Page 2
The information in this document is subject to change without notice. All contents in this document, including statements, information, and recommendations, are believed to be accurate, but they are presented without warranty of any kind, express or implied. H3C shall not be liable for technical or editorial errors or omissions contained herein.
Page 3
Preface The H3C Access Points documentation set includes eight configuration guides. These guides describe the software features for the H3C Access Points and guide you through the software configuration procedures. These guides also provide configuration examples to help you apply software features to different network scenarios.
Page 4
Convention Description A line that starts with a pound (#) sign is comments. GUI conventions Convention Description Window names, button names, field names, and menu items are in Boldface. For Boldface example, the New User window appears; click OK. > Multi-level menus are separated by angle brackets.
Page 5
It is normal that the port numbers, sample output, screenshots, and other information in the examples differ from what you have on your device. Documentation feedback You can e-mail your comments about product documentation to info@h3c.com. We appreciate your comments.
Contents Using the CLI ································································································································································ 1 Command conventions ····················································································································································· 1 Using the undo form of a command ······························································································································· 2 CLI views ············································································································································································ 2 Entering system view from user view ······················································································································ 3 Returning to the upper-level view from any view ·································································································· 3 ...
Using the CLI At the command-line interface (CLI), you can enter text commands to configure, manage, and monitor your device. Figure 1 CLI example You can log in to the CLI in a variety of ways. For example, you can log in through the console port, or using Telnet or SSH.
time date The following example analyzes the syntax of the clock datetime command according to Table Figure 2 Understanding command-line parameters For example, to set the system time to 10:30:20, February 23, 2010, enter the following command line at the CLI and press Enter: <Sysname>...
Figure 3 CLI view hierarchy Entering system view from user view Task Command Enter system view from user view. system-view Returning to the upper-level view from any view Task Command Return to the upper-level view from any view. quit Executing the quit command in user view terminates your connection to the device. In public key code view, use the public-key-code end command to return to the upper-level view (public key view).
Accessing the CLI online help The CLI online help is context sensitive. You can enter a question mark at any prompt or in any position of a command to display all available options. To access the CLI online help, use one of the following methods: Enter a question mark at a view prompt to display the first keyword of every command available in •...
Entering a command When you enter a command, you can use keys or hotkeys to edit the command line, or use abbreviated keywords or keyword aliases. Editing a command line Use the keys listed in Table 2 or the hotkeys listed in Table 3 to edit a command line.
Configuring and using command keyword aliases The command keyword alias function allows you to replace the first keyword of a non-undo command or the second keyword of an undo command with your preferred keyword when you execute the command. For example, if you configure show as the alias for the display keyword, you can enter show in place of display to execute a display command.
Step Command Remarks Ctrl+T or Ctrl+U. Optional. display hotkey [ | { begin | Display hotkeys. exclude | include } Available in any view. See Table 3 regular-expression for hotkeys reserved by the system. The hotkeys in Table 3 are defined by the device. If a hotkey is also defined by the terminal software that you are using to interact with the device, the definition of the terminal software takes effect.
output such as logs. If you have entered nothing, the system does not display the command-line prompt after the output. To enable redisplaying entered-but-not-submitted commands: Step Command Remarks Enter system view. system-view By default, this feature is disabled. Enable redisplaying For more information about this entered-but-not-submitted info-center synchronous...
By default, the command history buffer can save up to 10 commands for each user. To set the capacity of the command history buffer for the current user interface, use the history-command max-size command. Viewing history commands You can use arrow keys to access history commands in Windows 200x and Windows XP Terminal or Telnet.
Table 5 Keys for controlling output Keys Function Space Displays the next screen. Enter Displays the next line. Ctrl+C Stops the display and cancels the command execution. <PageUp> Displays the previous page. <PageDown> Displays the next page. To display all output at one time and refresh the screen continuously until the last screen is displayed: Task Command Remarks...
