Professional Documents
Culture Documents
(AWMS)
CONFIGURATION
MANUAL
Version 1.2
Date: September, 2014
TPS14-009_rev1.2
Hong Kong
Web: www.altaitechnologies.com
Email: support@altaitechnologies.com
All specifications are subject to change without prior notice. Altai Technologies
assumes no responsibilities for any inaccuracies in this document or for any obligation
purposes only. Altai Technologies reserves the right to change, modify, transfer, or
TPS14-009_rev1.2
Contents
1. INTRODUCTION......................................................................................................................... 8
TPS14-009_rev1.2
TPS14-009_rev1.2
TPS14-009_rev1.2
TPS14-009_rev1.2
TPS14-009_rev1.2
1. INTRODUCTION
This Manual summarize basic configuration practices for Altai Wireless Management
System (AWMS). This document is applicable for AWMS version 3.2.4.
TPS14-009_rev1.2
AWMS is a network management system for large-scale wireless local area network
(WLAN) deployments. It manages WLANs comprising of various types of Network
Elements.
AWMS is composed of three subsystems: Central Control Server (CCS), Proxy and
Central Control Client (AWMS Client).
TPS14-009_rev1.2
2) Proxy Server
Proxy Server is the local agent between CCS and Network Elements (NEs). A Proxy is
used to retrieve information from and to configure NEs. It is designed to support
multiple management protocols. To expand network deployment, multiple Proxy
deployment is used to further improve the performance and scalability in a large
network scenario.
3) AWMS Client
AWMS Client provides a user-friendly graphical user interface (GUI) for users to
perform daily operations on WLAN networks. It is capable of configuring specific
network devices while also providing a complete view of the network.
AWMS offers six core network management features that provide capabilities
specifically to manage the wireless networks.
AWMS supports both indoor and outdoor (GPS) topological maps, so that NEs can be
located on the map manually or by entering co-ordinates. The powerful NE searching
capability allows users to quickly determine the location of one or more NEs based on
several searching criteria. Users can then quickly locate an NE in the network
topology map with the press of a button.
2) Fault Management
AWMS provides summarized alarm counts for several levels of network topology:
entire network, per Proxy, and per network element. Alarms are displayed in list format
and update in real-time according to events reported by devices through the Proxy.
Alarm acknowledgment and forced deletion of active alarms are supported by all
active alarm list displays. All historical fault information is recorded by AWMS, with
archiving and exporting features supported.
3) Configuration Management
TPS14-009_rev1.2
Configuration consistency checking allows users to ensure that all the network
elements are configured properly. In the event that any inconsistency is detected,
AWMS will provide a recommended course of action to fix it.
Batch provisioning and de-provisioning of network elements will save users’ time from
performing tedious and repetitive actions.
4) Firmware Management
AWMS provides a centralized firmware management system so that the software
upgrades stored in the system will be applied to the specified network elements.
AWMS supports on-demand and scheduled firmware upgrades.
5) Performance Management
AWMS supports performance management function to monitor and keep trace of
statistics related to users and access points. Hence, it enhances to monitor the
network performance and identify network problem easily.
6) System Security
System security management governs the administration and authorization of access
to AWMS. In short, system security determines who is allowed to use the system and
what they are allowed to do. All users of AWMS must be authenticated before they
are allowed access into the AWMS CLIENT. Individual system operations can be
granted or denied on per user group basis.
AWMS also maintains logs of system usage and user activity; these logs can be
accessed via the searching tools that AWMS provides to the authorized users.
7) Professional Reporting
AWMS includes a completely integrated reporting feature that instantly creates
custom outputs of the network performance statistics, network equipment inventory
and fault summary generated in HTML or PDF formats with a flexible schedule.
TPS14-009_rev1.2
AWMS CCS and Proxy can be launched by Selecting Start ->All Programs ->AWMS -
>Central Control Server and Start ->All Programs ->AWMS ->Proxy Server respectively.
NOTE: Central Control Server and Proxy Server could be installed in different hosts.
In this case they have to be started separately.
You should see “--------Proxy is started--------” in Proxy Server window when Proxy
Server has successfully started up.
TPS14-009_rev1.2
Once the AWMS CCS and Proxy have been started, AWMS Client can be launched
by Selecting Start->All Programs->AWMS->AWMS Client.
AWMS Client starts with the login prompt asking for AWMS login name and password.
Users can also choose the GUI languages, which are English, Simplified Chinese and
Traditional Chinese.
TPS14-009_rev1.2
This root user has the highest access right of AWMS. It cannot be disabled or deleted.
Use this account to login AWMS Client and then create additional users to access the
system.
NOTE: For security reasons, you should change the default password for the root
user account as soon as possible. Please refer to Section 15.2.3 Modify a User Account
for instructions on how to change the password.
TPS14-009_rev1.2
NOTE: Users will see this password change dialog when the passwords of their user
accounts are expired after a specific period. The default password expiration is 30
days. Please refer to Section 15.2.1 User Account Global Settings for instructions on
how to change the password expirations.
2) Login Failure
A login failed warning pops up when the login process was invalid due to a reason
which remains unspecified in order to preserve system security. The reasons for login
failure could be:
1. User Name/Password combination does not match (both are case-sensitive).
2. User Account does not exist.
3. User Name already logged in.
4. User Account has been disabled due to:
Manually disabled by another user with account suspension privileges.
Exceeded maximum number of failed login attempts.
Exceeded maximum number of failed password change attempts.
Account expiry.
TPS14-009_rev1.2
The main window can be divided into three distinct display sections. The section on
the left-hand side is called Network Topology Tree and it displays NEs grouped by
various criteria. The right-hand side of the main window can be further separated into
two sections: the upper section is called Center Zone, which displays most of the
detailed information; the lower section is called Alarm Window, which displays the
alarm summary and alarm list information.
1) Tree View
The Network Topology Tree portion of AWMS GUI main window displays the logical
hierarchy of the NEs managed by AWMS into groups.
1. Shows the association among Proxies, NEs and topology network maps.
2. Shows the status (i.e. registration, online/offline, provisioning) of NEs and Proxies.
3. The available tree views include Proxies and Maps Tree, NE Registration Tree and
NE Provision Status Tree. The tree views can be selected from the View menu.
Proxies and Maps Tree groups NEs by Proxies they associated to. NEs under
the “No Proxy Associated” do not have an associated Proxy and those under
the “Location Undefined” are a group of NEs that do not currently associate
to a topology network map.
NE Registration Tree organizes NEs based on their individual model types and
registration status. Please refer to Section 5 INVENTORY MANAGEMENT for
details. “[Empty Model]” is the group of NEs that with undetected model
types.
Provisioning Status Tree organizes NEs based on their provisioning status.
Please see Section 6.6.4 Provision Status Tree for details.
2) Center Zone
The network summaries are displayed in the largest portion of the AWMS GUI main
window known as the Center Zone. More detailed information screens and input
TPS14-009_rev1.2
forms are displayed in this area, for example, NE Configuration, Proxy Registration,
Map Settings etc. The Network Summary window tabulates the total number of
Proxies, Registered NEs, and Unregistered NEs in the managed network.
3) System Summary
The system summary window provides the information of the system performance
statistics for the users. This information includes report time 、next update time 、
summary start time、summary end time、network elements service status、network
elements Ethernet traffic statistics and mobile client’s statistics etc. Users can know the
whole network by this window. Anytime, users can display it by selecting View-
>Network Summary.
4) Alarm Window
This window displays two lists of alarms stored in the system: Active Alarm List and
Alarms History.
The default alarm list displayed is the Active Alarm List, which is a list of alarms
that are not cleared and/or not acknowledged.
Alarms History, a list of alarms that are both cleared and acknowledged, can
be seen by two methods. One is to select View -> Alarms History and
another is select Alarms ->Open-> Alarms History.
More details on alarm management with AWMS are described in Section 9 FAULT
MANAGEMENT
You can configure the center display area to allow multiple open windows in a
tabbed fashion by selecting Preferences under Administration menu.
1. Uncheck the box “Display single window in center zone of the application”.
2. Users could also choose the default map display when application starts up.
TPS14-009_rev1.2
AWMS Client can lock the AWMS to prevent unauthorized access while the user is
away from his/her terminal. Select File->Lock Application and the following dialog will
be displayed:
In order to resume the session, users will have to re-enter their password correctly.
For security reasons, it is suggested that users should logout before leaving their
terminal. Select File->Logout to logout the system. If users have any unsaved work,
they will be asked whether they wish to save or abandon the changes before AWMS
Client logs them out and then returns to the Login Window.
Exiting will terminate the AWMS Client application all together. If users are currently
logged on, they will be automatically logged out as well. Users can exit by selecting
File->Exit or by clicking the X button in the top right-hand corner of the AWMS Client
TPS14-009_rev1.2
Main Window. If there are any unsaved changes, users will be prompted to save or
abandon them before exiting.
When initially setting up AWMS, the network topology for Proxy will be provisioned. For
the AWMS user, he/she has to:
Register the Proxy in CCS.
Assign a range of IP addresses for the Proxy to manage.
Specify SNMP Discovery Configurations for the Proxy.
Each deployed AWMS Proxy needs to be registered in AWMS Client in order to start
discovering and managing the NEs. In order to add a new Proxy,
1. Select Proxy->Add Proxy… and bring up the Proxy Registration window.
TPS14-009_rev1.2
NOTE: Make sure the Proxy Server is not In-Service before proceed to the SNMP
Discovery Configuration since it cannot be modified if the corresponding Proxy Server
is in service.
TPS14-009_rev1.2
IP Scan:
Start IP: The beginning IP address of the IP address range. The range of IP
addresses is used to define the managed area under the Proxy Server.
End IP: The end IP address of the IP address range.
TPS14-009_rev1.2
Port Scan:
Start Port: The beginning Port number. The range of Port numbers is used to
define the managed area under the Proxy Server.
End Port: The end of port number for NE discovery.
Figure 4-6 Scan the NE based on Port Range for specific IP address
TPS14-009_rev1.2
#User Name
#default is admin
TPS14-009_rev1.2
#Security Level
#it have three options
#1 - NoAuth,NoPriv; 2 - Auth,NoPriv; 3 - Auth,Priv
#NOTE: For B5, option 1 is discarded, only option 2 and 3 are supported
#because option 1 could not set Admin Level, which will lead AMWS could
not manage B5.
#default value is 2 - Auth,NoPriv
snmpv3cfg.securitylevel=3 # The default setting for security is option 3 that
auth password and privacy password are enable.
#Auth Protocol
#it have two options 1 - MD5; 2 - SHA
#defalut is MD5
#NOTE: For B5 only support 1 - MD5, others are not support
snmpv3cfg.authprotocol=1 # The default setting for Auth protocol is option 1
that MD5.
#Auth Password
# if Auth Protocol, Auth Password must set
snmpv3cfg.authpsw=12345678 # This is the Auth password, you can change
it to keep match with NE.
#Priv Protocol
#1 - CBC-DES; 2 - AES-128; 3 - AES-192; 4 - AES-256 ; 5 - CBC-3DES
#NOTE: For B5, option 1 supported, others are not supported.
snmpv3cfg.privprotocol=1 # The default setting for privacy protocol is option
1 that DES.
#Priv Password
# if Priv Protocol, Priv Password must set
snmpv3cfg.privpsw=12345678 # This is the default privacy password, you
can change it to make it match with NE.
#Context Name
#optional
snmpv3cfg.contextname=
#Context Id
#optional
snmpv3cfg.contextid=
TPS14-009_rev1.2
4. Click Save to save the configuration, or click Clear to reset the entered settings to
the default settings.
5. Repeat Step 3 to Step 5 until all desired IP ranges (Port) have been added.
6. Click Close to exit.
The status of the Proxy Server can be either enabled or disabled. If the Proxy Server is
currently in service,
1. Right click the Proxy Server you want to disable under the folder “Proxies” in the
Network Topology Tree.
