Altai Certification Training AWMS

Slides:



Advertisements
Similar presentations
Microsoft® Lync™ 2010 IM and Presence Training
Advertisements

T-Mon SERVER CONNECTOR
11 ©Copyright By D-Link HQ TSD James Chu Smart III Switch Smart Console Utility Ver 2.
FILEMAKER SERVER SOFTWARE & REMOTE ADMINISTRATION
Microsoft ® Lync ™ 2010 IM and Presence Training.
User Training. Step 1 Press Ctrl-I or choose File > Login, this will open the Login window. Figure 1-1 shows the Login window. Figure 1-1 Login Window.
Web Filtering. ExchangeDefender Web Filtering provides policy-controlled protection from dangerous content on the web. Web Filtering is agent based, allowing.
DAP-1520 FAQ’s Wireless AC750 Dual Band Range Extender.
DNR-322L & DNR-326.
DSL-2870B How to Change ADSL Username and Password in your modem router How to Change Wireless Channel in your modem router How to Open Ports in your modem.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
Unauthorized Reproduction Prohibited SkyPoint Alarm Integration Add-On Using OnGuard Alarms to create events in SkyPoint Also called ‘SkyPoint V0’ CR4400.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Michael Donovan, River Campus Libraries – 12/03 DocuShare Overview and Training.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
SETUP AND CONFIGURATIONS WEBLOGIC SERVER. 1.Weblogic Installation 2.Creating domain through configuration wizard 3.Creating domain using existing template.
Confidential property of Belkin International. Unlawful to copy or reproduce in any manner without the express written consent of Belkin International.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
South Dakota Library Network MetaLib Management Basics IP Ranges / Proxy Servers South Dakota Library Network 1200 University, Unit 9672 Spearfish, SD.
Sharepoint Portal Server Basics. Introduction Sharepoint server belongs to Microsoft family of servers Integrated suite of server capabilities Hosted.
© Copyright 2013 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Basic Administrator Training – Release Entities.
HiVision SNMP Software.
Ch 8-3 Working with domains and Active Directory.
Hosted Exchange The purpose of this Startup Guide is to familiarize you with ExchangeDefender's Exchange and SharePoint Hosting. ExchangeDefender.
Ch 11 Managing System Reliability and Availability 1.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
Back to content Final Presentation Mr. Phay Sok Thea, class “2B”, group 3, Networking Topic: Mail Client “Outlook Express” *At the end of the presentation.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Copyright ®xSpring Pte Ltd, All rights reserved Versions DateVersionDescriptionAuthor May First version. Modified from Enterprise edition.NBL.
By: Amber Shepard   Microsoft Outlook is an client and personal information manager (PIM) that's available as part of Microsoft's Office suite.
System Administration and Basic Functionality Version 4.0 – September 2007 Q-Advisor Quick Start.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
WavioNet 2.0. Proprietary Information. 2 Objective Introduce WavioNet application NMS Learn how to perform basic device management Understand WavioNet.
Creating a Web Site to Gather Data and Conduct Research.
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
Smart PSS Associate Certified Class Dahua Security Certification
TEAM Basic TotalElectrostatic ManagementAwareness&
EMerge Browser Managed Security Platform Module 3: Startup eMerge Certification Course  Physical connection  TCP/IP Characteristics of PC  Initial connection.
1. Insert the Resource CD into your CD-ROM drive, click Start and choose Run. In the field that appears, enter F:\XXX\Setup.exe (if “F” is the letter of.
INSTALLATION HANDS-ON. Page 2 About the Hands-On This hands-on section is structured in a way, that it allows you to work independently, but still giving.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Local Alarm Station Data Acquisition, Storage and Visualization for Radiation Portal Monitor (RPM).
A Brief Documentation.  Provides basic information about connection, server, and client.
Chapter 10 Chapter 10: Managing the Distributed File System, Disk Quotas, and Software Installation.
Table of Contents TopicSlide Administrator Login 2 Administrator Navigations 3 Managing AlternativeDr.com Blogs 4 Managing Dr. Lloyd May Blogs 5 Managing.
How to Deploy and Configure the Smart Net Total Care CSPC Collector
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
Wimba Pronto Setting Pronto Preferences of the ND University System April 2009.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring Windows Server 2008 Printing.
As a distinctive management software product, DN4 platform can provide useful and convenient remote management and inquiry services. Through DN4, users.
Active-HDL Server Farm Course 11. All materials updated on: September 30, 2004 Outline 1.Introduction 2.Advantages 3.Requirements 4.Installation 5.Architecture.
Run the on your PC to start the firmware configuration process Run IP Config Tool.
Maintaining and Updating Windows Server 2008 Lesson 8.
Joomla Awdhesh Kumar Singsys Pte Ltd. What is Joomla? Joomla is an award-winning content management system (CMS), which enables you to build Web sites.
How to use Drupal Awdhesh Kumar (Team Leader) Presentation Topic.
CLINIC-LAB COMMUNICATION Configuring 3Shape Communicate™
Installation The Intercompany Integration Solution for SAP Business One Version 2.0 for SAP Business One 9.1 Welcome to the course on the installation.
Project Management: Messages
CS3015 Beacon Module 4 Messenger & Setting Preferences
Installation The Intercompany Integration Solution for SAP Business One Version 2.0 for SAP Business One 9.1 Welcome to the course on the installation.
Administering Your Network
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
Awareness Training… V 1.1.
Administrator’s Manual
How to install and manage exchange server 2010 OP Saklani.
Presentation transcript:

Altai Certification Training AWMS Altai Super WiFi Altai Certification Training AWMS Professional Services Altai Technologies Limited Apr, 2013

Content AWMS Introduction AWMS Features Highlight AWMS Architecture AWMS Network Configuration Platform Requirement AWMS Installation AWMS License Activations AWMS Proxy/CCS/CCC Startup

Content AWMS Operation AWMS Proxy registration and NE finding Topology Management (Map) Configuration Management (NE Provisioning) Alarm management (Filtering, Ack) Performance Management (Report generation) Security Management (Role setting) Software Management (Firmware upgrade) System backup and restoration Scheduled Tasks

AWMS Introduction

AWMS Features Configuration Management Fault Management Performance Management Security Management Firmware Management

AWMS Architecture Central Control Server (CCS) Proxy Server Central Control Client (CCC) Central Control Client (CCC) Central Control Server (CCS) Configuration Management Fault Management Software Management Security Management Proxy Server Proxy Server SNMP Manager SNMP Manager A8 A2 C1 B5 A8n A2 C1 B5

AWMS Network Configuration

Platform Requirement MySQL5.0.96 MySQL5.0.96 MySQL5.0.96 MySQL5.0.96

Platform Requirement Altai All AP Device Altai All AP Device

AWMS Installation

AWMS Installation 1. Install the following applications before install AWMS - MySQL 5.0 (It is in awms_installer_3.2.3.6>Third Party Installers) - JDK 1.4.2 or 1.5.0 (It is in awms_installer_v3.2.3.6>Setup Files>conf>installers) - Microsoft .Net Framework 2.0 (It is in awms_installer_v3.2.3.6>Setup Files>conf>installers) 2. Install Central Control Server and Proxy Server - Install them in the same computer. - Install them in separate computers. 3. Install Central Control Client 4. Importing license file

AWMS Installation The Missing Required software

AWMS Installation (MySQL Instal)

AWMS Installation (MySQL Instal)

AWMS Installation (MySQL Instal)

AWMS Installation (MySQL Instal)

AWMS Installation (MySQL Instal)

AWMS Installation MySQL and JDK version should match to the required one. You can check it from below screenshot.

AWMS Installation

AWMS Installation

AWMS Installation

AWMS Installation(Configure)

AWMS Installation(Configure) Customize the MySQL DB User Name and Password.