Page 17
Character Meaning Examples character, and a blank. Matches the preceding character or "zo*" matches "z" and "zoo", and "(zo)*" matches character group zero or multiple "zo" and "zozo". times. Matches the preceding character or character group one or multiple "zo+" matches "zo" and "zoo", but not "z". times Matches the preceding or "def|int"...
Page 18
Character Meaning Examples character1character2. Matches character1, "\ba" matches "-a" with "-" being character1 can be any character character2, \bcharacter2 "a" being but it does not match "2a" or except number, letter or underline, "ba" and \b equals [^A-Za-z0-9_]. Matches a string containing "\Bt"...
Configuring user privilege and command levels To avoid unauthorized access, the device defines the user privilege levels and command levels in Table 7. User privilege levels correspond to command levels. A user logged in with a specific privilege level can use only the commands at that level or lower levels. Table 7 Command levels and user privilege levels Level Privilege...
Page 20
Step Command Remarks By default, the authentication mode Specify the scheme for VTY users is password, and no authentication-mode scheme authentication mode. authentication is needed for console login users. Return to system view. quit This task is required only for SSH Configure the Security For more information, see...
Page 21
Step Command Remarks first-num1 user-interface { Enter user interface view. last-num1 first-num2 ] | vty last-num2 By default, the authentication mode Enable the scheme for VTY users is password, and no authentication-mode scheme authentication mode. authentication is needed for console users. By default, the user privilege level for users logged in through the Configure the user privilege...
# Configure the device to perform no authentication for Telnet users, and to authorize authenticated Telnet users to use level-0 and level- 1 commands. (Use no authentication mode only in a secure network environment.) <Sysname> system-view [Sysname] user-interface vty 0 4 [Sysname-ui-vty0-4] authentication-mode none [Sysname-ui-vty0-4] user privilege level 1 # Display the commands a Telnet user can use after login.
Page 23
To avoid problems, H3C recommends that administrators log in with a lower privilege level to view switch operating parameters, and switch to a higher level temporarily only when they must maintain the device. When administrators must leave for a while or ask someone else to manage the device temporarily, they can switch to a lower privilege level before they leave to restrict the operation by others.
Page 24
Step Command Remarks If no user privilege level is specified when you configure the command, the user privilege level defaults to If local-only authentication is used, a console user interface user can switch to a higher privilege level, even if the privilege level has not been assigned a password. Switching to a higher user privilege level Before you switch to a higher user privilege level, obtain the required authentication data as described Table...
Login Level switching Information required for the Information required for the authentication authentication first authentication mode second authentication mode mode mode username as the privilege level switching username. Password for privilege level switching configured on the AAA Password configured on the scheme local server.
Page 26
Contents Login overview ····························································································································································· 1 Login methods at a glance ··············································································································································· 1 CLI user interfaces ····························································································································································· 2 User interface assignment ········································································································································ 2 User interface identification ···································································································································· 2 Logging in to the CLI ···················································································································································· 3 Logging in through the console port for the first time ····································································································...
Page 27
Configuration procedure ······································································································································ 34 SNMP login control configuration example ······································································································· 35 Configuring Web login control ···································································································································· 36 Configuring source IP-based Web login control ································································································ 36 Logging off online Web users ······························································································································ 36 Web login control configuration example ·········································································································· 37 ...
Login overview This chapter describes the available login methods and introduces the related concepts. Login methods at a glance You can access the device by using the methods in Table Table 1 Login methods Login method Default setting and configuration requirements Logging in to the CLI: Logging in through the console...
CLI user interfaces The device uses user interfaces (also called "lines") to control CLI logins and monitor CLI sessions. You can configure access control settings, including authentication, user privilege, and login redirect on user interfaces. After users are logged in, their actions must be compliant with the settings on the user interfaces assigned to them.
Logging in to the CLI By default, you can access the CLI through the console port or Telnet. The following matrix shows the supported console port types: Hardware Console port WA4320-ACN Common console port WA4320H-ACN Mini USB port WA4320i-ACN Common console port WA4320-ACN-PI Not provided WA4620i-ACN/WA4620E-ACN...