2. Select Disable Service, then the Proxy Server will be disabled.
TPS14-009_rev1.2
After a Proxy Server is added, the settings of the Proxy Server can be modified. In
order to modify a Proxy,
1. Click the Proxy Server under the folder “Proxies” in the Network Topology Tree.
2. Select Proxy->Proxy Registration….
3. Under the tab Description, uncheck the box “In-Service” if the box is checked
before. Click Save to save the configuration. The SNMP Discovery Configuration
cannot be modified if the corresponding Proxy Server is in service.
TPS14-009_rev1.2
4. Under the tab SNMP Discovery Configuration, select the discovery range that you
want to modify.
5. Click Add or Modify if the parameters under the Configuration Task are added or
modified, or click Delete if you want to remove entered information.
NOTE: Before this action, please make sure the Proxy Server is out of service first
(see Section 4.1.2 Enable/Disable a Proxy4.1.3) and no NEs are associated to this
Proxy by de-register all associated NE.
TPS14-009_rev1.2
TPS14-009_rev1.2
After a Proxy Server is added, its status can be viewed, for example, its connection
status and connection time. In order to monitor a particular Proxy health,
1. Click the Proxy Server under the folder “Proxies” in the Network Topology Tree.
2. Select Proxy->Proxies Health and the Proxy Health window pops out.
3. Select a desired Proxy Server.
4. Health of the Proxy is shown in the table.
TPS14-009_rev1.2
The Proxy Details will be shown by selecting a Proxy. Proxy Name, Description, IP
Address, Service State, Connection Status and Disconnection Time are included in the
Proxy Details.
You can add a device and monitor in AWMS by the following steps,
1. Select Tools->Monitoring Device List in the main menu
2. Enter the IP Address of the device you want AWMS to monitor
3. Enter the Name with a unique identifier for the monitor device
4. Enter the Description, it will introduce the device’s details.
5. Select the Proxy. If AWMS has several proxies, you must appoint one proxy server
to manage the monitored device.
6. Select the Device Type. The device type can help customers to identify the
monitor device. Here you may select Camera, Router, Switch or Other. In addition,
you could add your own icon.
TPS14-009_rev1.2
7. Configure the Ping Interval (at least 5 sec). It configures how long AWMS need to
check the monitoring device
8. Configure the Ping Failure Threshold. The system will consider the device as a
failed device if it does not respond before the threshold.
9. Select Ping Type as ICMP or SNMP.
10. Click Add to complete the configuration and add it to AWMS. Or click Clear to
clear all the parameter to restart from scratch.
Monitoring result can be found in the column Ping Status on the list.
In order to modify the configuration of the monitoring devices, you can adopt the
following steps.
1. Select the monitoring device and change the configurations
2. Click the Modify button to save the result.
If you do not want to monitor a device, you can adopt the following steps to delete it.
1. Select the monitoring device which you want to delete
2. Click the Delete button
3. Click the Close button to close the monitoring window.
4.4. NE Discovery
After configuring the CCS and the Proxy (in service) properly, the Proxy will begin NE
discovery automatically. When the Proxy(s) discovers unregistered NEs, the NEs will be
shown as Unregistered NEs under the defined Proxy in the Network Topology Tree.
TPS14-009_rev1.2
For setting the IP ranges for NE discovery, please refer to Section 4.1.1 Add a New
Proxy.
An NE could only associate to a single Proxy at a time. If the NE has gone offline, it
can be configured to be associated with no Proxy at all. You can only change the
Proxy and NE relationship when both the following conditions apply:
The registration type of the NE is managed and the connection status is
offline.
The Proxy is out of service (disabled).
TPS14-009_rev1.2
4. Click OK.
TPS14-009_rev1.2
1. Select Proxy->SNMP Default Settings… and the Default SNMP Settings window will
pop up. Both the Default SNMP Read Community String and Default SNMP Write
Community String can be modified.
For each of the NEs, it can have their own SNMP settings, i.e. different SNMP
Read/Write Community String in different NEs. In order to modify a particular NE SNMP
settings,
1. Click the NE under the folder “Proxies” in the Network Topology Tree.
2. Right click and select SNMP Settings….
TPS14-009_rev1.2
3. Under the tab SNMP Setting, select the desired NE under Selected Network
Elements.
For this setting, the Registration Type of NEs must be under folder “Managed”.
TPS14-009_rev1.2
5. INVENTORY MANAGEMENT
We must first distinguish the difference between Registered and Unregistered NEs,
both of which will appear in AWMS. A Registered NE is one which the NE type and
model information is known, such that AWMS can uniquely identify this type of NE
from the rest. The model of an NE, also known as NE Signature in AWMS, is what
uniquely defines an NE from all the other types of NEs. An example of this would be:
NE Type Model MIB Version Radio 1 Operation Mode Radio 2 Operation Mode
ALTAI A8 1.4 Master Bridge Access Point
For the Altai A8 base station, there exist five fields: Model, MIB Version, Number of
Radio, Radio 1 Operation Mode and Radio 2 Operation Mode to compose the
schema for its NE Signature. The values of all five fields make up the NE Signature or
model information for this type of NE. Some NEs with the same NE Type and Model will
have multiple versions while others may just have one. In the example above, if Altai
A8 released a new version, its model is still “A8”, but MIB Version or Radio 1 Operation
Mode will be different.
When registering a device in AWMS, you will categorize the network elements into
three different registration types:
Managed: An NE that is fully managed by AWMS, all management
capabilities of the NE is available to AWMS. The model information for
managed NEs is known.
External: An NE which is located in the same IP range as your managed
devices, but not part of your managed network.
Rogue: An unauthorized NE located in your network, which may potentially
be a security breach.
TPS14-009_rev1.2
If AWMS can communicate with one network device, the status of this NE will be
shown as online. Otherwise it will be considered offline.
The left hand side of the Supported NE Types window lists all the NE Types that are
supported by AWMS currently. If you select a particular NE Type, then you will be able
to see all the model information for NE devices under that NE Type.
To register an online NE, AWMS must first be able to detect the device by AWMS Proxy.
The detected NEs should appear under the folder “Unregistered NEs” of their
associated Proxy in the Proxy Status Tree View. You may need to expand some of the
folders in the tree in order to locate the NEs. The default name for an NE will be its
detected MAC Address (this name is configurable during the registration process).
You may also use the NE Registration Tree View to perform NE Registrations, where
each NE type supported by AWMS has their own folder. Under each NE type folder
are the Model names of the supported devices. Look for the “Unregistered NEs” folder
under the specific model of the NE and locate the NE.
TPS14-009_rev1.2
10. Click Save to apply the registration. The Refresh button will undo your changes,
while the Close button will close this window without saving. However you will be
prompted if you want to save the changes if you have made any without
previously saving them.
TPS14-009_rev1.2
If the registration is successful, you should see the NE has been updated in the Proxy
Status Tree View to the one you specified in the Registration Window and the NE is
now managed by AWMS.
NOTE: There is a shortcut for registering NEs instead of using the above method
which will not require you to enter additional information. The Registration Type will be
set to the corresponding choice, and the NE System Name will remain as the MAC
Address of the NE.
1. Click the NE under the folder “Proxies” in the Network Topology Tree.
2. Right click and select Register as Managed / Register as External / Register as
Rogue.
TPS14-009_rev1.2
4. Enter the corresponding Physical Serial Number and Electronic Serial Number
(Optional).
5. Select the appropriate Associated Proxy (Optional).
6. In the NE Identity section, enter the Ethernet MAC address of the NE under
Property (Optional).
7. In the NE Signature section, select the appropriate Model, MIB Version, Radio 1
Operation Mode and Radio 2 Operation Mode (Optional).
NE properties include four sections. They are General, Detected Information, Network
Element Type and Status. In order to view a particular NE properties,
1. Select Network Element->Properties and the NE Summary window pops out.
TPS14-009_rev1.2
2. Click Locate to locate the position of the NE under the Proxies and Maps tree
(Optional).
TPS14-009_rev1.2
Once an NE has been registered in AWMS, you can also modify the NE Registration
information. Certain fields however are fixed and cannot be modified after initial
registration. In order to view or change the current NE Registration of an NE:
1. Click the NE under the folder “Proxies” in the Network Topology Tree.
2. Select Network Element->NE Registration… or right click and select NE
Registration….
3. Click the Save button to apply your changes. The Refresh button will reload the
form to the previous settings of the last saved registration, while the Close button
will close the window without saving.
TPS14-009_rev1.2
For all registered NEs (Managed, External and Rogue), the fields which can be
modified in the NE Registration window are:
Registration Type: Change to External or Rogue.
NE System Name: Rename the NE to a different unique name.
Physical Serial Number: Modify the physical serial number.
Electronic Serial Number: Modify the electronic serial number.
Country: Modify the country.
Contact Person: Modify the contact person name.
Tel: Modify the telephone number.
Mobile Number: Modify the mobile phone number.
Email: Modify the email address.
Address: Modify the address.
Remark: Modify the remark.
You can attempt to resolve this situation by modifying the NE’s registration information
by follow the steps in Section 5.5 Modify NE Registration to bring up the NE Registration
window for the problematic NE. If the bad registration information is fixable (i.e. the
NE was originally registered with the wrong model/NE Signature information but
belongs in the same NE Type as registered), the Auto Correct button will be enabled.
1. In the NE Signature section, the attributes that have differing detected values
from the original registration will be highlighted with the warning icon.
2. Move the mouse over the warning icon and the detected value will be displayed.
3. Click the Auto Correct button then AWMS will correct the registration settings for
you by using the detected values. You may also manually change the registration
settings as well.
4. Click Save to apply your changes.
If the above procedure is successful, the Bad Registration should become cleared
and the NE will no longer report the Bad Registration status.
If the Auto Correct button is not enabled, then the problem cannot be corrected
automatically by AWMS. You may have to check the physical status of the NE to see
what this situation is occurring.
5.6. De-register an NE
If you want to deregister an NE, you can select the NEs you wish to deregister from
any of the Network Topology Grouping Tree Views and invoke the Deregister
TPS14-009_rev1.2
command from the object menu. When the NE becomes deregistered, you will see it
move back to its appropriate Unregistered NEs folder. In order to de-register an NE,
1. Click the NE under the folder “Proxies” in the Network Topology Tree.
2. Right click and select Deregister and then click Yes to confirm or No to cancel.
AWMS Client supports the capability to export NE Registration information into a text
file as well as import new NE registrations from a properly formatted text file.
TPS14-009_rev1.2
The file format used for NE Registrations is a tab-delimited text file, so you can view it
with Notepad, Microsoft Excel, or your favorite text editor.
The row starts with the # character is a row header, i.e. all the values of that row are
the field names of the NE registration for all the rows beneath it. It starts with the fields
which are standard for all NEs:
Registration Type
NE System Name
Physical Serial Number
Electronic Serial Number
NE Type
Model Version
Hardware Version
MIB Version
*DS MAC Address
TPS14-009_rev1.2
The next field starts with the @ character is the beginning of the field(s) which
comprise the NE Signature.
Finally the field starts with the * character is the beginning of the field(s) that make up
the NE Identity.
The following rows will be a list of the NE registration values for the NEs with model
information matching the schema of the header row. If there are other NEs with
different model schemas, you will find a line break followed by a new row header
beginning with the # character again until all the NEs that were exported are
represented by this file.
NOTE: If you wish to manually edit this file in order to bulk register NEs into AWMS,
you must be very careful in adhering to the rules specified here. It is NOT ADVISABLE to
manually add NE registrations using this method as a single mistake would invalidate
your registration. Instead the best use of this feature is to back-up the existing NE
registrations in case you need to de-register then in AWMS, and re-register them at a
later time. Or you can use this method to import NE registrations from one AWMS
system to another.