AWMS Installation(Configure)

AWMS Installation(Configure)

AWMS Installation(Configure)

AWMS License activation

AWMS License activation

AWMS License activation

Launch the AWMS AWMS CCS and Proxy can be launched by selecting start->all programs->AWMS->Central control server And start->all programs->AWMS->proxy server respectively. “CCS is started”

Launch the AWMS Proxy is started

AWMS Client Startup AWMS default root user is: Username: root Password: ims

AWMS GUI Main Window

AWMS Operations

SNMP Setup In AP (A2 and C1 GUI is shown) Before operating the AWMS, make sure the SNMP Setup have been finished in AP and keep AP and AWMS client in same IP segment. Below is an example for SNMP setup in AP. Enabled SNMP Read/Write Community are SNMP access security strings Access Subnet IP/Mask: AWMS proxy domain Notification Server: AWMS proxy IP address

Make sure the items below are same with the snmpv3 file. Automatic NE Discovery—SNMP V3 For B5/B5Lite/B5 CPE SNMP v3 configuration of B5 1 Make sure the items below are same with the snmpv3 file. 2 3 4 6 5 7

Automatic NE Discovery—SNMP V3 For B5/B5Lite/B5 CPE Go to the AWMS installation path “Altai Technologies>AWMS>Proxy” and you can find the file name snmpv3. Open it in txt and make sure or change the configurations are same with the configuration of B5/B5Lite/B5 CPE. The parameters includes username, password, security, privacy password, privacy protocol. After changing the parameters in this file, you need to save it and restart AWMS proxy

AWMS Proxy Registration, NE finding Select Proxy->Add Proxy… and bring up the Proxy Registration window. Under the tab Description, configure the following properly: Proxy Name: The name of the Proxy name. Description: A brief description for the corresponding Proxy Server. (Optional) IP Address: The IP address of the Proxy Server. In-Service: Status of the Proxy Server. The Proxy Server is active when the box is checked under the CCS, otherwise it is inactive.

AWMS Proxy Registration, NE finding

AWMS Proxy Registration, NE finding After the box of “SNMP Discovery Enabled” is checked, the following can be configured under Configuration Task: Start IP: The beginning IP address of the IP address range. The range of IP addresses is used to define the managed area under the Proxy Server. End IP: The end IP address of the IP address range. Net Mask: The subnet mask of the IP address range. Read Community String: Allows AWMS to issue “Get” and “GetNext” messages through SNMP. This value should be the same as the corresponding value in NE, otherwise AWMS cannot read the configuration from the NE. By default, the value is public. Write Community String: Allows AWMS to issue “Set” messages through SNMP. This value should be same as the corresponding value in NE, otherwise AWMS cannot write the configuration from the NE. By default, the value is netman. Port: The port for the Proxy Server to communicate with NEs. By default, the value is 161.

Automatic NE Discovery—SNMP V2c For A8n/A8/A2N/C1/C1n In Proxies and Maps Tree, select one proxy to discover NEs. Right click, select Proxy Registration… Uncheck “In-Service” checkbox and click “Save” button. Switch to the SNMP Discovery Configuration tab, fill in Start IP, End IP… Click the “Add” button. Click “Save” button. Put the registered proxy in service NOTE: Proxy Sever should not be In-Service before proceed to the SNMP Discovery Configuration since it cannot be modified if the corresponding Proxy Server is in service.

Automatic NE Discovery—SNMP V3 For B5/B5Lite/B5 CPE In Proxies and Maps Tree, select one proxy to discover NEs. Right click, select Proxy Registration… Uncheck “In-Service” checkbox and click “Save” button. Switch to the SNMP Discovery Configuration tab, fill in Start IP, End IP… Click the “Add” button. Click “Save” button. Put the registered proxy in service NOTE: Proxy Sever should not be In-Service before proceed to the SNMP Discovery Configuration since it cannot be modified if the corresponding Proxy Server is in service.