Page 31
Figure 1 Connecting a terminal to the console port If the PC is off, turn on the PC. Launch the terminal emulation program and configure the communication properties on the PC. Figure 2 through Figure 4 show the configuration procedure on Windows XP HyperTerminal. Make sure the port settings are the same as listed in Table On Windows Server 2003, add the HyperTerminal program first, and then log in to and manage...
Figure 4 Setting the properties of the serial port Power on the device and press Enter at the prompt. The default user view prompt <WA4620i-ACN> appears. You can enter commands to configure or manage the device. To get help, enter ?. Configuring console login control settings The following authentication modes are available for controlling console logins: None—Requires no authentication.
Authentication Configuration tasks Reference mode Enable scheme authentication on the console user interface. Configure local or remote authentication settings. To configure local authentication: Configure a local user and specify the password. "Configuring scheme Configure the device to use local authentication. Scheme authentication for console To configure remote authentication:...
Step Command Remarks password { cipher | simple } Configure common settings "Configuring common console Optional. for console login. user interface settings (optional)." The next time you attempt to log in through the console port, you must provide the configured login password.
Step Command Remarks Optional. By default, command accounting is Enable command command accounting disabled, and the accounting server accounting. does not record the commands executed by users. Exit to system view. quit Optional. By default, local authentication is Enter ISP domain view: used.
Page 36
By default, the terminal display type is ANSI. The device supports two types of terminal display: ANSI and VT100. H3C recommends setting the display type of both the device and the terminal to VT100. If the device and Specify the terminal display...
Logging in through Telnet You can Telnet to the device for remote management, or use the device as a Telnet client to Telnet to other devices, as shown in Figure Figure 5 Telnet login By default, Telnet service is enabled. The IP address is 192.168.0.50.
Authentication Configuration tasks Reference mode interface. authentication for Telnet login" Set a password. Enable scheme authentication on the VTY user interface. Configure local or remote authentication settings. To configure local authentication: Configure a local user and specify the password. Configure the device to use local authentication. "Configuring scheme To configure remote authentication: Scheme...
Step Command Remarks Enter system view. system-view By default, the Telnet server Enable Telnet server. telnet server enable function is enabled. Enter one or multiple VTY first number user-interface vty user interface views. last-number By default, password Enable password authentication-mode password authentication is enabled for authentication.
Page 40
Step Command Remarks By default, the Telnet server function is Enable Telnet server. telnet server enable enabled. Enter one or multiple VTY first number user-interface vty user interface views. last-number By default, password authentication is enabled for VTY user interfaces. Whether local, RADIUS, or Enable scheme HWTACACS authentication is adopted...
Step Command Remarks settings for VTY user interface settings (optional)." interfaces. The next time you attempt to Telnet to the CLI, you must provide the configured login username and password. If you are required to pass a second authentication, you must also provide the correct password to access the CLI.
Step Command Remarks The system automatically terminates the user's connection if there is no information interaction between the device and the user within the timeout time. Setting idle-timeout to 0 disables the timer. Optional. By default, no automatically executed command is specified. The command auto-execute Specify a command to be function is typically used for...
Step Command Remarks • Log in to an IPv4 Telnet server: remote-host telnet service-port ] [ source interface-type { interface interface-number | ip Use the device to log in to a ip-address Use either command. Telnet server. • Log in to an IPv6 Telnet server: remote-host telnet ipv6 [ -i...
Page 44
Command accounting allows the HWTACACS server to record all commands executed by users, regardless of command execution results. This function helps control and monitor user behaviors on the device. If command accounting is enabled and command authorization is not enabled, every executed command is recorded on the HWTACACS server.
Step Command Remarks Optional. Enter the ISP domain view: domain-name domain For local authentication, configure local user accounts. Apply the specified AAA scheme to the domain: For RADIUS or HWTACACS authentication default authentication, configure the Apply an AAA authentication { hwtacacs-scheme RADIUS or HWTACACS scheme hwtacacs-scheme-name scheme to the intended...
