore schedule information. 6.3 Upgrade Device Firmwares You can upload the firmware files of the devices to tpNMS, and upgrade corresponding device(s) on your network with the configuration files. • Import a Firmware File • Remove a Firmware File • Add a Firmware Upgrade Schedule Import a Firmware File 1. Go to Config > Deploy Management > Firmware. Figure 6-15 Firmware file list 89 2. Click Import to upload the firmware file from your computer. Figure 6-16 Import a firmware file Import File Click Choose to select the firmware file from your computer. Name Enter the name of this firmware file. Vendor Select the vendor of the device corresponding to this firmware. Version Enter the firmware version. Description Enter the description of this firmware file. 3. Click Apply and the firmware file is listed in the Firmware File table. Remove a Firmware File 1. Go to Config > Deploy Management > Firmware. Figure 6-17 Firmware file list 90 2. Select the desired firmware file and click Delete to remove this file from the table. 3. Click OK on the pop-up confirm window to complete the deletion. Add a Firmware Upgrade Schedule 1. Go to Config > Deploy Management > Firmware. Figure 6-18 Firmware file list 2. Select the firmware file in the table and click Upgrade. 3. In the Deploy Config List > Deploy Schedule window, edit the schedule’s information. Figure 6-19 Edit a upgrade schedule Basic Info Name Enter the name of the upgrade schedule. 91 Firmware Display the name of the firmware file. Enable password Click the checkbox to enter the device's privileged password if necessary. Description Enter the name of the upgrade schedule. Target Devices Select Device By Select the target devices by devices or by device groups. Selected Devices Add/Delete Edit the target devices or device groups. Schedule Unscheduled The unscheduled upgrade task will be displayed in the schedule list, but will not be executed automatically. You can manually perform the upgrade task on the screen Config > Deploy Management > Deploy Schedule with the Execute button. One Time Select One Time and enter the Execution Time. The schedule task will be executed automatically at the time you set. Recurrent Select Recurrent and complete the schedule mode and frequency below, the schedule task will be executed recurrently. Click Apply to save the upgrade schedule information. 6.4 View and Manage Schedules Go to Config > Deploy Management > Deploy Schedule. Your configuration-restore schedules and firmware-upgrade schedules can be viewed and managed on this page. Figure 6-20 Schedule list • View the Execution Status of the Schedules • Edit a Schedule 92 • Remove a Schedule • Execute a Schedule View the Execution Status of the Schedules Go to Config > Deploy Management > Deploy Schedule. The schedule table displays the following items: Schedule Name Displays the name of the schedule. Schedule Mode Displays the schedule mode. Deploy Type Displays the detail type of the schedule task. Last Execution Time Displays the last time when the schedule task was executed. Next Execution Time Displays the next time when the schedule task will be executed. Last Execution Result Displays the general result of the schedule's last execution. Click the link in the Last Execution Result Row to view the detailed execution result. Edit a Schedule Go to Config > Deploy Management > Deploy Schedule. Select a schedule and click Edit to modify the detailed configuration of the schedule task. 93 Figure 6-21 Edit a schedule Basic Info Name Enter the name for the schedule. Restore File/ Firmware Display the name of the restore file/firmware file. Enable password Click the checkbox to enter the device's privileged password if necessary. Description Enter the name for the schedule. Target Devices Select Device By Select the target devices by devices or by device groups. Selected Devices Add/Delete Edit the target devices or device groups. 94 Schedule Unscheduled The unscheduled task will be displayed in the schedule list, but will not be executed automatically. You can manually perform the task on the screen Config > Deploy Management > Deploy Schedule with the Execute button. One Time Select One Time and enter the Execution Time, the schedule task will be executed automatically at the time you set. Recurrent Select Recurrent and complete the schedule mode and frequency below, the schedule task will be executed recurrently. Click Apply to save the schedule’s configuration. Remove a Schedule Go to Config > Deploy Management > Deploy Schedule. Select a schedule and click Delete to remove the schedule from the table. Execute a Schedule Go to Config > Deploy Management > Deploy Schedule. Click the Execute button to execute your selected restore schedule/upgrade schedule immediately. A window will pop up to display the execution result. Figure 6-22 Schedule’s running status You can close this window and perform some other operations with tpNMS during the backup process. The restore/upgrade process will run in the background. You can view the execution progress on the screen Tasks > Task Management > Tasks. // Not: If the switch you want to upgrade is a dual-image switch, the upgrade schedule will only upgrade the switch’s backup image. You should configure the switch to reboot with the backup image after the upgrade schedule is finished. 