NOTE: You can only import registrations for new NEs. If another NE with the same
registration information already exists in AWMS, you will get an error. Likewise, if the file
you have chosen contains partially or completely invalid registration information,
those entries will be skipped.
5.8. Rename an NE
TPS14-009_rev1.2
The NEs registered in AWMS are named by their MAC Address. Sometimes the
operators would get confused when they need to distinguish the NEs. In order to
rename an NE,
1. Click the NE under the folder “Proxies” in the Network Topology Tree.
2. Right click and select Rename….
If your AWMS system contains many different types of NEs, then the Network Topology
Grouping Tree Views may become crowded with information. As a result, it may be
difficult to locate specific NEs using those views.
TPS14-009_rev1.2
The advanced NE searching is for searching NEs with other parameters. In order to
have an advanced NE searching,
1. Under the Search Network Elements window, click the Advanced Search… button
on the top right corner of the window to bring up the Network Element Advanced
Search window.
TPS14-009_rev1.2
need to choose an NE Type from the drop-down combo box and fill in the complete
model information if you wish to use this category for searching.
The results of basic or advanced NE search will be shown in the lower portion of the
Search Network Elements window.
The Result section gives you the number of records which match your specified
search criteria, as well as which records are currently shown below in the list display
portion. If too many results are returned, the search results will be segmented into 50
records per page. The Go to drop-down combo box allows you to swap between the
segmented searched results if applicable. The search time is listed as well as the
current searching conditions.
Selecting any NE in the list display portion is equivalent as selecting the NE in the
Network Topology Tree View, i.e. you can access to the same set of functions if you
right-click to bring up the object menu as you did from the Tree Views. If you select
just a single NE, the Properties button will become active; clicking it or double-clicking
the NE in the list display will bring up the NE Summary window. Clicking the Locate
button will find the corresponding NE in the Proxy Status Tree View and select it. If the
NE is located in a Map, the corresponding map will be displayed in the center portion
of AWMS and the NE will be selected.
Click the Refresh button to perform the search again, and Close when you are
finished searching for NEs.
To check the information of mobile clients of NE, complete the following steps.
TPS14-009_rev1.2
TPS14-009_rev1.2
TPS14-009_rev1.2
1. In section 5.11 Step 3, there is a button Add Mobile Clients Info. Click it.
2. Edit the Client name and IP address.
In the Search Associated Mobile Clients, a mobile client can be located by clicking
the Locate button, highlighting the NE that the client associated in the NE Registration
Tree.
TPS14-009_rev1.2
AWMS allows the user to create a mobile client database. Each client is assigned with
a name, IP address and Mac address. When the client is created, the status is showed
as unassociated initially. Once the client is associated to an NE, the client status is
changed to associate.
TPS14-009_rev1.2
6. CONFIGURATION MANAGEMENT
TPS14-009_rev1.2
Users must provision the NE in order to apply the configuration settings to the current
configuration parameters for the NE. The reason for the intermediate configuration
settings is to allow users to specify all the configuration changes and then committing
them all at once, instead of committing each individual change one at a time. Some
individual configuration parameters have dependencies and restrictions on other
configuration parameters, so this method allows the user to edit and view the
configuration settings as a whole before committing them.
AWMS also allows user to create Configuration Templates which are used to store
common configuration profiles. Since there are lots of configuration parameters per
NE, it could save users a lot of time from applies the template to a bunch of NEs that
require identical configurations.
TPS14-009_rev1.2
The configurations include Radios and Virtual APs, System, NTP Settings, DNS Settings,
PPPoE Settings, DHCP Settings, Telnet Settings and NAT Setting.
TPS14-009_rev1.2
The Current Configuration reflects the configuration settings stored and activated in
the NE. The AWMS Client currently requires a manual action Refresh, which retrieves
the current settings from NE, updates the AWMS server database and updates the
GUI displays.
The NE Configuration reflects the desired settings by AWMS user for the NE. When
AWMS user changes and saves settings in the NE Configuration, those changes are
TPS14-009_rev1.2
saved in AWMS Server database. When the AWMS user provision the NE, the
configuration settings from database will be applied and activated on the NE.
When performing consistency check, AWMS uses the values from AWMS server
database to compare between Current Configuration and NE Configuration.
A wireless network often shares common settings for most or all of the managed NEs.
A typical set would be the security configurations, such as Authentication Mode,
Cipher Mode and ESSID settings. The collective set of configuration parameters and
values is called a Configuration Template. A Template can be used either to
Update settings for a group of NEs.
Apply on new NEs while registering them.
TPS14-009_rev1.2
TPS14-009_rev1.2
12. Click Config… to select the WLAN Profiles pre-defined in Configuration Profile
Management.
13. Either select the pre-defined WLAN profile and click Add->, or click New… to
create a new WLAN profile as shown in section 6.4.1.
14. Choose the VAP Index for the WLAN profile.
15. Check the box Enable to activate the VAP configuration.
16. Click OK, click Save and click Save again to save the Template Configuration.
17. Click Close to close the Template Configuration.
TPS14-009_rev1.2
The configuration management can create WLAN profile, VLAN profile, security
profile and ACL profile. WLAN profile stores SSID, QoS profiles, security profile and ACL
list for one VAP. VLAN profile configures VLAN Tag ID and VLAN priority. Security profile
configures authentication, cipher mode and radius profile. The ACL profile is a list of
user MAC addresses.
TPS14-009_rev1.2
TPS14-009_rev1.2
TPS14-009_rev1.2
TPS14-009_rev1.2
TPS14-009_rev1.2
TPS14-009_rev1.2
TPS14-009_rev1.2
NE specific configuration template can create template for each specific hardware
version and MIB version of different NEs. The created template cannot be applied
through different types of NEs with common configuration, but it provides a complete
set of configuration panels.
The view the list of templates that have been created for all types of NEs:
1. Select Tools-> NE Specific Configuration Templates…and the Configuration
Templates Management window pops out.
There are multiple ways to create a configuration template for a specific NE model. If
in your installed AWMS system, there are NE models that are compatible with each
other, create a template for any of those models makes the template available to
the rest of the compatible ones as well.
TPS14-009_rev1.2
1. Follow the steps in Section 6.5.1 View Templates above for the desired NE model
you wish to create a template for.
2. Click New… and the Create New Configuration Template window pops out.
Message “Please enter new configuration template name.” is shown.
TPS14-009_rev1.2
4. Click OK.
3. Click Edit….
TPS14-009_rev1.2
TPS14-009_rev1.2
6.6. NE Provisioning
Changing an NE’s configuration settings does not take effect until the NEs are
performed provision. The provisioning option available to a specific NE depends on its
current provisioning state. AN NE’s provisioning state can be viewed by the NE
Summary window or the Provision Status Tree View. There are 5 NE to be provisioned
at a time until all NE are provisioned.
6.6.1. Provisioning an NE
TPS14-009_rev1.2
To propagate NE configuration settings down to the NE, which may have been set by
applying a configuration template, manually edited, or copied from current
configuration of NE. In order to provision an NE,
1. Click a particular NE under the folder “Proxies” in the Network Topology Tree View.
2. Select Network Element->Provision.
NOTE: An NE can only be provisioned when it is online and has been registered
correctly. If the provisioning failed, an alarm should be raised and the Provisioning
Status should become Provision Failed.
TPS14-009_rev1.2
NOTE:
Auto-Provision upon Detected: Proper NE configurations in AWMS will be
written to a registered NE automatically if the NE is discovered by the
corresponding Proxy Server.
Re-Provision Upon Configuration Settings Updated: Proper NE configurations
in AWMS will be written to a registered NE directly by clicking Save only
(without clicking Provision).
Auto-Fix Inconsistencies: Proper NE configurations in AWMS will be written to
a registered NE automatically if inconsistent configuration is detected by the
AWMS.
When the provisioning status changes to any of those, they will be updated in real-
time by moving the NEs to the corresponding folders. Fault information is available in
this tree view just like the other tree views, as well as the right-click object menu
options.
In order to view the NE Provision Status Tree View, Select View->NE Provision Status
Tree.
TPS14-009_rev1.2
NOTE:
Provision Pending NEs: The initial state of an NE when it first becomes
managed and has never been provisioned before. It corresponds to the fact
that the NE must be provisioned before the NE configuration settings will be
applied.
Re-provision Pending NEs: If the NE configuration settings are changed after
the device has already been successfully provisioned once, this becomes
the new provisioning state.
Active in Provisioning NEs: The intermediate state of an NE during an active
provisioning request.
Provisioned NEs: The state of an NE after a successful provisioning.
Provision Failed NEs: The state of an NE after any un-successful provisioning
attempt.
AWMS can monitor and update any configuration changes that are performed
within AWMS itself; however some NE types have additional configuration methods
which can be accessed externally of AWMS, such as configuration through CLI or
web browser. For these types of configuration changes, there is no automatic
mechanism to inform AWMS that an NE’s configuration settings have been modified
and should be reloaded. In this scenario we rely on the users to perform a
configuration consistency checking for NEs that they have configured outside of
AWMS.
AWMS has the ability to detect whether the NE is using a configuration other than the
provisioned one. This operation is automatically enabled after the NE has been
provisioned successfully. It can be done automatically or manually.
TPS14-009_rev1.2
If you decide to use the configuration settings retrieved from the NE, then use the
Copy Configuration from NE (please kindly refer to the Section 6.2.2 Copy Current
Configuration to Settings).
If you determine that the Configuration Status settings are correct and you wish to
apply these configuration settings to the corresponding NE, then use the Fix
Inconsistent Configuration command. AWMS can fix the inconsistencies, where the
proper NE configurations in AWMS will be written to the NE. This option is available if
the NE has a configuration consistency state of Inconsistent, a connection status of
online or loss of communication and has been provisioned.
TPS14-009_rev1.2
3. Input the user name and Password, and then click OK to login.
4. Monitor / configure the NE through the web-admin interface.
AWMS could not indicate any configuration settings has taken place externally, so it is
important to perform a Configuration Consistency Check (please refer to the Section
6.7 Checking Configuration Consistency) for all NEs which may have externally
configured.
6.9. Reboot an NE
6.10. Disconnect an NE
Disconnecting an NE from AWMS will only affect the NE status in AWMS (i.e. the status
becomes offline as reported by Proxy). In fact, the actual NE status remains
unchanged. The most common usage for this command is to temporarily take a
device offline to perform a configuration change that requires the device to be in an
offline state. Normally, the Proxy Server will re-discover the latest device status during
its next NE discovery phase.
TPS14-009_rev1.2
7. NETWORK MONITORING
AWMS allows user to perform channel scanning on selected NEs. Channel scanning
provides detailed usage statistics of each channel. During scanning, the traffic of
selected NEs will be interrupted.
Selected NEs will perform a channel scanning. After each scanning, a summary of
channel usage and individual NE scan result will be shown.
TPS14-009_rev1.2
TPS14-009_rev1.2
To determine Rogue AP, AWMS has to compare the BSSID of APs to BSSID list stored by
AWMS server. To add them to the service for rogue AP detection:
TPS14-009_rev1.2
AWMS comply rogue AP detection rules to differentiate rogue APs from the legitimate
APs. APs with MAC match the MAC tagged as “Illegal MAC” and “Interference MAC”
will be considered as rogue AP and alarm will be raised to alert user to take action for
security purpose.
TPS14-009_rev1.2
5. Select “Rogue AP” on the left frame and click Save to commit changes.
NOTE: The MAC address can also be added via channel scanning. (Refer to
section 7.1.4 Adding MAC Address for Rogue AP Detection)
After rogue AP detection, AWMS will generate a rogue AP which comply the rogue
AP detection rules defined by user.