Task Command Remarks server argument represents the IPv6 address or server Log in to an IPv6 SSH server. ssh2 ipv6 host name of the server. To work with the SSH server, you might need to configure the SSH client. For information about Security Configuration Guide configuring the SSH client, see Displaying and maintaining CLI login...
Logging in to the Web interface The device provides a built-in Web server for you to configure the device through a Web browser. Web login is enabled by default. The IP address is 192.168.0.50. • The login username is admin. •...
Step Command Remarks Enter system view. system-view By default, the HTTP service is Enable the HTTP service. ip http enable enabled. Optional. The default HTTP service port Configure the HTTP service number is 80. port-number ip http port port number. If you execute the command multiple times, the last one takes effect.
Page 49
by the device itself, rather than a CA) and the default SSL settings. This mode is simple to configure but has potential security risks. Secure mode—To make the device operate in this mode, you must enable HTTPS service on the •...
Page 50
Step Command Remarks and the HTTPS service cannot be started. In that case, execute this command multiple times to start the HTTPS service. Optional. By default, the HTTPS service is not associated with any certificate-based attribute access control policy. The device uses the associated policy to control client access rights.
Step Command Remarks terminated. Set the Web user minutes web idle-timeout Optional. connection timeout time. Set the size of the buffer for pieces web logbuffer size Optional. Web login logging. Create a local user and user-name local-user enter local user view. Configure a password for password { cipher | simple } the local user.
Figure 9 Network diagram Configuration procedure Configure the AP: # Create VLAN-interface 1. <Sysname> system-view [Sysname] interface vlan-interface 1 # Assign the IP address 192.168.0.58/24 to the interface. [Sysname-VLAN-interface1] ip address 192.168.0.58 255.255.255.0 [Sysname-VLAN-interface1] quit # Create a local user named admin, and set the password to admin for the user. Specify the Web service type for the local user, and set the command level to 3 for this user.
Figure 10 Web login page # Enter the user name, password, verify code, select English, and click Login. The homepage appears. After login, you can configure the AP through the Web interface. HTTPS login configuration example Network requirements As shown in Figure 1 1, to allow only authorized users to access the AP's Web interface, configure the AP as the HTTPS server and the host as the HTTPS client.
Page 54
<AP> system-view [AP] pki entity en [AP-pki-entity-en] common-name http-server1 [AP-pki-entity-en] fqdn ssl.security.com [AP-pki-entity-en] quit # Create a PKI domain, specify the trusted CA as new-ca, the URL of the server for certificate request as http://10.1.2.2/certsrv/mscep/mscep.dll, authority for certificate request as RA, and the entity for certificate request as en.
Page 55
# Create certificate attribute-based access control policy myacp and configure a certificate attribute-based access control rule, specifying that a certificate is considered valid when it matches an attribute rule in certificate attribute group myacp. [AP] pki certificate access-control-policy myacp [AP-pki-cert-acp-myacp] rule 1 permit mygroup1 [AP-pki-cert-acp-myacp] quit # Associate the HTTPS service with SSL server policy myssl.
Logging in through SNMP You can run SNMP on an NMS to access the device MIB and perform GET and SET operations to manage and monitor the device. The device supports SNMPv1, SNMPv2c, and SNMPv3, and can work with various network management software products, including IMC. For more information about SNMP, Network Management and Monitoring Configuration Guide By default, SNMP access is disabled.
SNMP login example Network requirements Configure the AP and network management station so you can remotely manage the AP through SNMPv3. Figure 13 Network diagram Configuration procedure Configure the AP: # Assign an IP address to the AP. Make sure the AP and the NMS can reach each other. (Details not shown.) # Enter system view.
Controlling user logins To harden device security, use ACLs to prevent unauthorized logins. For more information about ACLs, ACL and QoS Configuration Guide. Controlling Telnet logins Use a basic ACL (2000 to 2999) to filter Telnet traffic by source IP address. Use an advanced ACL (3000 to 3999) to filter Telnet traffic by source and/or destination IP address.