95 6.5 Example: Upgrade Firmware for Several Devices The following example shows how to upgrade two TP-LINK T1700G-28TQ switches at the same time. 1. Go to Config > Deploy Management > Firmware. Click Import Firmware to upload the firmware file for T1700G-28TQ. Figure 6-23 Import a firmware file Name the firmware as T1700, enter the version information and select the vendor as TP-LINK. 96 2. Select the firmware T1700 and click Upgrade to configure the deploy schedule. Figure 6-24 Edit T1700_UP upgrade schedule Basic Info Name Enter the name T1700-Up. Firmware Display the name of the firmware file. Enable password Click the checkbox to enter the device's privileged password. CLI Password Enter the default password admin. Target Devices Select Device By Select the target devices by devices or by device groups. You can choose Devices to add the two T1700G-28TQ, or choose Device Groups and add the group containing the two T1700G-28TQ. Here we take Device Groups as an example. Selected Device Groups Add Click Add to add the group T1700G-Series which contains the two T1700G-28TQ. The device group is configured on page Resource > Device Management > Device Groups. 97 Schedule Unscheduled Select Unscheduled. Click Apply to save the upgrade schedule information. 3. Go to Config > Deploy Management > Deploy Schedule. Select the upgrade schedule T1700-Up and click Execute to upgrade the two T1700G-28TQ switches. Figure 6-25 Execute T1700-Up upgrade schedule 4. Check the result in the result window. Figure 6-26 Execute T1700-Up result 98 7 View and Manage Tasks View and Manage the discovery, backup, restore and upgrade tasks on this page. This chapter covers the following topics. ·Enable/Disable the Tasks ·Remove the Tasks ·View Task Execution Results 99 7.1 View and Manage the Tasks You can view task details and execution results. You can also enable, disable and remove tasks on this page. The task types include Discovery, Configuration Backup, Configuration Restore and Firmware Upgrade. Go to Tasks > Task Management > Tasks. Figure 7-1 Task list View the Tasks Executed and to-be-executed tasks are displayed in this table. Enable Displays the status of the task. Task Name Displays the task name. Task Type The task type includes: Discovery, Config Backup, Config Restore and Firmware Upgrade. Recurrent Type The task recurrent type includes: Not Recurrent, Hourly, Daily, Weekly and monthly. Status The execution status of the task, including Succeeded, Failed and Wait to run. Last Execution Time Displays the last time when the task was executed. Next Execution Time Displays the next time when the task will be executed. Result Click Show Results to view the detailed running result of the task. Click the Detail button to view the detailed configuration of the selected tasks. 100 Enable/Disable the Tasks Click the Enable/Disable button to enable/disable the selected tasks. Only tasks in Wait to run status can be enabled or disabled. Delete the Tasks Click the Delete button to remove the selected tasks from the table. 101 8 Manage Users You can manage the users and roles on this section. • View and Manage Roles • View and Manage Users • View and Log off Users 102 8.1 View and Manage Roles The role is the permission attribute of the user. Uses with different roles have different access permissions to each configuration module of tpNMS (Resource, Monitor, Alarm, Config, Task and System). tpNMS provides the following default roles: ·Administrator. The administrator user can view and modify all the modules of tpNMS. ·Operator. The operator user can view all the modules, and can modify all the modules except the System Module. ·Observer. The observer user can only view all the modules. Go to System > User Management > Roles. Figure 8-1 View roles • View Roles • Add a Role • Modify a Role • Delete a Role View Roles Go to System > User Management > Roles. The default 3 roles are displayed in the role table. 103 Role Displays the name of the role. Default Whether the role is a system default role. Created By The Creator of the role. Created Time The created time of the role. Click the role name to view its detailed privilege to each module. Figure 8-2 Role privilege Add a Role Go to System > User Management > Roles. Click Add to create a new role with customized privileges. 104 Figure 8-3 Create a role Enter the role name and select the checkboxes to specify the role’s access privilege to each module. Click Apply to save the role’s configuration. Modify a Role Go to System > User Management > Roles. Click Edit to customize the role's privileges. 105 Figure 8-4 Modify a role Select or deselect the checkboxes to specify the role’s access privilege to each module. // Not The system default roles cannot be edited. Delete a Role Go to System > User Management > Roles. Click Delete to remove the selected roles. // Not The system default roles cannot be deleted. 8.2 View and Manage Users You can view and manage the users of tpNMS on this page. Go to System > User Management > Users. 106 Figure 8-5 User list • View Users • Add a User • Modify a User • Delete a User View Users Go to System > User Management > Users. View the users in the user table. User Name Displays the name of the user. Status Displays the status of the user. Role Displays the role of the user. The role defines the privilege of the user. Email Displays the user's email address. Created Time The created time of the user. Add a User Go to System > User Management > Users. Click Add to add a user to the user table. Enter the user’s basic information and click Apply. 107 Figure 8-6 Add a user User Name Enter the name of the user. The user name is case-sensitive. Email Enter the user's email address. Role Select the role of the user. The role defines the privilege of the user. Status Specify the status of the user as active or inactive. Password Enter the password for this user. Confirm Password Enter the password again to confirm. Modify a User Go to System > User Management > Users. Select a user and click Edit to modify a user’s configuration and click Apply. Figure 8-7 Modify a user 108 User Name Enter the name of the user. The user name is case-sensitive. Email Enter the user's email address. Role Select the role of the user. The role defines the privilege of the user. Status Specify the status of the user as active or inactive. Change Password Select the checkbox to modify the user's password. Password Enter the password for this user. Confirm Password Enter the password again to confirm. Delete a User Go to System > User Management > Users. Click Delete to remove the selected users. // Not The system default users cannot be deleted. 