TPS14-009_rev1.2
Access control system is use to control public access network. By enable ACS
function, NEs can get multiple deployment scenarios. The following feature can be
supported in the ACS profile:
Captive Portal authentication
MAC based authentication
1x based authentication
Local subscriber database
RADIUS authentication and accounting
IP based access rule
Bandwidth control based on subscriber accounting information
Altai A3 Smart WiFi supports ACS. Details can be found on “Altai A3 Smart WiFi Access
Control System Configuration Guide” published by Altai.
1. Select the NE(s) you wish to update from the Network Topology Tree View. All the
NEs selected must match the following criteria:
Managed online NEs
In one of the following provisioning states: Provision Pending, Re-
Provision Pending, Provisioned, or Provision Failed
2. Right-click on the NE and select More Options->Update ACS Profile… (or from the
main menu, select Network Element->More Options->Update ACS Profile…) to
bring up the ACS Profile Update window:
TPS14-009_rev1.2
3. Updatable ACS Profile for selected NEs is shown in the Updatable ACS Profile
section above.
4. Alternatively, you could select Upload ACS Profile…
5. Click “Update” button.
6. If you proceed with the ACS profile update, the ACS Profile Update Progress
window should appear:
The progress bar will periodically update to indicate the process of the ACS profile
update. Check the box will automatically close this dialog when the process is done.
7. ACS File Update Finished dialog prompt indicates successful operation. Likewise if
an error occurred, you will receive an error dialog instead.
To add ACS Profile from the AWMS server, follow the following steps:
2. Select NE Type and NE Type Details to manage its ACS Profile. Note that NE Types
that does not support ACS will have it ACS Profile List grayed out.
TPS14-009_rev1.2
Figure 8-5 ACS Profile Unsupported NE (ACS Profile List Grey out)
To delete ACS Profile from the AWMS server, follow the following steps:
TPS14-009_rev1.2
4. You will be prompted to confirm the deletion of the task. Click “Yes” if you want
to remove the ACS Profile permanently.
9. FAULT MANAGEMENT
9.1. Concepts
9.1.1. Glossary
Historic alarm & After the active alarm is cleared, it no longer requires the
Alarm history operator’s attention and will be moved into the alarm history.
The historic alarms can be viewed from the alarm history.
See Persistent alarm, Instantaneous alarm.
TPS14-009_rev1.2
Un-cleared alarm An un-cleared alarm indicates the alarm has neither been
handled nor fixed.
An un-cleared persistent alarm indicates the outstanding
condition/problem is still in effect. An un-cleared instantaneous
alarm can be cleared by acknowledging it.
Force delete Applicable to persistent alarms only. The force delete feature
allows the operator to clear a persistent alarm by disregarding
the outstanding condition/problem. Force delete is useful when
the outstanding condition/problem has already gone away but
AWMS could not detect it (for example, a lost trap).
When an alarm is force deleted, it is automatically
acknowledged and moved into the alarm history.
All alarms in AWMS are color-coded based on their severity; the colors corresponding
to the ITU X.721 standards:
Severity Color
Critical Red
Major Orange
Minor Yellow
TPS14-009_rev1.2
Info Green
A “+” following the severity indicator means there are also other alarms of lower
severity that exist. For example:
As illustrated above, for all nodes in the Network Topology Tree View, if the node is a
container node (i.e. has children) the alarm status of the node represents the
summary of all its child nodes. Proxy nodes will first report the alarm status of the Proxy
in parentheses, followed by the number of NEs the Proxy contains in parentheses, and
finally followed by a dash (-) and the summarized alarm count for all its own node
plus all the nodes underneath that Proxy. E.g. Proxy (1M) (1 NE) – 2C+ means that the
Proxy named “Proxy” has a single un-cleared Critical alarm associated with it and a
single NE associated with the Proxy. The “2C+” indicates that the most severe alarms
in any of the nodes in its branch (which includes the Proxy node itself) are two Critical
alarms and at least one alarm of a less severe nature. If you require the exact details
of each alarm, that information is provided to you in Appendix A Supported Alarm List.
The following flowchart describes how the AWMS operator would handle alarms. The
details of the individual operations could be found in later session in this chapter.
TPS14-009_rev1.2
The detailed alarm descriptions can be found in Appendix A Supported Alarm List.
The operator should pay attention to whether the alarm has already been cleared or
not. The type of alarm (Persistent versus Instantaneous) can be determined by
investigating the “Clear” flag. Upon investigating the alarm, the operator should
acknowledge the alarm. For Instantaneous alarms, the alarm is cleared and moved
into history after it has been acknowledged. For Persistent alarms, when the alarm
condition is fixed, the alarm is cleared and moved into history.
TPS14-009_rev1.2
(Persistent Alarm)
“Clear” column Open alarm details, Investigate
“N/A” “No”
shows the problem (e.g. check cable
connections).
“Yes”
Acknowledge Alarm
(indicate the operator will
take actions to fix)
Acknowledge Alarm
Assign technician to
investigate Alarm
N
Has problem
been fixed by
technician?
Y Alarm
Cleared?
TPS14-009_rev1.2
AWMS provides you with an Active Alarms List display that will update in real-time for
all elements in your managed network.
The Active Alarms List contains a real-time updating summarized count of these alarm
categories each color-coded to the highest severity of alarm occurring in that
category:
The first is the Show Active Alarm Statistics button ( ), refer to the next
Section” Active Alarm Statistics Window” for more details.
The middle button ( ) on the right-hand side of the Active Alarms List is used
to bring up the Historic Alarms window (See Section 9.8.1 Alarms History
Window for more details on this topic).
The last button is used to show ( )/hide ( ) the alarm list portion of the
display. Initially in startup, the list portion is hidden. Click the show icon ( )
once to display it:
TPS14-009_rev1.2
Each field can be sorted in descending and ascending order by clicking on the field
name. A down arrow ( ); conversely an up arrow ( ) indicates ascending order.
Statistics button ( ) next to the alarm counts in the Active Alarm List Display:
TPS14-009_rev1.2
In the expanded Active Alarms List, clicking on the Filter… button will invoke the
Active Alarms List Filtering window:
TPS14-009_rev1.2
This window allows you to filter the alarm list based on one or more criteria based on
any of the fields listed in the list display.
Filter Operator: Indicates if each filtering criteria (if more than one) will be;
logically combined using an AND or OR operation.
ID: Support a variety of operations, select on of them and then input the ID
number;
Severity: Select the alarm’s severity.
Category: Select the alarm’s category.
Alarm Name: Input the alarm name.
Equipment Type: Select the equipment type.
Equipment ID: Input the equipment ID
Alarm Raised Time: Support a variety of operations, indicated by the first
combo box next to the field name.
Clear Filters button: Will clear all the filtering criteria.
Close button: Will close the Filtering window.
Leaving the field blank means you do not want to use filtering criteria for this field.
TPS14-009_rev1.2
In addition to the fields already displayed in the Active Alarms List, you will find the
following alarm attributes:
The Locate button will find and select the alarmed object in the Network
Topology Tree section.
The Copy to Clipboard button will copy into the system clipboard a textual
representation of this alarm and all the specific details listed in this window.
The Close button will close the Active Alarm Details window.
TPS14-009_rev1.2
AWMS understands that it may be impossible to monitor the network for alarms every
single moment, so it provides a checkpoint mechanism to indicate that alarms have
been raised or cleared since the last time you reset the checkpoint. The checkpoint
When there are a large number of alarms and network elements in your system, it
may be difficult to identify the specific device that caused the alarm raised. You can
1. Select the alarm in the Active Alarms List.
2. Double-click it with the left mouse button to bring up the Active Alarm Details
display.
3. Click the Locate button in the bottom left hand corner of window.
TPS14-009_rev1.2
AWMS requires all active alarms to be acknowledged by a user before they are
removed from the Active Alarms List. To acknowledge an alarm, you can
1. Select one or more alarm from the Active Alarms List (Associated Alarm List),
2. Right-click to bring up the object menu and select the Acknowledge option
You can also acknowledge all the alarms in the list by selecting the Acknowledge All
option from the object menu.
All persistent alarms in AWMS can be force deleted (provided they have not been
cleared yet). To force delete an alarm,
1. Select the desired alarm(s) from the Active Alarms List (Associated Alarm List)
2. Right-click to bring up the object menu and select the Force Delete… option.
3. A dialog will appear prompting you to type in a clearing reason:
4. Type in your reason for force deleting this alarm into the textbox.
5. Click OK to proceed with the force delete, or Cancel if you have changed your
mind.
6. If you successfully force delete the alarm, it will move to the Alarms History
window.
If the Force Delete… option is disabled, then at least one of the selected alarms is
either an instantaneous alarm, or has already been cleared. Simply de-select those
alarms if that is the case. You can use alarm filtering to filter out instantaneous alarms
and alarms that have already been cleared.
TPS14-009_rev1.2
In order to archive the historic alarms, AWMS can generate a textual representation
of Active Alarms to be viewed or stored elsewhere. Operators can access this feature
by right-clicking in the list portion of the Active Alarm List and select Export Active
Alarms
This window allows you to specify a time range to export historical alarms into a .TXT
file based on an alarm raise time range.
1. Enter in a File prefix to be used for the name of the file. AWMS will use the
following naming convention for the file: prefix-MMdd_hh-mm-ss.txt where prefix
is the file prefix you have chosen, MM is the current month (using two digit format),
dd is the current day (using two digit format), hh is the current hour in 24-hour
format, mm is the current minutes reading, and ss is the number of seconds of the
time when the command was processed by AWMS.
2. Click OK to submit the request, Cancel if you changed your mind.
Once the exported alarms have been successfully exported, you will get a status
screen like the following:
TPS14-009_rev1.2
1. To download this file from AWMS Server just clicks the Download button.
2. Checking the “Auto delete file from server after download finished” option will
make the only copy of the export alarms being the one downloaded to your
client machine.
3. The Close button will close this window.
If you chose to download the file, you should see the following screen:
1. Clicking the Open button will open the exported historical alarms file with
Notepad.
2. The Open Folder will open an Explorer window to the location where exported
alarms are stored on your client machine
3. Checking the “Close this dialog box when download completes” option while
TPS14-009_rev1.2
the download is in progress will close this window automatically, otherwise use
the Close button to close it manually.
Alarm Synchronization is a useful feature to check the status of all active alarms for
the entire network, for NEs under a specific Proxy, or just for a particular device. This
action will send a request to the appropriate network devices to perform an audit of
its outstanding active alarms.
Performing network wide alarm synchronization for can be burden on network traffic
operation, so it should be used with caution. You can invoke this operation by
selecting Alarms->Synchronize Alarms for Whole Network from the main menu.
Alternatively, invoke Synchronize Alarms for Whole Network from the object menu by
right clicking in the Active Alarms List.
You can perform an alarm synchronization of all network devices under a specific
Proxy:
1. Selecting the Proxy in the Proxy Status Tree View.
2. Choosing Synchronize Alarms from the object menu by right clicking the Proxy.
TPS14-009_rev1.2
Select the alarm need to be changed the severity and then click the Edit to modify it.
Historical alarms allow operators to track past problems and identify potential
bottlenecks in the network. AWMS also provides tools to export and archive historical
alarms to keep the system from being bogged down by too much historical data.
The Alarms History window is accessible from the main menu by selecting View-
>Alarms History, you can click the Open Alarms History button ( ) near the right-
hand side of the window right above the alarms list.
TPS14-009_rev1.2
The Alarms History window contains the same fields as the Active Alarms List plus an
additional column called Cleared Time which is the time that the alarm was cleared.
The two buttons on the top right-hand corner of the Alarms History window
are used to bring up the Active Alarms Statistics and Active Alarms List, respectively.
To change the default setting of most recent 100 history alarms (based on the Alarm
Raised Time), you can right-click anywhere in the list portion of the display and select
Retrieve Historic Alarms… (Alternatively select the Alarms->Retrieve Historic
Alarms…from the main menu).