Step Command Remarks Enter system view. system-view Create an advanced ACL and acl-number acl [ ipv6 ] number By default, no advanced ACL enter its view, or enter the view name [ name ] [ match-order exists. of an existing advanced ACL. { config | auto } ] rule-id rule [...
Web login control configuration example Network requirements Configure the AP in Figure 16 to provide Web access service only to Host B. Figure 16 Network diagram Configuration procedure # Create ACL 2000, and configure rule 1 to permit packets sourced from Host B. <Sysname>...
Page 65
Contents Configuring FTP ···························································································································································· 1 Using the device as an FTP client ···································································································································· 1 Establishing an FTP connection ······························································································································· 1 Managing directories on the FTP server ················································································································ 2 Working with the files on the FTP server ················································································································ 3 ...
Configuring FTP File Transfer Protocol (FTP) is an application layer protocol based on the client/server model. It is used to transfer files from one host to another over a TCP/IP network. FTP server uses TCP port 20 to transfer data and TCP port 21 to transfer control commands. For more information about FTP, see RFC 959.
IP address is used as the source IP address for the FTP packets sent by the device. The source interface and source IP address settings overwrite each other. The ftp client source command setting applies to all FTP sessions. When you set up an FTP session using the ftp or ftp ipv6 command, you can also specify a different source IP address for the FTP session.
Task Command Display detailed information about a directory or file on the FTP remotefile localfile dir [ server. remotefile localfile Query a directory or file on the FTP server. ls [ directory Change the working directory on the FTP server. cd { | ..
Task Command Remarks Download a file from the FTP remotefile localfile server. Switching to another user account After you log in to the FTP server with one user account, you can switch to another user account to get a different privilege without reestablishing the FTP connection. You must correctly enter the new username and password.
Page 70
Download the system software image file wa2600a_fat.bin from the FTP server to the AP. • • Upload the configuration file startup.cfg from the AP to the FTP server for backup. Figure 2 Network diagram Configuration procedure # Examine the storage space of the AP for insufficiency or impairment. If no sufficient free space is file available, use the fixdisk command to fix the storage medium or use the delete/unreserved command to delete unused files.
<Sysname> boot-loader file wa2600a_fat.bin main IMPORTANT: The system software image file used for the next startup must be saved in the root directory of the storage medium. You can copy or move a file to the root directory. # Reboot the AP to upgrade the system software image. <Sysname>...
Configuring TFTP Trivial File Transfer Protocol (TFTP) is a simplified version of FTP for file transfer over secure reliable networks. TFTP uses UDP port 69 for connection establishment and data transmission. In contrast to TCP-based FTP, TFTP requires no authentication or complex message exchanges, and is easier to deploy. TFTP supports the following transfer modes: Binary mode—Used to transfer image files, such as .bin files.
To use the device as a TFTP client: Step Command Remarks Enter system view. system-view Optional. Use an ACL to control the acl-number tftp-server [ ipv6 ] acl By default, no ACL is used for client's access to TFTP servers. access control.
Page 74
Figure 4 Network diagram Configuration procedure This configuration procedure assumes that the PC and the AP can reach each other. Configure the PC (TFTP server): Enable the TFTP server. (Details not shown.) Configure a TFTP working directory. (Details not shown.) Configure the AP (TFTP client): # Examine the storage medium of the AP for insufficiency or impairment.
Page 75
Contents Managing the file system ············································································································································ 1 Overview ············································································································································································ 1 File name formats ····················································································································································· 1 Managing files ·································································································································································· 1 Displaying file information ······································································································································ 2 Displaying the contents of a file ······························································································································ 2 Renaming a file ························································································································································· 2 ...
Managing the file system Overview This chapter describes how to manage the device's file system, including the storage media, directories, and files. File name formats When you specify a file, enter the file name in one of the formats shown in Table 1.