AWMS Proxy Registration, NE finding After configuring the CCS and the Proxy (in service) properly, the Proxy will begin NE discovery automatically. When the Proxy(s) discovers unregistered NEs, the NEs will be shown as Unregistered NEs under the defined Proxy in the Network Topology Tree. Select the Unregistered NE, Right Click, select on “Register As Managed”. Then you can use AWMS to manage the AP.

NE Registration Managed: The NE you want to manage. Can be configured by AWMS. External: The NE is not part of managed network. Rogue: The unauthorized NE which may potentially be a security breach.

Topology Management Adding Map Add NE to Map Grouping NE by Map

Topology Management(Map) To add a new map in AWMS Client, 1. Select Topology->Add Map… from the main menu. 2. Under the Map Basic Information, configure the following properly, then click Next>.

Topology Management(Map)

Topology Management(Map)

Topology Management(Map)

Topology Management(Map) Please click a point with known coordinate! 3 reference points should be as far as possible, better at the three corners of the map, to provide better calibration result.

Put NE on the Network Map by drag and drop Network topology and NE locations are shown clearly in network map for easy monitoring

Network Element Grouping NE can be grouped by different geographical locations

Configuration Management Single/mass NE configuration Template based configuration

Configuration Management (NE Provisioning)

Right click, select NE Configuration Single/mass NE configuration Right click, select NE Configuration

Template Based Configuration Multiple NE can be configuration at the same time Template can be selected at ease Different configuration templates can be created and edited

Fault Management Real-time alarm collection and reporting Visual fault alert via network map Alarm acknowledgement and forced deletion Alarm email alert Event logging Historical alarm tracking and reporting Alarm SNMP trap for Northbound integration

Real-time Alarm Reporting Alarm severity at different colors can be easily seen at a glance Detailed list of alarms

Visual Network Fault via Network Map Alarm locations can be easily identified by referring to the network map Details of NE alarm can be shown by clicking the icon Location of NE can be shown in network map by clicking the list

Alarm Management (Filtering, ACK)

Performance Management (Report generation)

Performance Management (Report generation)

Performance Management (Report generation)

Performance Management (Report generation)

Performance Management (Report generation)

Performance Management (Report generation)

Security Management(Role Setting) In the Function Set List, there are four defined function sets: 1. Monitor users could only monitor the status of the network and acknowledge the alarms. 2. Besides monitoring the network, Operator users are allowed to have some levels of access right of configuration. 3. Admin users have even higher access right of configuration than Operator users. 4. Root users not only have the access right to configure all the settings but also could create new user accounts and function sets.

Security Management(Role Setting) Besides the four defined function sets, users can create their own function sets: 1. Right click anywhere on the Function Set List window and select Add Function Set….Alternatively click Add… bottom in the right-lower corner of the Function Set List window. 2. Enter Function Set Name and Description in the pop-up Create Function Set window. 3. Select the Authorized Functions that you want to include in this function set. 4. Click Save to save the setting, click Cancel to quit without save.

Security Management(Role Setting) In order to add a new user account, 1. Right click on anywhere of the User Management interface, select Add User…. Alternatively, select Administration->Add User…. 2. Enter Username, Full Name, Description and Password. Select the proper Function Set. 3. Click OK to save.

Software Management (firmware upgrade) 1.Select the NE(s) you wish to upgrade from the Network Topology Tree View. All the NEs selected must match the criteria specified above in order for the option to be available. 2. Right-click on the NE and select More Options->Update Firmware… (or from the main menu, select Network Element->More Options->Update Firmware…) to bring up the (Mass) Firmware Upgrade window:

Software Management (firmware upgrade) 3. The existing firmware versions of the selected NEs are shown in the Current Firmware section and the available firmware choices are shown in the Upgradable Firmware section below. Choose a single firmware that will be used to upgrade all of the listed NEs. 4. Click Upgrade button.

Software Management (firmware upgrade)

System backup and restoration

System backup and restoration

Scheduled Tasks

Scheduled Tasks

Firmware Management AWMS allows users to do NE firmware upgrade in a scope of a NE or the whole network

END of Document