The Filter Alarms History window allows you to choose from three different filtering
criteria:
Most Current No. of Entries: Displays an absolute number of most recent
historical alarms (values from 0-1000)
TPS14-009_rev1.2
Entries in Last No. of Hours: Displays all historical alarms in the last 0 to 24 hours
based on Alarm Raised Time
Alarm Raised Time Range: Allows you to select a time range for most recent
time and least recent time. Clicking the Current checkbox will specify all
alarms from the Least Recent Time till Now. Clicking the No Limit checkbox
will specify all historical alarms from the time AWMS started collecting data till
the Most Recent Time. Finally checking both checkboxes will specify all
historical alarms stored by AWMS.
Click the OK button to apply your selected filtering criteria, or the Cancel button to
cancel your changes.
If you want to go back to the system default of most recent 100 historical alarms, you
can use the Refresh Alarms History with Default Criteria option from the object menu
or from the Alarms main menu.
1. Clicking the Filter… button will bring up the Alarms History Filtering display.
2. The Clear Filters button is used to clear the column filtering feature only.
3. The current column filtering criteria will be displayed in the textual area to the left
of the Filter… button.
The History Alarm Details window is much like that of the Active Alarms Details window,
you can access it by double-clicking on a single historic alarm in the list portion of the
Alarms History window.
TPS14-009_rev1.2
Forced The username of the person that invoked the force delete command
Delete User on this alarm
Cleared Indicates which system event cleared this alarm OR if the alarm was
Reason force deleted, the reason text that the user typed as the reason for
force deleting this alarm.
See Section 9.3.3 Active Alarm Details for a description of the rest of the fields in this
window.
TPS14-009_rev1.2
In order to archive the historic alarms, AWMS can generate a textual representation
of Historic Alarms to be viewed or stored elsewhere. This feature can be accessed by
right-clicking in the list portion of the Alarms History window and select Export Historic
Alarms… or from the main menu Alarms->Export Historic Alarms…:
This window allows you to specify a time range to export historical alarms into a .TXT
file based on an alarm raise time range.
1. Enter in a File prefix to be used for the name of the file. AWMS will use the
following naming convention for the file: prefix-MMdd_hh-mm-ss.txt where prefix
is the file prefix you have chosen, MM is the current month (using two digit format),
dd is the current day (using two digit format), hh is the current hour in 24-hour
format, mm is the current minutes reading, and ss is the number of seconds of the
time when the command was processed by AWMS.
2. If you check the Remove export alarms from Alarm History option, this will
PERMANENTLY remove the alarms from AWMS.
3. Click OK to submit the request, Cancel if you changed your mind.
Once the exported alarms have been successfully exported, you will get a status
screen like the following:
TPS14-009_rev1.2
4. To download this file from AWMS Server just clicks the Download button.
5. Checking the “Auto delete file from server after download finished” option will
make the only copy of the export alarms being the one downloaded to your
client machine.
6. The Close button will close this window.
If you chose to download the file, you should see the following screen:
7. Clicking the Open button will open the exported historical alarms file with
Notepad.
8. The Open Folder will open an Explorer window to the location where exported
alarms are stored on your client machine
9. Checking the “Close this dialog box when download completes” option while
TPS14-009_rev1.2
the download is in progress will close this window automatically, otherwise use
the Close button to close it manually.
After you have archived the historical alarms, you may wish to reduce a number of
them in AWMS. Although the AWMS Client only shows the most recent 100 historical
alarms, CCS keeps all the historical alarms within the last 7 days by default. It is a
performance impact if the number of historical alarms grows too large, therefore
AWMS provides a periodic or an on-demand historical alarms pruning service to solve
this problem.
AWMS Server will automatically prune historical alarms once per day (at midnight
local time of the location which AWMS Server is installed) unless it is disabled. To
change the default periodic settings, from the AWMS main menu choose Alarms-
>Prune Historic Alarms…->Periodic Pruning Settings…:
To specify which historical alarms will be pruned, this dialog allows you to configure
which alarms you would like to keep based on the most recent alarm raise time:
You can specify the number of days’ worth of historical alarms to keep, with
the older alarms being pruned automatically. A value of -1 will keep all
historical alarms while a value of 0 will keep no historical alarms.
You can specify a fixed number of historical alarms to keep, while the rest will
be pruned away.
You can use a combination of BOTH options above.
You can also disable historical alarm pruning altogether by disabling all
options.
Checking the “Backup historical alarms before pruning” option will automatically
export the alarms to a text file before pruning takes place. You will need to specify file
TPS14-009_rev1.2
Click OK to apply the new Periodic Alarm History Pruning settings or Cancel to leave
them as they were.
To perform a once only immediate pruning of historical alarms, select from the AWMS
main menu Alarms->Prune Historic Alarms->On-Demand Pruning…:
To perform a once only immediate pruning of historical alarms, select from the AWMS
main menu Alarms->Exporting Historic alarms.
TPS14-009_rev1.2
You can view a complete list of exported/pruned alarms currently stored in CCS (not
only exported by yourself, but also by all AWMS users) by accessing the Open
Exported Files… option from the Alarms main menu (likewise also accessible from the
object menu of the Alarms History window by right-clicking).
This window will display a list of all files in the directory in AWMS Server reserved for
storing exported historical alarms.
1. Before you begin downloading if you want to delete the file from AWMS Server
TPS14-009_rev1.2
after download completes, check the “Auto delete file from server after
download finished” option.
2. Select a file from the list and click the Download button to begin downloading
the file to your local machine.
Clicking the Delete button while a file is selected will permanently delete the
exported alarms file from the AWMS Server. If you want to refresh the list of files, click
the button in the top right-hand corner ( ). When you are done, click Close to close
this window.
3. Enter the Name and Description for the Alarm notification configuration
4. Click the Criteria for alarm log parameters.
TPS14-009_rev1.2
TPS14-009_rev1.2
5. Click the Email Destination to configure the email configuration the recipient
email address.
6. Click Close.
Alarm Notification email will be sent to the recipient email address when the
conditions in Criteria are satisfied.
The bridge is an import function in the Wireless network. So AWMS supplies some
options for users, users can easily and efficiently manage the bridge by these options.
Let’s introduce these options now.
In the AWMS, you can define/ modify or delete some types of link, if you want to do it,
please follow these steps
1. If you want to add a new link type, please select Link management->Link
management… in the main menu, then enter the Link Type Name and click Add
button in the pop-up menu.
TPS14-009_rev1.2
2. If you want to modify a link type which already exists in the AWMS, please select
Link management->Link management… in the main menu, and then left click a
link type which you want to change in the Link Type Name frame. It will show in
the Link Type Name frame. You can change the character string now, and then
click the Modify button to save it
TPS14-009_rev1.2
delete and click Delete button. The system would pop-up a window to ask you
confirm it. Please click Yes button to delete it, or click No to cancel it
TPS14-009_rev1.2
4. Click Select button in the Near End Base Station frame to select a NE
5. click All or default region in the Map frame to filter NEs, then select a NE in the
Available NEs frame, finally click Select button to save and close the window
6. Click Select button in the Far End Base Station frame to select a NE,
7. click All or default region in the Map frame to filter NEs, then select a NE in the
Available NEs frame, finally click Select button to save and close the window
TPS14-009_rev1.2
TPS14-009_rev1.2
In order to show all links, you can select Link management-> Show All Links. It will
open the Links list window, in this window; we can see all of the links.
AWMS provides a Link searching capability which can be accessed, In order to have
a basic link searching, please follow the steps.
1. select Link management-> Search Links…, it will open the Search Links window
2. Enter the link name in the corresponding field.
3. Click Search button
The search Link window allows you to search links by the name including wildcard,
matching and literal string matches. Use the * character to denote wildcard
matching and text surrounded by “ ” denotes literal string matching. If you do not
specify a wildcard character or a double-quote character in the name, AWMS will
automatically insert one for you at the beginning and end of your searched string,
TPS14-009_rev1.2
On the other hand, AWMS provides advanced searching capability, you can search
the links with other parameters. In order to have an advance link searching, please
follow the steps
1. In the Link List window, click the Advanced Search…button, the system will
pop-up a window
2. Enter the Links name or other parameters in the corresponding field.
3. Click Search button
TPS14-009_rev1.2
TPS14-009_rev1.2
In order to further divide a single Proxy’s area into smaller regions, you can define
Maps in AWMS which can be associated to individual Proxies. When creating a Map,
you will define its geographic dimensions, the size that will be used to represent in
AWMS, the co-ordinate system, and optionally insert an image into this map, to help
you further visualize the area you are managing.
By default, AWMS will contain a blank map called DEFAULTREGION which you can
customize to your own purpose. Select the map you want, and click the View…
button and the map will be displayed in the center portion of AWMS Desktop in the
Topology Window.
TPS14-009_rev1.2
Next>.
Note1:
For GPS Location type, it’s better to know the accurate Longitude and Latitude
of the map. Google Earth is a simple tool to get the longitude and latitude data.
Note2:
If you choose “x-y coordinates in meters” in Coordinates System, then go to step
3; if you choose GPS Location (Longitude, Latitude) in Coordinates System, then
TPS14-009_rev1.2
go to step 7.
3. Select Yes and click the Browse button to and bring up a file chooser dialog
which you can specify the name and location of the image you want to import.
TPS14-009_rev1.2
Choose option 1 if you only know the actual size (width and height) of
the area than the map represents.
Choose option 2 if you want to use a pixels/meter scale and AWMS
will calculate the map size based on that.
Choose option 3 if you do not know either but can physically measure
a distance represented in the map. Click Measure to bring up the
Measure Map Scale window:
TPS14-009_rev1.2
TPS14-009_rev1.2
8. Click the Next > button to continue. Then the Map Size and Calibration window
appears.
9. On the Map Size and Calibration window, click the Map calibration… button to
open up the Map Calibration window.
TPS14-009_rev1.2
Click on one location of the map and input the 1st reference point GPS coordinates.
Note: Please click a point with known coordinate! 3 reference points should be as
far as possible, better at the three corners of the map, to provide better calibration
result.
Enter in the longitude and latitude coordinates for the actually location you
TPS14-009_rev1.2
10. Click on the second location of the map and input the 2 nd reference point GPS
coordinates:
11. Click on the third location of the map and input the 3rd reference point GPS
coordinates:
12. After input 3 reference points GPS coordinates, you can see 3 red crosses on 3
corners: The 1st red cross is on the top-left, 2nd red cross is on the button-left and
the 3rd red cross is on the button-right:
TPS14-009_rev1.2
13. Once all three points have been entered, click OK to return to the Create Map
Wizard window, or use the Clear All button to clear the calibration information
and begin again.
TPS14-009_rev1.2
For any final adjustments, click the Adjust button next to the respective reference
point you wish to modify. The Scaling Coordinates window will pop out for this step.
Otherwise you can also redo the calibration step by clicking Map Calibration…if
necessary.
If you have finished calibrating, then click the Next > button to go to the final step.
Note: If you navigate back to the previous step using the < Back button here, you
will lose all the calibration information you have already entered!
If you need to change any of the information listed here, use the < Back button to
navigate back to that step and perform your modifications.
TPS14-009_rev1.2
Sometimes the resolution of an outdoor map is too low to show detailed network
topologies in narrow areas. So a hierarchical map structure is created in AWMS to
solve this problem. Please follow below procedures to add a child map to a parent
map.
1. To create a child map, select and right click on the parent map. From the object
menu, select Add Map….
TPS14-009_rev1.2
2. When the Create Map Wizard pops up, make sure the map shown in the Parent
Map: field is the one that you want to add a child map to.
The rest of child map setting procedures is same as those for a parent map. Please
refer to the steps in Section 11.1 Add a New Map to create the child map.