Displaying file information Perform this task in user view. Task Command file Display file or directory information. dir [ /all ] [ | /all-filesystems ] Displaying the contents of a file Perform this task in user view. Task Command Remarks file-url Display the contents of a file.
A file in the recycle bin occupies storage space. To release the occupied space, execute the reset recycle-bin command in the directory that holds the file. To save storage space, periodically empty the recycle bin with the reset recycle-bin command. Perform the following tasks in user view: Task Command...
Changing the current working directory Perform this task in user view. Task Command Change the current working directory cd { | .. | / } directory. Creating a directory Perform this task in user view. Task Command directory Create a directory. mkdir Removing a directory To remove a directory, you must delete all files and subdirectories in this directory.
Performing batch operations A batch file comprises a set of executable commands. Executing a batch file is the same as executing the commands one by one. However, execution of a batch file does not guarantee successful execution of every command in the batch file. If a command has error settings or the conditions for executing the command are not satisfied, the system skips this command.
Page 81
%Created dir flash:/test/mytest. # Display the current working directory. <Sysname> pwd flash:/test # Display the files and the subdirectories in the test directory. <Sysname> dir Directory of flash:/test/ drw- Feb 16 2006 15:28:14 mytest 2540 KB total (2519 KB free) # Return to the upper directory.
Page 82
Contents Managing configuration files ······································································································································ 1 Overview ············································································································································································ 1 Configuration types ·················································································································································· 1 Configuration file content organization and format ····························································································· 1 Next-startup configuration file redundancy ··········································································································· 2 Startup with a configuration file ····························································································································· 2 Hardware and storage medium compatibility ···············································································································...
Managing configuration files Overview You can use the CLI or the Boot ROM to manage configuration files. This chapter explains how to manage configuration files from the CLI. A configuration file saves configurations as a set of text commands. You can save the running configuration to a configuration file so the configuration takes effect after you reboot the device.
• You can execute the save command to save the running configuration to a configuration file. To make sure that the configuration file can run normally, H3C recommends that you not edit the content and format of the configuration file.
Saving configuration in different ways When saving the running configuration to a configuration file, you can specify the file as the next-startup configuration file or not. If you are specifying the file as the next-startup configuration file, use one of the following methods to save the configuration: Fast mode—Use the save command without the safely keyword.
Configuring configuration rollback To replace the running configuration with the configuration in a configuration file without rebooting the device, use the configuration rollback function. This function helps you revert to a previous configuration state or adapt the running configuration to different network environments. The configuration rollback function compares the running configuration against the specified replacement configuration file and handles configuration differences as follows: If a command in the running configuration is not in the replacement file, executes its undo form.
Step Command Remarks Enter system view. system-view By default, no path or file name prefix is set for configuration archives, and the system does not regularly save configuration. IMPORTANT: Configure the directory and The undo form of this command directory archive configuration location file name prefix for archiving disables both manual and...
Task Command Manually archive the running configuration. archive configuration Performing configuration rollback To avoid rollback failure, follow these guidelines: Make sure the replacement configuration file is created by using the configuration archive function • or the save command on the current device. If the configuration file is not created on the current device, make sure the configuration file content •...
Backing up the next-startup configuration file to a TFTP server Before performing this task, make sure the server is reachable and enabled with TFTP service, and you have read and write permissions. This task backs up only the main next-startup configuration file. To back up the next-startup configuration file to a TFTP server: Step Command...
CAUTION: This task permanently deletes the next-startup configuration file from the device. Before performing this task, back up the file as needed. Delete a next-startup configuration file if one of the following events occurs: • After you upgrade system software, the file no longer matches the new system software. The file is corrupt or not fully compatible with the device.
Page 91
Contents Upgrading software ····················································································································································· 1 Software upgrade methods ·············································································································································· 1 Upgrading BootWare by rebooting the device ············································································································· 2 Upgrading system software by rebooting the device ···································································································· 2 Upgrading software by installing hotfixes ······················································································································ 2 Basic concepts ·························································································································································· 3 ...