8.3 View and Log off Users You can view the users who are currently online and log them off. Only the administratorrole user have the privilege to log off the other online users. Go to System > User Management > Online Users. Figure 8-8 Online user list The currently online users are displayed in this table. 109 1. Select one or more users and click Force Logout. 2. Click OK in the pop-up confirm window. The selected user will be forced to log off. Figure 8-9 Log out a user 110 9 System and Global Settings You can configure tpNMS system and global settings in this section. • Device Count • Configure Email Server • Configure Idle Timeout • Configure Auto Refresh Interval • Configure Data Retention • Icons in the Upper-Right Region 111 9.1 Device Count You can view the number of devices being managed currently. tpNMS can manage up to 200 devices simultaneously. Go to System > Device Count > Device Count to view the managed device count. Figure 9-1 View device count Current Managed Displayed the number of devices currently managed by tpNMS. Maximum Allowed The maximum devices tpNMS can managed simultaneously. By default it’s 200. Percentage The ratio of managed devices to total allowed device. 9.2 Configure Email Server Configure the sender email information for sending notification emails when the configured alarms are triggered. 112 1. Go to System > System Settings > Email Server. Figure 9-2 Configure email server settings 2. Enter your SMTP server address in the SMTP Server field. For example: smtp.gmail.com. 3. Enter your email address in the Sender Address field. For example: jerry@gmail.com. 4. If you want to encrypt the data sent from the server, select the Use Secure Connect (SSL) check box. 5. Enter your SMTP server port in the Server Port field. 6. If your SMTP server requires authentication, select the Need Check Authority check box and enter your user name and password for your email account. 7. Click the Test button to verify your email server settings. 8. Click the Save button to save your email server settings. 9.3 Configure Idle Timeout Configure the idle timeout on this page. If the user has no operations on tpNMS within the timeout period, the application will log the user out automatically. The default idle timeout is 5 minutes. Go to System > System Settings > Idle Timeout. 113 Figure 9-3 Configure the idle timeout Select the idle timeout and click Apply to save your configuration. 9.4 Configure Auto Refresh Interval Configure the frequency that tpNMS refreshes the browser screen for the web management interface. By default the web refreshes every 30 seconds. Go to System > System Settings > Auto Refresh. Figure 9-4 Configure the refresh interval Select the auto refresh interval and click Apply to save your configuration. 9.5 Configure Data Retention Configure how long tpNMS retains your network data. The longer the data are retained, the more disk space is required on the tpNMS server. Different types of information can be specified with different data retention periods. Go to System > System Settings > Data Retention. 114 Figure 9-5 Configure the data retention period Enter the data retention period for these types of data and click Apply to save your configuration. 9.6 Icons in the Upper-Right Region The following introduces the shortcut icons on the upper-right area of tpNMS. • Notification Messages • Current Alarms • System Information • Current Account • Log out Notification Messages Click the envelope icon to view the system notifications. The application generates a notification when a backup/restore/upgrade task is completed. The number in the redcolored circle on the top of the envelope icon generated notifications. 115 indicates the number of the newly Figure 9-6 System notifications Current Alarms Four shortcut icons represent the current four level alarms. The color represents the severity, while red represents the highest level severity and blue represents the lowest severity. The numbers beside these icons represent each alarm’s current quantity. • Urgent (Red) • Serious (Orange) • Normal (Yellow) • Hint (Blue) Click the alarm icon to view the alarm’s detail information. System Information Click the icon to view tpNMS's version and copyright information. 116 Figure 9-7 Version and Copyright Current Account Click the user name to view and edit the information of the current user. Figure 9-8 Current user Log out Click the icon to log out tpNMS. 117
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.7 Linearized : No Tagged PDF : Yes XMP Toolkit : Adobe XMP Core 5.4-c005 78.147326, 2012/08/23-13:03:03 Create Date : 2016:06:12 10:58:26+08:00 Metadata Date : 2016:06:13 10:02:41+08:00 Modify Date : 2016:06:13 10:02:41+08:00 Creator Tool : Adobe InDesign CC (Windows) Instance ID : uuid:9b843930-0543-4ba6-af7a-52bb561a584c Original Document ID : xmp.did:065405c0-55dc-eb4f-b42b-bfb41f8e0dcd Document ID : xmp.id:11518e8a-991b-3f47-a11c-c2118f5fe440 Rendition Class : proof:pdf Derived From Instance ID : xmp.iid:8ccc8e0f-5609-8243-a36f-a5564ec4ab87 Derived From Document ID : xmp.did:1a3776a8-b5c1-9344-be19-8a9faf0017e6 Derived From Original Document ID: xmp.did:065405c0-55dc-eb4f-b42b-bfb41f8e0dcd Derived From Rendition Class : default History Action : converted History Parameters : from application/x-indesign to application/pdf History Software Agent : Adobe InDesign CC (Windows) History Changed : / History When : 2016:06:12 10:58:26+08:00 Format : application/pdf Producer : Adobe PDF Library 11.0 Trapped : False Page Mode : UseOutlines Page Count : 123 Creator : Adobe InDesign CC (Windows)EXIF Metadata provided by EXIF.tools