3. After adding the child map, its icon appears under the parent map tree in the
TPS14-009_rev1.2
To open a Topology window to view a map, you can simply double-click on a map in
the Proxies and Maps Tree View.
TPS14-009_rev1.2
The Topology Window has a built-in toolbar with the following functions:
Map Settings Displays the map settings in View mode, allows you to
edit map settings in Edit mode for the current map.
Save Map Saves any changes that have been made in the
Topology Window (this includes map and image
changes). The zoom range will be saved after the
AWMS CCC is closed.
TPS14-009_rev1.2
Panning* Allows you to pan the map if the current zoom level has
magnified the map such that it no longer can be
displayed completely by the Topology Window.
Zoom In* Selects the zoom in tool, click on the map to zoom in
one level.
Zoom Out* Selects the zoom out tool, click on the map to zoom out
one level.
* The default mouse cursor when none of the panning or zooming capabilities are
enabled is an arrow icon. You can only use the arrow icon cursor to select images
and maps. However if you have enabled panning or zooming, the mouse cursor will
switch to their respective icons. In order to select images and maps again in the
Topology window, you have to deselect panning or zooming by clicking the
appropriate toolbar button.
If you move the mouse over a specific toolbar button for a moment, the name of the
button will be shown as help text.
In addition, there are two drop down boxes to the right of the Topology window
toolbar which provide the following functions:
Filter managed APs by Proxy: Allows you to view only the APs positioned in
the Topology window map associated with a specific Proxy or None to show
all APs positioned in the map regardless of which Proxy.
Zoom Level: Allows you to select from some pre-defined zoom levels to view
the current map in the Topology window. Default is 100%. Page Width adjusts
the zoom level of the map such that the map width takes the entire width of
the Topology window. Page Height does the same as the latter, except for
using the height of the map instead of width. Finally whole page will fit the
complete map into the Topology window without the need for scroll bars
You have the capability of modifying the attributes, including the inserted image of
all the maps created in AWMS.
Before you perform any changes to a map in AWMS from the Map Pool, you must first
unlock it:
1. Open up the map you wish to modify in the Topology window.
2. Click the Lock Map toolbar button in the Topology window toolbar to unlock the
map.
TPS14-009_rev1.2
Note: You can also unlock a map by right-clicking on it, and select Lock Map.
3. The Map Settings window allows you to edit the basic information, map size and
map scale. If you wish to change the coordinate system, you will need to create
another map in order to do so.
4. If the map is using a GPS coordinate system, the map size data is moved to then
second tab entitled Map Size and Calibration.
TPS14-009_rev1.2
5. Make your changes in the Map Settings window and click OK to apply them, or
Cancel to ignore all changes.
6. Click the Save Map ( ) to save the changes made on the map.
2. Click the Insert Image ( ) toolbar button (or right-click on the map, and select
the Add Image… option or from the main menu, Topology->Image->Add
Image…).
TPS14-009_rev1.2
3. The Import New Image window is displayed. Click the Browse button to load an
image file (supported formats are BMP, JPG, and GIF) from your computer.
4. For outdoor maps (using the GPS Location coordinate system), the only option for
the Image Size section is “Remain 100% for the image size”. For indoor maps,
(using the x-y coordinate system) you can select from all the options available.
The last option allows you to set the width and height manually. You can specify
the measurements in actual size (pixels) or modeled size (meters). The “Constraint
Proportion” option will keep the width and height aspect ratios the same if
enabled, or allow you to change both values arbitrarily if disabled.
5. In the Image Position section, choose a starting point for your image to appear in
the map. Again, you may choose between measurements in actual size (pixels)
or modeled size (meters).
6. Click the New button to insert the image.
If the current map you are viewing in the Topology window contains an image, you
can modify the image settings by performing the following steps:
1. Unlock the map you wish to modify.
2. Click the Image Settings ( ) toolbar button (or right-click on the image, and
select the Image Settings… option or from the main menu, Topology->Image-
>Image Settings…).
TPS14-009_rev1.2
3. The Import New Image window is displayed. You may change the name of the
image if you want.
4. For outdoor maps (using the GPS Location coordinate system), the only option for
the Image Size section is “Remain 100% for the image size”. For indoor maps,
(using the x-y coordinate system) you can select from all the options available.
The last option allows you to set the width and height manually. You can specify
the measurements in actual size (pixels) or modeled size (meters). The “Constraint
Proportion” option will keep the width and height aspect ratios the same if
enabled, or allow you to change both values arbitrarily if disabled.
5. In the Image Position section, choose a starting point for your image to appear in
the map. Again, you may choose between measurements in actual size (pixels)
or modeled size (meters).
6. Click the OK button to accept the changes.
If you just want to adjust the image location in the map, you can do so visually by
performing the following actions:
1. Unlock the map you wish to modify.
5. Click the Lock Images ( ) toolbar again to re-lock the image to prevent
TPS14-009_rev1.2
6. Click the Save Map ( ) toolbar button if you are finished with all your changes.
5. Click the Save Map ( ) toolbar button if you are finished with all your changes.
Deleting a map in AWMS Desktop is the equivalent of removing the map from the
entire system.
1. Open up the Map Pool window
2. Select the map(s) you wish to delete and click the Delete button. If the map is
already displayed in the Topology window, you can right-click and select the
Delete Map option or invoke from the main menu Topology->Delete Map. Or
from the Proxy Status Tree View, select map you wish to delete (if listed) and
select the Map option or invoke from the main menu Topology->Delete Map
3. You will be asked for confirmation if you want to delete all the maps that you
have selected. Click Yes to delete them, choose No if you changed your mind.
Note: If you delete a map that contains positioned devices, those devices will
lose their positioning and be moved back to the Location Undefined folder in the
Proxy Status Tree View.
Maps can be assigned to Proxies to create another level in modeling the physical
topology of your network.
11.6.1. Assign
TPS14-009_rev1.2
a Proxy.
2. Right-click and select the Associate Proxy… command (or invoke Topology-
>Associate Proxy… from the main menu)
3. Select the Proxy name you want to associate to this map then click Associate
button.
TPS14-009_rev1.2
4. After Associating, the map’s icon moves to underneath the Proxy’s sub-tree.
11.6.2. Un-assign
TPS14-009_rev1.2
original Proxy to No Associated Proxy Map in the Proxies and Maps Tree View.
To show detailed network topologies in narrow areas, you can place the child maps
onto their parent map according to their respective locations.
Positioning a child map in AWMS is accomplished through a simple drag and drop
interface:
1. Unlock the parent map you want to position his child map on.
2. Under the sub-tree of the parent map, select a child map.
3. Click and drag this child map onto the Topology window.
4. Release the mouse button to drop the child map on the location you desire, and
a child map icon will be placed onto that location.
5. If you wish to refine the position further, go to Section 11.7.2 Modifying Child-Map
Position.
6. Click the Save Map ( ) button if you are finished placing the child map, or you
may repeat steps 2-6 to place more child maps onto the their parent map.
TPS14-009_rev1.2
7. By double-clicking the child map icon on its parent map, the child map will show
in the Topology window.
Modifying child map positions is done through the Topology window in Edit mode:
1. Unlock the parent map.
2. Select the child map in the Topology window.
3. If you want to visually change the child map’s location, you can click and drag
the child map in the Topology window to a new position and release the child
map in the new location.
4. If you want to change the child map’s location numerically, you can click the
Figure 11-30 Map Location: The child map belongs to x-y type
TPS14-009_rev1.2
Figure 11-31 Map Location: The child map belongs to GPS Location type
1) If the child map belongs to x-y type: Adjust the X and Y coordinates by typing in
a new value or clicking the up/down arrows besides the values to
increment/decrement them;
2) If the child map belongs to GPS Location type: Adjust the Longitude and Latitude
coordinates by typing in a new value or clicking the up/down arrows besides the
values to increment/decrement them
3) Adjust the orientation if desired
4) Click OK to apply the changes, Cancel to ignore them
5) If you applied the changes, the child map will move to its new location in the
map
5. Click the Save Map ( ) button when you want to commit your changes.
Deleting child map position from the parent map can be accomplished by:
1. Unlock the parent map.
2. Select the child map you want to delete the position in the Topology window;
they should be highlighted with red boxes.
3. You can delete the child map position from the map by performing one of the
following actions:
4. You should be prompted with a dialog asking you to confirm your action.
TPS14-009_rev1.2
however you must click the Save Map ( ) button in order to commit the
change.
11.8. NE Positioning
You can place NEs into their respective locations onto the maps (or child maps) that
have been associated to Proxies. It is recommended that you position the NEs as
accurately as possible to their real locations as represented by the maps and images
in order to create a realistic model of your managed network. Only Managed NEs
may be positioned in maps and each NE can only reside in a single location.
11.8.1. Position an NE
TPS14-009_rev1.2
TPS14-009_rev1.2
5. If you wish to refine the position further, go to step 2 in the Section 11.8.2
Modifying NE Position.
6. Click the Save Map ( ) button if you are finished placing NEs, or you may
repeat steps 2-6 to place more NEs onto the same map.
7. Once you save your changes, the NEs you have placed will move from their
original locations in the Proxy Status Tree View to underneath the destination
map’s sub-tree.
TPS14-009_rev1.2
8. If you want to position an NE onto a child map, the steps are the same with the
above. (e.g. Positioning AP_SD to child map NanShan_HouHai)
TPS14-009_rev1.2
Modifying NE positions is similar to modifying child cap position and it can be done
through the Topology window in Edit mode:
1. Unlock the map.
2. Select the NE in the Topology window.
3. If you want to rotate the NE icon, click on the Rotate Location ( ) toolbar (or
right-click on the NE, and select the Rotate option)
1) Re-click on the NE and hold down the left mouse button. You will see
the NE icon rotating as you move the mouse around.
2) Release the left mouse button once you have rotated the NE to the
desired orientation.
3) Once you have released the NE, clicking on it again will jump back to
Move Location mode in the toolbar, and you will need to click the
TPS14-009_rev1.2
Figure 11-38 AP Location: The child map belongs to GPS Location type
1) When the map belongs to x-y type: Adjust the X and Y coordinates by
typing in a new value or clicking the up/down arrows besides the
values to increment/decrement them;
When the child map belongs to GPS Location type: Adjust the
Longitude and Latitude coordinates by typing in a new value or
clicking the up/down arrows besides the values to
increment/decrement them.
2) Adjust the orientation if you want.
3) Click OK to apply the changes, Cancel to ignore them.
4) If you applied the changes, the NE will move to its new location in the
map.
6. Click the Save Map ( ) button when you want to commit your changes.
TPS14-009_rev1.2
must click the Save Map ( ) button in order to commit the change.
AWMS provides a capability to view the root logical topology which shows a lot of
useful information about NEs. For example, NE name, registration type, connection
status, provision status, proxy, map, etc. In order to view the root logical topology,
select Topology->Root Logical Topology, and the system will pop-up a Registration
Type window
Upgrading firmware for an NE will overwrite its existing firmware. This action can have
severe consequences on the proper operation of the NE, so you must be sure of the
integrity and suitability of the firmware image you choose. Firmware upgrades can
only be performed on NEs matching all of the following criteria:
Managed online NEs.
In one of the following provisioning states: Provision Pending, Re-
Provision Pending, Provisioned, or Provision Failed.
Note: When selecting more than one NE to upgrade, AWMS Client will only show
the firmware images that are applicable to ALL of the selected NEs. Therefore if you
TPS14-009_rev1.2
select more than one type of NE, it is unlikely there will be ANY firmware that is
applicable to two different types of NEs. Registration Tree View is the easiest way to
tell if all NEs are the same type, as NEs are sorted by NE types and models in that view.
3. The existing firmware versions of the selected NEs are shown in the Current
Firmware section and the available firmware choices are shown in the
Upgradeable Firmware section below. Choose a single firmware that will be used
to upgrade all of the listed NEs.