Upgrading software Upgrading software includes upgrading the BootWare and system software. Each time the device is powered on, it runs the BootWare image to initialize hardware and display hardware information and then runs the system software image (called the "boot file" in software code). Then, you can access the software features, as shown inFigure Figure 1 System startup process...
Upgrading method Software types Remarks • BootWare image Use this method when the device cannot correctly start Upgrading from the • up. For information about this upgrading method, see System software BootWare menu the release notes for your device. image This chapter covers only the CLI approach to upgrading software.
Basic concepts Patch, patch file, and patch package file A patch fixes certain software defects. A patch file contains one or more patches. After being loaded to the patch memory area, each patch is assigned a unique number, which starts from 1. For example, if a patch file has three patches, they are numbered 1, 2, and 3.
Page 95
Figure 2 Impact of patch manipulation commands on patch state IDLE state Patches that have not been loaded are in IDLE state. You cannot install or run these patches. As shown Figure 3, the patch memory area can load up to eight patches. The patch memory area supports up to 200 patches.
Page 96
Figure 4 Patch states in the patch memory area after a patch file is loaded ACTIVE state Patches in ACTIVE state run temporarily in the system and become DEACTIVE at a reboot. For the seven patches in Figure 4, if you activate the first five patches, their states change from DEACTIVE to ACTIVE.
Figure 6 Patches in RUNNING state Hotfix configuration task list Task Remarks Installing patches: Use either approach. • Installing and running a patch in one Step-by-step patch installation allows you to control the patch step status. • Installing a patch step by step Uninstalling a patch step by step Optional.
Optional. Specifying the patch file location For reliable patch loading, H3C recommends saving patch files to the root directory of Flash memory. To use a storage medium other than Flash memory, you must specify the patch file location. If the device has only one storage medium, this task is not required.
If you install a patch from a patch package, the system finds the correct patch file in the patch package file and loads the patch file. IMPORTANT: Set the file transfer mode to binary mode before using FTP or TFTP to upload or download patch files to or from the Flash memory of the device.
Step Command Stop running patches. patch-number patch deactive [ Removing patches from the patch memory area After being removed from the patch memory area, a patch is still retained in IDLE state in the storage medium. The system runs the way it did before it was installed with the patch. To remove patches from the patch memory area: Step Command...
Page 101
Figure 7 Network diagram FTP Server 2.2.2.2/24 Internet Telnet FTP Client User 1.1.1.1/24 Configuration procedure Configure the FTP server (configurations may vary with different types of servers): # Set the access parameters for the FTP client (including enabling the FTP server function, setting the FTP username to aaa and password to hello, and setting the user to have access to the flash:/aaa directory).
This command will reboot the device. Continue? [Y/N]:y Use the display version command to verify the upgrade. Hotfix-method software upgrade example Network requirements As shown in Figure 8, the software running on the AP has defects. The patch file patch_xxx.bin is saved on the TFTP server.
The password recovery feature allows a user to configure a new password while retaining the original configuration file. To prevent unauthorized access to the original configuration file, H3C recommends that you disable the password recovery feature.
Press Ctrl+D to access BASIC-BOOTWARE MENU Booting Normal Extend BootWare The Extend BootWare is self-decompressing......Done! **************************************************************************** H3C WA4620i-ACN BootWare, Version 2.06 **************************************************************************** Copyright (c) 2004-2017 New H3C Technologies Co., Ltd. Compiled Date : Mar 27 2017 CPU Type : APM86791 CPU L1 Cache...
|<7> BootWare Operation Menu |<8> Clear Super Password |<9> Storage Device Operation |<0> Reboot ============================================================================ Ctrl+C: Display Copyright Ctrl+F: Format File System Enter your choice(0-9): Handling console login password loss when password recovery is enabled # Enter 6 in the extended BootWare menu to skip system configuration. This step does not delete the original configuration file.
# Replace the running configuration with the configuration in the startup.cfg configuration file. Skip this step if you do not want to restore the original configuration. <Sysname> system-view [Sysname] configuration replace file startup.cfg Current configuration will be lost, save current configuration? [Y/N]:n Info: Now replacing the current configuration.
Page 107
Contents Managing the device ··················································································································································· 1 Overview ············································································································································································ 1 Configuring the device name ·········································································································································· 1 Changing the system time ················································································································································ 1 Configuration guidelines ········································································································································· 1 Configuration procedure ········································································································································· 4 Enabling displaying the copyright statement ················································································································· 4 ...
Managing the device Overview Device management includes monitoring the operating status of devices and configuring their running parameters. The configuration tasks in this document are order independent. You can perform these tasks in any order. Configuring the device name A device name identifies a device in a network and works as the user view prompt at the CLI. For example, if the device name is Sysname, the user view prompt is <Sysname>.
Page 109
Table 1 System time configuration results Command Effective system time Configuration example System time 01:00:00 UTC Mon date-time clock datetime 1:00 01/01/2007. 2007/1/1 Original system time ± 02:00:00 zone-time Sat clock timezone zone-offset 01/01/2005. zone-time add 1 clock datetime 2:00 03:00:00 zone-time Fri 2007/2/2 date-time...
Page 110
Command Effective system time Configuration example System time clock summer-time ss 3, 1 one-off 1:00 01:00:00 UTC Tue date-time outside the 2007/1/1 1:00 date-time 01/01/2008. 2007/8/8 2 daylight saving time range) clock datetime 1:00 2008/1/1 clock summer-time ss date-time summer-offset –...
You can disable or enable the function as needed. The following is a sample copyright statement: ****************************************************************************** * Copyright (c) 2004-2017 New H3C Technologies Co., Ltd. All rights reserved.* * Without the owner's prior written consent, * no decompiling or reverse-engineering shall be allowed.
****************************************************************************** To enable displaying the copyright statement: Step Command Remarks Enter system view. system-view Enable displaying the copyright-info enable Enabled by default. copyright statement. Configuring banners Banners are messages that the system displays during user login. The system supports the following banners: Legal banner—Appears after the copyright or license statement.
<System> system-view [System] header shell A Please input banner content, and quit with the character 'A'. Have a nice day. Please input the password.A Method 3—After you type the last keyword, type the start delimiter and part of the banner and press Enter.
Configuring the exception handling method You can configure the device to handle system exceptions in one of the following methods: • reboot—The device automatically reboots to recover from the error condition. maintain—The device stays in the error condition so you can collect complete data, including error •...
Scheduling a device reboot The device supports only one device reboot schedule. If you configure the schedule reboot delay command multiple times, the most recent configuration takes effect. The schedule reboot at command and the schedule reboot delay command overwrite each other, and whichever is configured last takes effect.
Scheduling a job in the non-modular Scheduling a job in the modular Comparison item approach approach view. Commands in user view and system Supported commands Commands in all views. view. Can a job be repeatedly Yes. executed? Can a job be saved? Yes.
Scheduling a job in the modular approach To configure a scheduled job: Step Command Remarks Enter system view. system-view Create a job and enter job-name job view. Specify the view in which You can specify only one view for a the commands in the job view-name view...
<Sysname> system-view [Switch] ntp-service refclock-master 2 Configure the AP: # Create a job named pc1, and enter its view. [Sysname] job pc1 # Enter the view of WLAN-Radio 1/0/1. [Sysname-job-job1] view WLAN-Radio1/0/1 # Configure the device to enable Radio 1/0/1 at 8:00 on working days every week. [Sysname-job-job1] time 1 repeating at 8:00 week-day mon tue wed thu fri command undo shutdown # Configure the device to shut down Radio 1/0/1 at 18:00 on working days every week.
Page 119
Task Command Remarks display clock [ | { begin | exclude | Display the system time and date. Available in any view. regular-expression include } Display information about the users display configure-user [ | { begin | that have logged in to the device Available in any view.
Need help?
Do you have a question about the WA4600 Series and is the answer not in the manual?
Questions and answers