4. Alternatively, you could select the Upload Firmware.
TPS14-009_rev1.2
Note: that the existing firmware version will be listed among the available
choices, and if you decide to re-use the same version, you will get a warning dialog
asking you to confirm. Click Yes if you want to continue the upgrade process, click
No to cancel.
6. If you proceeded with the firmware upgrade, the Firmware Upgrade Progress
window should appear:
The progress bar will periodically upgrade to indicate the process of the firmware
upgrade. Check the box will automatically close this dialog when all of the
firmware upgrades are done.
7. Once the firmware upgrade is successful, a Firmware Upgrade Finished dialog
pops up to indicate this. Likewise if an error occurred, you will receive an error
dialog instead.
TPS14-009_rev1.2
Each model of NE supported by AWMS has an active firmware image that is used for
firmware upgrades of that particular model. Additionally, each model may have one
or more additional firmware images that are stored within AWMS. Users can add
additional firmware images, change the active firmware image, and delete firmware
images using the Firmware Images for Supported NE Types window.
To add a firmware image for a particular NE model and type, you must have the
firmware image file prepared in advance on your client machine. Then invoke the
following commands:
1. From the AWMS main menu, select Tools->Firmware Management… to bring up
the Firmware Images for Supported NE types window:
TPS14-009_rev1.2
Note: AWMS has no method of verifying whether the file you choose is actually a
valid firmware image file for the selected NE model, so you must ensure the validity of
the file yourself.
5. The firmware image file will be uploaded to the AWMS Server and appear in the
list of available images for the selected NE model.
6. Click Close if you are finished uploading firmware images. If you want to upload
another firmware image for the same NE model, go back to step 4. If you want to
upload a firmware image for a different NE Model, go back to step 2.
If a particular model of NE has more than one firmware image stored in AWMS, you
can set the active firmware image for it. For example, if there is a new revision of the
firmware for this model of NE, and you want to use the latest revision for all future
firmware updates, you would upload it to AWMS (see Section 12.2.1 Add Firmware
Images), set it as the new active firmware image and then perform a firmware
update for the managed instances of this model of NE (see Section 12.1 Upgrading
Firmware) in your network.
TPS14-009_rev1.2
Once firmware images become obsolete, you will likely want to remove them from
AWMS, so that no one would mistakenly use it. However you can only delete a
firmware image if it is NOT currently the active one. Therefore if a particular NE model
only has one firmware image associated with it, you will not be able to delete it,
because each model type must have at least one firmware image.
TPS14-009_rev1.2
3. The Task Scheduler contains a list of tasks, each consisting of the following entries:
Task Name: A unique identifier for each task.
Operation Status: The current status of the task, one of
a. Suspended: the task has either finished running (single execution
tasks) or been manually suspended (single execution or repeating).
b. Running: the task will execute at its schedule time.
Execution State: States whether the task itself is currently executing or not at
the exact moment. It can be one of:
a. Pending: task is waiting for executing at the scheduled time.
b. Executing: the task is currently executing.
Scheduled Time: Specifies the next execution time or “N/A” if the task has
already executed in the past.
Creator: Displays the user account that created the task initially.
Last Modifier: Displays the user name of the person that last modified the task.
Last Execution Task: Displays the most recent time this task has executed or
“Never Executed” if the task has never been run.
Last Execution Status: If this task has never been executed before, it will
display “Never Executed”; otherwise this column displays the result of that
execution. It can be one of
a. Succeeded: the last execution of the task was successful.
b. Failed: the last execution of the task resulted in a failure.
For each of the scheduled tasks listed in the Task Scheduler, you can toggle its
operation state from Running to Suspended and vice-versa by:
TPS14-009_rev1.2
1. Select the task in the Task Scheduler, right-click on it and select Change
Operation State.
2. You will be asked to confirm if you want to resume/suspend the selected task.
Click Yes to confirm, or No if you want to leave the operation state as is.
3. Tasks that are listed as “Running” will be suspended, and tasks listed as
“Suspended” will become active again after this operation.
Note: Single execution tasks (that are not automatically deleted) will go to a
“Suspended” state after its scheduled execution. If you resume a single execution
task that has already passed its execution time, it will never execute and stay in the
“Running” state forever (until deleted).
For repeating tasks and single execution tasks that have not yet executed, you can
modify the tasks’ scheduled execution time or the firmware update groups
associated with the task. To modify an existing task,
1. Follow steps 1-2 from Section 13.1 Viewing Scheduled Tasks above to bring up the
Task Scheduler.
2. Select the task you want to modify, right-click on it and select Modify Task….
3. The Scheduled Task screen will display the current parameters of the selected
task.
4. Follow steps 3-19 from Section 13.1 Viewing Scheduled Tasks above to modify the
desired parameters of this scheduled task.
5. If you want to undo your change(s), click the Refresh bottom to revert back the
saved settings of the task.
6. Click the Save button if you want to commit your changes.
7. If the task’s Operation State automatically goes to “Suspended”, it probably
means you have modified a single execution task to a time/date that has
already expired. Repeat steps 1-6 to modify the task again if you want to re-
schedule a later time for execution.
TPS14-009_rev1.2
can simply suspend it, see Section 13.1 Viewing Scheduled Tasks above),
otherwise click No if you want the task to remain in Task Scheduler.
3. Enter a name to the Task Name field. This enter should be unique within this
AWMS system; otherwise you will get an error when you attempt to save the task.
4. The Operation field can be
NE Provision
User Activity Log Pruning
TPS14-009_rev1.2
Rogue AP Detection
Channel Scan
Firmware Update
User Session Log Pruning
5. The Operation Configuration section allows you to configure which NEs or how
AWMS perform the selected task.
a) For “Firmware Update”, the Firmware Upgrade Groups allow you to batch
several groups of NEs to upgrade at the same scheduled time. For each
group, you can only select one firmware image for upgrading, so the NEs
belonging to that group should all be capable for upgrading to the selected
firmware image.
(Refer to section 13.6 on how to create a firmware group for task scheduling.)
b) For “Channel scan”, “Rogue AP detection” or “NE Provision”, simply select the
NEs to perform the scheduled task.
c) For “User Activity Log Pruning” or “User Session Log Pruning”
6. Click the Schedule tab to configure the execution time for this task
7. Modify the Start Time and Start Date to when you want this task to take place.
TPS14-009_rev1.2
8. By default, the task will just run once. However if you want this task to execute
more than once, in the “Recurrence Pattern” section below, select on of the
following choices:
Periodic: Configure how many seconds apart you want this task to
repeat executions. The handle missed tasks parameter allows you to
specify to run tasks that have been missed in the past (due to being
suspended) within a certain number of seconds of the scheduled time.
For example, suppose this task was scheduled to run every 60 seconds,
but missed the last execution due to being suspended. If you set this
parameter to 10 seconds, and the task is changed to “Running” within
10 seconds of the last execution time, it will execute once for the
missed time, otherwise if it has been longer than 10 seconds, it will skip
the missed execution.
Daily: Choose from running this task every certain number of days,
only on weekdays, or only on weekends. The handle missed tasks
parameter allows you to specify to run tasks that have been missed in
the past (due to being suspended) within a certain number of hours of
the scheduled time.
TPS14-009_rev1.2
Weekly: Select to run this task every certain number of weeks, as well
as the days of the week that this task will run. The handle missed tasks
parameter allows you to specify to run tasks that have been missed in
the past (due to being suspended) within a certain number of days of
the scheduled time.
Monthly: Select either from a periodic day or the first, second, third,
fourth, or last of the selected day(s) of the week for the selected
months to run this task. The handle missed tasks parameter allows you
to specify to run tasks that have been missed in the past (due to being
suspended) within a certain number of days of the scheduled time.
Yearly: Select a certain day or the first, second, third, fourth, or last
day(s) of the week of a certain month to run this periodic task. The
handle missed tasks parameter allows you to specify to run tasks that
have been missed in the past (due to being suspended) within a
certain number of days of the scheduled time.
TPS14-009_rev1.2
9. If you have selected a recurrence pattern, then you can also configure the
Range of Recurrence by selecting from:
No End Date: The default option, which keeps repeating the task based
on the recurrence pattern infinitely.
End After: Specifies the number of executions after which this task will stop
repeating.
End Date: Specifies a date at which this task will stop repeating.
10. If you want the task to delete itself after it has ended (all scheduled executions
have completed), then check the “Auto Delete Ended Task” option.
11. Click Save to create the task. If any errors are detected, they will be highlighted
by red error icons. Mouse over them to read the specific error information. You
may have to go back to the Task tab to check for errors there as well. Fix any
errors and click Save if necessary:
TPS14-009_rev1.2
12. After successfully creating a task, it will be added into the Task Scheduler list view.
TPS14-009_rev1.2
2. In the Firmware Update Selection window, under the “Available NEs” section,
select the NEs you want to include in this upgrade group.
3. Once you have finished selecting the NEs to update, in the Upgradeable
Firmware section, select a firmware to update those NEs to.
4. Enter a description of the group into the Firmware Group Description field.
5. Click Save to create the firmware group.
6. You should see your group description in the Firmware Upgrade Groups now. By
selecting the particular group, it will show the NEs that are associated with that
group in the Selected NEs panel.
7. Repeat steps 6-10 if you want to create another firmware upgrade group which
will execute at the same time. If you are trying to add one NE to more than one
upgrade group, you will get a warning message when you attempt to save this
task.
8. You can select any of the firmware upgrade groups and modify them by clicking
Modify if necessary.
9. If you want to delete any of the firmware upgrade groups, select it by name and
click the Delete bottom.
By default, AWMS will automatically collect statistical system information per hour and
generate a report correspondingly. State of the whole network or individual NE can
be easily viewed by selecting Statistics->Hourly System Statistics, showing the system
TPS14-009_rev1.2
report time, network elements, service status, network elements Ethernet traffic
statistics status, mobile clients statistics status.
Similarly, AWMS also generate statistical information in daily basis such as traffic
number of client association and NE online status. This can be viewed by clicking
Statistics-> Daily Statistics.
TPS14-009_rev1.2
TPS14-009_rev1.2
TPS14-009_rev1.2
Edit parameters such as General table, Title table, Header and Footer table or
Contents table as needed.
There are two ways to add a new report configuration by either selecting Statistics->
Add New Report Configuration or Statistics->List Report Configuration->Add. To add a
new report configuration:
TPS14-009_rev1.2
TPS14-009_rev1.2
a) Click File System tab to appoint a directory for saving report. Checking
the box on top to enable this capability to save in default repository on
AWMS or check the second box to allow AWMS to put the reports into
the target directory stated.
TPS14-009_rev1.2
c) Click Email tab to configure the AWMS to send the report by email.
Check the box and enter the SMTP Server, Port, User Name, password,
confirm password, Email Format and Body to enable this capability.
d) Click OK button to return to the report menu
TPS14-009_rev1.2
9. Select Header and Footer to open the window for configuration the
header and footer of the reports
10. Double click the <Header Text> to type header text
11. Click the little rectangle below <Header Text> to select the header image
12. Double click the <Footer Text> to type header text
13. Click the little rectangle above <Footer Text> to select the header image
TPS14-009_rev1.2
14. Select Contents to open window for configure a sub-report for one or
multiple NE
15. Check the box before Hourly System Statistics Report to enable
16. Drag and drop the NEs in the left-hand tree view into the List-box in the NE
Statistics frame
17. Modify the Time Range
TPS14-009_rev1.2
TPS14-009_rev1.2
AWMS saves statistics reports in the CCS by the name of report configuration
classification. These report can be displayed and managed by selecting Statistics-
>List Generated Reports. AWMS will display the window of report manager. Reports
can be downloaded or deleted as needed.
TPS14-009_rev1.2
TPS14-009_rev1.2
14.5. NE Summary
Select Administration->Function Sets…, users can start manage the function sets.
TPS14-009_rev1.2
NOTE: Any change made on System Security has to be done by Root users or the
users have System Security Management access right.
In the Function Set List, there are four defined function sets:
1. Monitor users could only monitor the status of the network and acknowledge the
alarms.
2. Besides monitoring the network, Operator users are allowed to have some levels
of access right of configuration.
3. Admin users have even higher access right of configuration than Operator users.
4. Root users not only have the access right to configure all the settings but also
could create new user accounts and function sets.
Besides the four defined function sets, users can create their own function sets:
1. Right click anywhere on the Function Set List window and select Add Function
Set….Alternatively click Add… bottom in the right-lower corner of the Function
Set List window.
2. Enter Function Set Name and Description in the pop-up Create Function Set
window.
TPS14-009_rev1.2
3. Select the Authorized Functions that you want to include in this function set.
4. Click Save to save the setting, click Cancel to quit without save.
TPS14-009_rev1.2
3. Select Yes on the pop-up window to delete the function set, select No to exit this
setting.
TPS14-009_rev1.2
The only system default user account is root and its password is ims.
2. Set Password Expiration to a number of days, after which the password will expire.
3. Set Incorrect Password Lockout Threshold to a number of tries, after which the
account will be disabled.
4. Set Account Expiration to a number of days, after which the account will expire.
5. Set Maximum User Session Log Entries to a number. This is the maximum number
of entries for AWMS to save the logon information of each user account.
6. Set Maximum User Activity Log Entries to a number. This is the maximum number
of entries for AWMS to save the activity information of each user account.
7. Click Save to save the setting.
TPS14-009_rev1.2
2. Enter Username, Full Name, Description and Password. Select the proper Function
Set.
3. Click OK to save.
TPS14-009_rev1.2
This function allows user to modify their own accounts, including the full name,
description and password.
1. Select Administration->My Accounts….
2. Change Full Name, Description or Session Inactivity (minutes).
3. Change password by clicking Change Password. In the pop-up Change
Password window, enter the old password and new password. Click OK to save.
When the user account is disabled or expired, a warning message pops out when
someone is trying to log in by this user account.
TPS14-009_rev1.2
TPS14-009_rev1.2
15.3. Logs
User session logs will save the logon information of each user account, including
Remote IP Address, Start and End Time of Logon, Durations and End Reason.
1. Select Administration->Search->User Session Logs….
2. In the User Name field enter the user account you want to search. The IP Address
and Function Set of the user, Start Time, End Time and End Reason of the user
session log are optional.
3. Click Search.
4. Select Open in the pop-up “Search User Session Logs Success” dialog to open the
log file.
User activity logs will save the activity information of each user account, including
Request Activity Time, Request Activity and Result of the Activity.
1. Select Administration->Search->User Activity Logs….
2. In the User Name blank enter the user account you want to search. The Start Time
and End Time of the user activity log are optional.
3. Click Search.
TPS14-009_rev1.2
4. Select Open in the pop-up “Search User Activity Logs Success” dialog to open
the log file.
Logon Users List displays all the users that are currently logged on AWMS.
1. Select Administration->Logon User Accounts….
2. The Logon Users List displays the logon user name, IP address, function set and
Session Start Time.
TPS14-009_rev1.2
This is a list of all the system alarms supported by AWMS currently1. Each alarm lists the
following items: alarm name, severity, category, nature, description, probable cause,
resolution and clear action.
Probable Cause field: List the most likely reason(s) for the alarm.
Resolution field: Give tips on how to solve the problem that the alarm represents.
Clearing Action field: List the condition(s) that have to occur for the alarm to become
cleared; this can be a direct result of performing the suggested actions listed in the
Resolution section.
Recall that Instantaneous alarms move to the Alarms History section immediately after
acknowledgement, however Persistent alarms require both an acknowledgement
and a clearing action.
1 Alarms generated by the NEs and MCU alarms are not listed here as they are specific the
hardware associated with the devices. Refer to the specific device documentation to find out
what types of alarms they generate.
TPS14-009_rev1.2
TPS14-009_rev1.2
Resolution: Identify the user by looking at the alarm details and attempt to
determine if it was un-authorized use of the user name, or perhaps the user simply
forgot his/her old password. The account will be disabled if this alarm is raised and
needs to be enabled again before it can be used again (refer to the
Disabling/Enabling a User Account section of AWMS User Guide). If this situation
occurs too frequently, consider changing the lockout threshold for incorrect
password attempts (see the User Account Global Settings section of AWMS User
Guide).
Clearing Action: User acknowledges the alarm.
TPS14-009_rev1.2
Nature: Instantaneous
Description: NE is discovered by two different IP addresses
Probable Cause: AWMS detects two different IP addresses for the same NE.
Impact: It will make AWMS cannot communicate and manage with the NE
correctly.
Resolution: AWMS cannot determine which IP address is the correct one for the NE,
you may need to physically check the status of the device to see why it is
reporting this condition.
Clearing Action: User acknowledges the alarm.
11. Alarm Name: Failure to Put NE out service (This alarm has been obsoleted)
TPS14-009_rev1.2
Resolution: This alarm can indicate a network failure or an equipment failure in the
NE itself. It may be necessary to physically check on the device itself. Refer to the
Locating the Problematic Device section of AWMS User Guide to help you locate
where the NE locates.
Clearing Action: 1) AWMS detects the NE again (either online or offline), or
2) Disconnected or de-registered the NE.
TPS14-009_rev1.2
TPS14-009_rev1.2
Nature: Persistent
Description: Communication with Proxy is lost
Probable Cause: Communication with the AWMS Proxy has been broken.
Note: If a Proxy is put out of service (see the Enabling/Disabling a Proxy section of
AWMS User Guide), this alarm will still be raised. Therefore if you disable an AWMS
Proxy for a particular reason, you should probably also acknowledge this alarm to
prevent other users from wondering why this Proxy is out of service.
Impact: All NEs under this proxy will be lost from the AWMS and the AWMS cannot
manage them also.
Resolution:
1) Check the service state of the AWMS Proxy specified in the alarm (the
Equipment ID field specifies the name of the Proxy; refer to the Locating the
Problematic Device section of AWMS User Guide).
2) Find the Proxy by name in the Proxy Status Tree (refer to the Proxy
Management & NE Discovery section of AWMS User Guide), if the service state
is “(Out of Service)” then enabling the Proxy will clear this alarm (see the
Enabling/Disabling a Proxy section of AWMS User Guide).
3) If the Proxy is still in-service when this alarm appears, use the Proxy Details or
Proxy Health (refer to the Monitoring Proxy Health section of AWMS User Guide)
to determine the connection status of the Proxy. If it is offline, you may need
to check the console of the machine where the Proxy is physically running. If
the AWMS Proxy has stopped running/crashed, you may refer to the AWMS
Proxy logs for details (Proxy\log\Proxy.log)
Clearing Action: 1) Re-enabling service if the Proxy was out of service.
2) Reconnect the Proxy to the CCS if Proxy was offline.
3) De-register the Proxy will also suffice.
TPS14-009_rev1.2
3) If it is indeed a true rogue NE, you probably want to investigate further outside
of AWMS so as to know how this rogue device appeared in your network.
Clearing Action: Register the NE as Managed or External, or make the NE offline.
20. Alarm Name: Rogue AP Found. (This alarm has been obsoleted)
21. Alarm Name: Rogue NE Radio Online (This alarm has been obsoleted)
24. Alarm Name: Failure to Put NE In service. (This alarm has been obsoleted)
TPS14-009_rev1.2
Category: Equipment
Nature: Persistent
Description: Unsupported NE firmware found
Probable Cause: A manageable NE with a firmware that is not supported by
AWMS has been found as registered in the network.
Impact: there is no impact for this alarm, it just show you the unknown NE
detected, then you need to check if it is really unknown NE.
Resolution: This NE type is not currently supported by AWMS, de-register the NE
(the De-registering a Device section of AWMS User Guide).
Clearing Action: 1) Make the NE offline, or
2) Registering the NE as External, Rogue, or even un-registering it
26. Alarm Name: Interference AP found. (This alarm has been obsoleted)
TPS14-009_rev1.2
TPS14-009_rev1.2
TPS14-009_rev1.2
Online: The number of NE which were on line during the summary time.
Offline: The number of NE which were on line during the summary time.
Loss of Communication: the number of NE which were not able to be ping by the
AWMS server.
Upload Traffic (MB): The total upload traffic in the report time point for NE.
Download Traffic (MB): The total download traffic in the report time point for NE.
Total UL & DL Traffic (MB): The total upload and download traffic for NE.
Number of Associated Clients: The max number of associated clients during the
summary time.
2 Alarms generated by the NEs and MCU alarms are not listed here as they are specific the
hardware associated with the devices. Refer to the specific device documentation to find out
what types of alarms they generate.
TPS14-009_rev1.2
awms-ccs.conf lists the IP address and port for CCS-to-proxy, CCS-to-NE and CCS-to-
database. The default location is: C:\Program Files\Altai
Technologies\AWMS\ccs\awms-ccs.conf. The following description lists out the
default value and function for each field in awms-ccs.conf.
awms.ccs.ip= (empty)
It defines CCS network interface IP address for CCC or Proxy connection. If it is not
specified, it will be bound to all interfaces. It allows multiple addresses separated by
“,”.
awms.ccc.port=11111
It defines the communication port between the CCS and CCC.
awms.proxy.op.port=22222
It defines the operation port between CCS and Proxy communication.
awms.proxy.evt.port=22223
It defines the event port between CCS and Proxy communication.
awms.ne.ip=(empty)
It defines the network interface IP address on CCS for NE FTP communication.
awms.ftp.pasv.ports=2101-2199
It defines the range of FTP ports for passive mode NE firmware upgrade.
awms.mgmt.ftp.port=21
TPS14-009_rev1.2
It defines the management FTP port for report download and firmware upload
between CCS and CCC.
awms.ne.ftp.port=2100
It defines the FTP port for NE firmware upgrade.
awms.ne.ext.ip=(empty)
It defines the gateway IP address for NE connection.
awms.ne.ftp.ext.port=2100
It defines the gateway port for NE firmware upgrade.
awms.database.ip=localhost
It defines the IP address of AWMS database.
awms.database.port=3306
It defines the port of AWMS database.
awms-px.conf lists the IP address and port for CCS-to-proxy, NE health check and NE-
to-proxy. The default location is: C:\Program Files\Altai
Technologies\AWMS\ccs\awms-px.conf. The following description lists out the
default value and function for each field in awms-px.conf.
Here shows the default configuration for awms-px.conf. The default location is:
C:\Program Files\Altai Technologies\AWMS\ccs\awms-px.conf
awms.proxy.ip=(empty)
It defines CCS network interface IP address for CCC or Proxy connection. If it is not
specified, it will be bound to all interfaces. It allows multiple addresses separated by
“,”.
awms.proxy.op.port=22222
It defines the operation port between the CCS and CCC.
awms.proxy.evt.port=22223
It defines the event port between the CCS and CCC.
awms.proxy.healthcheck.interval=10
It defines the time interval (in seconds) in second between two successive health
checks.
TPS14-009_rev1.2
awms.proxy.healthcheck.loc.threshold=2
It defines the number of successive health check Exdeclare “NE is Loss of
Communication”.
awms.ne.ip=(empty)
It defines the network interface IP address of the proxy for NE connection. If it is not
specified, it will be bound to all interfaces. It allows multiple addresses separated by
“,”.
awms.ne.localport.from=57000
awms.ne.localport.to=58500
They define the range of UDP ports for NE SNMP communication. The minimum
number of port must be at least [3 X maximum number of NE + 100].
awms.ne.ext.ip=(empty)
It defines the gateway IP address for NE connection. The trap port must be mapped
to proxy.